ITDR ≠ IAM, it is complementary
IAM defines access rules; ITDR detects when access is compromised or abused and responds operationally. The missing link that closes identity defence.
80 % des incidents impliquent des identités compromises. Fortgale gouverne la sécurité de l'identité à 360° : de l'Active Directory on-premise aux environnements cloud hybrides — avec détection, réponse et gouvernance continue.
Identity is today the number-one attack vector. IAM rules are not enough: temps réel detection & response is required.
IAM defines access rules; ITDR detects when access is compromised or abused and responds operationally. The missing link that closes identity defence.
On-premise AD + Microsoft Entra ID + Google Workspace + multi-cloud environments. Full visibility on synchronised hybrid identities. No blind spots between on-prem and cloud.
AI correlates millions of identity events with proprietary threat intelligence; European L2/L3 analysts validate every alert and act operationally. Drastic false-positive reduction.
From the Domain Controller to Entra ID, from cloud to post-compromise. One European outpost.
Detection of Kerberoasting, Pass-the-Hash, DCSync, Golden Ticket, AS-REP Roasting, lateral movement, critical GPO changes and creation of unapproved admin accounts.
MFA Bypass, Token Theft, Service Principal abuse, Hybrid Identity attacks. Conditional Access monitoring, OAuth consent grant abuse, malicious app registrations.
Behavioural baseline on privileged users, insider détection des menaces, anomaly detection on access, impossible geo-velocity, off-hours logins, suspicious privilege escalation.
Account isolation, token revocation, blast radius assessment, guided remediation. Forensics on anomalous logons, SecOps support for the identity-driven kill-chain.
Detection of unauthorised escalation: addition to Domain Admins, changes to sensitive groups, AD-CS abuse, ESC1-ESC8 patterns.
Full detection: Kerberoasting, AS-REP, PtH, PtT, NTLM relay, OverPass-the-Hash, Mimikatz traces, LSASS dumping.
Post-AiTM token theft, OAuth abuse, conditional access bypass, service principal abuse, illicit consent grant. M365, Azure AD, Google Workspace.
Identity-driven lateral movement tracking: Impacket usage, anomalous Kerberos tickets, anomalous logon patterns, NTLM hash usage.
UEBA for insider threat: data exfiltration patterns, access to resources outside the role, off-hours activity, dormant accounts reactivated.
MITRE-mapped runbooks, account isolation, credential reset, token revocation, blast radius mapping, post-incident hardening.
Block AiTM phishing before credentials are entered. Free activation for M365 and Google.
Discover Interceptor →EDR/XDR governed by the European SOC for endpoint, network and cloud. Triage in <15 min.
Discover MDR →Proprietary feeds on actors targeting identities: Scattered Spider, APT29, FIN12, identity-based ransomware.
Discover CTI →ITDR is the Identity Threat Detection & Response outpost: 360° security for identities across Active Directory, Entra ID, Google Workspace and multi-cloud. Includes 24·7 monitoring, UEBA, identity incident response and guided remediation.
IAM governs who has access to what (provisioning, roles, permissions). ITDR detects and responds when access is compromised or abused. They are complementary: IAM = rules, ITDR = temps réel monitoring of violations.
Kerberoasting, AS-REP Roasting, Pass-the-Hash, Pass-the-Ticket, DCSync, Golden Ticket, Silver Ticket, privilege escalation, critical GPO changes, creation of unapproved admin accounts, LDAP reconnaissance. Contextual correlation to reduce false positives.
Yes. Structured for NIS2 Art. 21 and DORA requirements on privileged identity management, IAM and incident response. Auditable reporting, event documentation, documented procedures.
Native integration with Microsoft Defender for Identity, Sentinel, Google Workspace Security Center, Okta, CrowdStrike, SentinelOne and the main enterprise SIEMs. Native connectors and APIs with no additional agents.
ITDR focuses on post-compromise detection and response. For preventive AiTM protection Fortgale offers the M365 Phishing Interceptor (complementary free service). The two services are synergistic.
80% of incidents pass through compromised identities. The Fortgale ITDR service monitors, detects and responds 24·7 on every plane — from AD to cloud — before an identity becomes a critical incident.
Aucune séquence de nurturing, aucune réponse automatique. Un de nos analystes vous rappelle sous un jour ouvré.
Le Report complet (executive summary · IoC opérationnels · runbook technique) est confidentiel. Envoyez-nous deux informations et un de nos analystes vous recontacte avec l'accès et un bref briefing technique.
Réponse en 30 minutes, confinement en 1 à 4 heures. Même si vous n'êtes pas client Fortgale.