Learn more
About Silverfort
Silverfort secures every dimension of identity. We deliver end-to-end identity security that is easy to deploy and won’t disrupt business operations, resulting in better security outcomes with less work. Discover every identity, analyze exposures, and enforce protection inline to stop lateral movement, ransomware, and other identity threats.
Securing privileged access in legacy hybrid environments: How the University of the Pacific gained unified visibility and control
ENVIRONMENT
On-prem Active Directory (AD)
Okta, Entra ID
USERS
10,000+
INDUSTRY
Education
BASED
California,
United States
THE CHALLENGE:
Needed better visibility and the ability to apply security controls in legacy AD environment
THE SOLUTION:
End-to-end visibility, control and real-time protection for privileged users and AD service accounts
Identified and audited over 1,200 service accounts across four AD domains, eliminating unnecessary access and reducing the attack surface
Enforced MFA protection for high-risk privileged users to secure sensitive administrative operations, reducing risk of credential-based breaches
Detected and retired legacy protocols across critical systems, reducing technical debt tied to outdated infrastructure
Apply MFA for privileged accounts across four on-prem AD domains
Improve discovery and visibility into on-prem service accounts, including outdated and misconfigured non-human identities
Monitor and reduce reliance on legacy authentication protocols
The challenge: Legacy identity infrastructure was in urgent need of improved access control
- Shawn Kerns, Information Security Engineer at University of the Pacific
Finding the right identity security platform
- Shawn Kerns, Information Security Engineer at University of the Pacific
The solution: Immediate value through visibility, control, and smart enforcement
- Shawn Kerns, Information Security Engineer at University of the Pacific
- Shawn Kerns, Information Security Engineer at University of the Pacific
Enforcing MFA security controls for high-risk privileged activity
- Shawn Kerns, Information Security Engineer at University of the Pacific

Securing privileged access in legacy hybrid environments: How the University of the Pacific gained unified visibility and control
ENVIRONMENT
On-prem Active Directory (AD)
Okta, Entra ID
USERS
10,000+
INDUSTRY
Education
BASED
California,
United States
THE SOLUTION:
THE CHALLENGE:
End-to-end visibility, control and real-time protection for privileged users and AD service accounts
Needed better visibility and the ability to apply security controls in legacy AD environment
Identified and audited over 1,200 service accounts across four AD domains, eliminating unnecessary access and reducing the attack surface
Enforced MFA protection for high-risk privileged users to secure sensitive administrative operations, reducing risk of credential-based breaches
Detected and retired legacy protocols across critical systems, reducing technical debt tied to outdated infrastructure
Apply MFA for privileged accounts across four on-prem AD domains
Improve discovery and visibility into on-prem service accounts, including outdated and misconfigured non-human identities
Monitor and reduce reliance on legacy authentication protocols
Enforcing MFA security controls for high-risk privileged activity
- Shawn Kerns, Information Security Engineer at University of the Pacific
- Shawn Kerns, Information Security Engineer at University of the Pacific
The challenge: Legacy identity infrastructure was in urgent need of improved access control
The solution: Immediate value through visibility, control, and smart enforcement
- Shawn Kerns, Information Security Engineer at University of the Pacific
- Shawn Kerns, Information Security Engineer at University of the Pacific
- Shawn Kerns, Information Security Engineer at University of the Pacific
Finding the right identity security platform
Learn more
About Silverfort
Silverfort secures every dimension of identity. We deliver end-to-end identity security that is easy to deploy and won’t disrupt business operations, resulting in better security outcomes with less work. Discover every identity, analyze exposures, and enforce protection inline to stop lateral movement, ransomware, and other identity threats.
