Cybersecurity

Directory Services Protection Platform™
Trusted Application Cybersecurity

Trust Lockdown™

Directory Services Protection Platform™

Enterprise identity protection that helps firms recover from cyber breaches and identity system failures, on-premises and on cloud. 

  • PROTECT your active Directory from cyberattacks and catastrophes
  • DETECT suspicious activity and Active Directory health issues
  • REMEDIATE disaster that compromise your Active Directory

Active Directory Disaster Recovery

Fully-automated forest recovery orchestration in three simple steps

Semperis Active Directory Forest Recovery

Semperis Active Directory Forest Recovery is the only fully automated solution for an Active Directory disaster recovery (Gartner market research). Simplify your recovery process to three easy steps in a Forest or a Domain recovery scenario to implement your organizational SLAs.

Semperis Active Directory Forest Recovery is the only fully automated solution for an Active Directory disaster recovery (Gartner market research). Simplify your recovery process to three easy steps in a Forest or a Domain recovery scenario to implement your organizational SLAs.

  • 100% automation of the Active Directory forest disaster recovery process.
  • Single domain recovery.
  • Recovery process completely aligned with the Microsoft Active Directory® forest recovery white paper.
  • Single domain controller rebuild.
  • Optimized backup set for fast restoration.
  • Zero maintenance with a robust configuration comparison mechanism.
  • Data at rest and data in transit encryption

Full Forest Recovery with a simple restoration wizard 


Step 1
Select your recovery scenario


Step 2
Select preferred restore point


Step 3
Click Recover

 


Active Directory Granular Restore and Directory Auditing

Instant restore of Active Directory Objects and attributes and correlated multi-source actionable directory insights.

Semperis Active Directory State Manager
Real-time granular attribute search, compare, and restore

Pinpoint object values in a timeline graphical view with real-time filtering and free text search mechanism. Gain insight into your Active Directory activities with granular support down to an attribute level. Roll back to the desired point in time, test the effect and if required roll back to a different checkpoint.

• Quickly compare Active Directory states.
• Discover and zoom in on changes.
• Granular Recover single attributes, objects, or trees.
• Recover public key infrastructure (PKI) including certificate templates.
• Reveal DNS binary formatted changes in a meaningful view prior to restoration.
• Get real-time insight into changes and revert as necessary within seconds.
• Semperis Active Directory Forest Recovery.


Real-time comparison of Active Directory states
Compare Active Directory previous states to live state or compare any previous points in time.


Recent items feed


Secured web based administration interface


Recovery of single attributes, objects, or trees


Recover mission critical services

Trusted Application Cybersecurity

Trust Lockdown™

Trust Lockdown™ is a Trusted Apps cybersecurity technology which stops malware from running on computers and mobile devices. Trust Lockdown™ implements the Australian, Canadian, and U.S. CERT’s #1 anti-malware strategy.

Our Trust Lockdown™ solution blocks ALL malware that tries to run as an executable or a script on the user’s system. The Trust Lockdown™ kernel driver intercepts the loading of all executable components and scripts and identifies them by multiple cyber-metric fingerprints. If they are TRUSTED they are allowed to RUN. Everything else is BLOCKED, PERIOD. Trust Lockdown™ is a true DEFAULT DENY technology.

Endpoint Protection with Trusted App Technology

Trust Lockdown™ is a malware PREVENTION product at the endpoint layer of your Defense-In-Depth Security Strategy. We allow only your Trusted Apps to run. Untrusted apps and scripts are ALWAYS blocked. It doesn’t matter if it has a new or unknown signature, what behavior it has, what the user privileges are, or if the item tries to download from a webpage or local drive. Unknown items are blocked, and your trusted items are able to run.

Prevention beats remediation every time! we stop all unknowns by default because we focus on what is trusted and allowed to run on customer endpoints. Unknown items such as new ransomware variants, advanced attacks, and zero-day exploits are stopped first by Trust Lockdown™, allowing cybersecurity professionals to alleviate the endless ‘Break-Fix’ cycle that characterizes most cybersecurity solutions.

Trust Lockdown™ eliminates the need to continuously patch your apps. With Trust Lockdown™, application patches can be applied on a regular and planned basis instead of on the schedule of various application vendors.

Protect Offline Devices

Our protection also works when your device is offline! Whether you choose our cloud or appliance-based service, our endpoint protection delivers the same protection when offline or disconnected from the network. An essential feature in today’s on-the-go environment and use of portable devices.

Request A Demo

You can grow your business through a strategic partnership with Darkblade Technologies, LLC leveraging your disruptive technology and market contacts.