Learn more

About Silverfort

Silverfort secures every dimension of identity. We deliver end-to-end identity security that is easy to deploy and won’t disrupt business operations, resulting in better security outcomes with less work. Discover every identity, analyze exposures, and enforce protection inline to stop lateral movement, ransomware, and other identity threats.

Securing privileged access in legacy hybrid environments: How the University of the Pacific gained unified visibility and control

ENVIRONMENT

On-prem Active Directory (AD)
Okta, Entra ID

USERS

10,000+

INDUSTRY

Education

BASED

California,
United States

THE CHALLENGE:

Needed better visibility and the ability to apply security controls in legacy AD environment

THE SOLUTION:

End-to-end visibility, control and real-time protection for privileged users and AD service accounts

  • Identified and audited over 1,200 service accounts across four AD domains, eliminating unnecessary access and reducing the attack surface

  • Enforced MFA protection for high-risk privileged users to secure sensitive administrative operations, reducing risk of credential-based breaches

  • Detected and retired legacy protocols across critical systems, reducing technical debt tied to outdated infrastructure

  • Apply MFA for privileged accounts across four on-prem AD domains

  • Improve discovery and visibility into on-prem service accounts, including outdated and misconfigured non-human identities

  • Monitor and reduce reliance on legacy authentication protocols

The challenge: Legacy identity infrastructure was in urgent need of improved access control

"We have a legacy Active Directory environment and even for experts, it’s confusing. The complexity had grown over the years, and it became clear – we needed to take control"

- Shawn Kerns, Information Security Engineer at University of the Pacific

Finding the right identity security platform

"We considered CrowdStrike’s Identity platform, but Silverfort stood out for the granular control of both human and non-human identities. Silverfort was easier for our teams to understand from a configuration standpoint and no need for an agent running on each endpoint made the deployment easy"

- Shawn Kerns, Information Security Engineer at University of the Pacific

The solution: Immediate value through visibility, control, and smart enforcement

"It was easy to use Silverfort; anytime you put an application or agent on a domain controller, there’s always fear. But once we were live, we saw no disruptions. And almost immediately, we could validate that everything was working as expected"

- Shawn Kerns, Information Security Engineer at University of the Pacific
"One of the first things we did was create a policy to track legacy authentications, and we quickly had complete visibility into what was still using it. That gave us the data and visibility we needed to start addressing the problems without breaking our production environment"

- Shawn Kerns, Information Security Engineer at University of the Pacific

Enforcing MFA security controls for high-risk privileged activity

"This was a problem we had struggled with for years, and now, within months we’ve gained clarity and control. And this is just the beginning, we’re already thinking ahead to continue our journey toward a Zero Trust framework, secure cloud-based non-human identities, and more"

- Shawn Kerns, Information Security Engineer at University of the Pacific

Securing privileged access in legacy hybrid environments: How the University of the Pacific gained unified visibility and control

ENVIRONMENT

On-prem Active Directory (AD)
Okta, Entra ID

USERS

10,000+

INDUSTRY

Education

BASED

California,
United States

THE SOLUTION:

THE CHALLENGE:

End-to-end visibility, control and real-time protection for privileged users and AD service accounts

Needed better visibility and the ability to apply security controls in legacy AD environment

  • Identified and audited over 1,200 service accounts across four AD domains, eliminating unnecessary access and reducing the attack surface

  • Enforced MFA protection for high-risk privileged users to secure sensitive administrative operations, reducing risk of credential-based breaches

  • Detected and retired legacy protocols across critical systems, reducing technical debt tied to outdated infrastructure

  • Apply MFA for privileged accounts across four on-prem AD domains

  • Improve discovery and visibility into on-prem service accounts, including outdated and misconfigured non-human identities

  • Monitor and reduce reliance on legacy authentication protocols

Enforcing MFA security controls for high-risk privileged activity

"This was a problem we had struggled with for years, and now, within months we’ve gained clarity and control. And this is just the beginning, we’re already thinking ahead to continue our journey toward a Zero Trust framework, secure cloud-based non-human identities, and more"

- Shawn Kerns, Information Security Engineer at University of the Pacific
"We have a legacy Active Directory environment and even for experts, it’s confusing. The complexity had grown over the years, and it became clear – we needed to take control"

- Shawn Kerns, Information Security Engineer at University of the Pacific

The challenge: Legacy identity infrastructure was in urgent need of improved access control

The solution: Immediate value through visibility, control, and smart enforcement

"It was easy to use Silverfort; anytime you put an application or agent on a domain controller, there’s always fear. But once we were live, we saw no disruptions. And almost immediately, we could validate that everything was working as expected"

- Shawn Kerns, Information Security Engineer at University of the Pacific
"One of the first things we did was create a policy to track legacy authentications, and we quickly had complete visibility into what was still using it. That gave us the data and visibility we needed to start addressing the problems without breaking our production environment"

- Shawn Kerns, Information Security Engineer at University of the Pacific
"We considered CrowdStrike’s Identity platform, but Silverfort stood out for the granular control of both human and non-human identities. Silverfort was easier for our teams to understand from a configuration standpoint and no need for an agent running on each endpoint made the deployment easy"

- Shawn Kerns, Information Security Engineer at University of the Pacific

Finding the right identity security platform

Learn more

About Silverfort

Silverfort secures every dimension of identity. We deliver end-to-end identity security that is easy to deploy and won’t disrupt business operations, resulting in better security outcomes with less work. Discover every identity, analyze exposures, and enforce protection inline to stop lateral movement, ransomware, and other identity threats.

Fullscreen