Intrusion Prevention System for
Active Directory Networks
Eliminate breaches by protecting Active Directory, Domain Controllers,
Domain Identities, Domain Credentials, and all Domain resources.
Active Directory: The Root of Domain Compromise
Discover why attackers use this Microsoft-designed resource to operate their campaigns.
Javelin vs. APT28
Top threat groups from around the world use Active Directory to execute their campaigns.
Active Directory from the Attacker’s Perspective
Learn how attackers manipulate this crucial asset to their advantage.
The Paradigm of Active Directory Network Security is Broken

90%
of all corporations around the world, including governments and military entities, are using Active Directory Networks to manage their users, applications, and computers.

The Active Directory Network is a unique form of network, one in which all of the computers, servers, and applications are connected. The industry is heavily focused on protecting these resources individually without realizing the security consequences of connecting them to a Active Directory environment. When a PC or server is connected to a Active Directory environment, it's exposed to all Active Directory resources by design. It only takes one compromised machine to jeopardize the entire organization.

In an environment where everything is connected, the rules of attack, as well as detection and response, are unique and different. Attackers know this, but most defenders do not. We are here to change that.

Breach
Reconnaissance
Lateral Movement
Domain Compromise
Accomplish Objective
Attackers only need to be right once. Defenders must be right every time. Like users and business productivity software, prevention tools or techniques are not perfect. After an attacker gets a foothold on one of the domain-connected endpoints, they will recon the internal network to identify targets such as PCs, servers, applications, identities, and even powerful user accounts.
Introducing
AD | Protect
AI to control the attacker’s perspective at the endpoint and server.
Reveal Dark Corners the attacker favors.
Supports multi-domain architecture.
With a few queries to the Active Directory at the point of breach, an attacker can obtain all information to move throughout the network.
Download the reconnaissance PDF.
Javelin AD | Protect
1
Reduce alert fatigue
Javelin AD|Protect only alerts on definitive breach. The attacker reveals themselves during credential theft, reconnaissance, and lateral movement, providing the defender with true positive signals that an endpoint or service is compromised. This is a crucial missing datapoint in most security operations.
2
Reduce attack surface
Javelin AD|Protect includes a continuous assessment that illuminates Dark Corners favored by the attacker, allowing the defender to reduce risk. It also automates and captures full forensics and reports active attacks at Patient Zero, providing you with the relevant information to defend yourself during the crucial post-breach phase.
3
Silent implementation
Javelin AD|Protect does not alter the Active Directory, network infrastructure, or user experience. With its quick and easy installation, business operations are not disrupted, leaving zero footprint on your environment for neither the attacker nor the user to see.
 
INDUSTRY RECOGNITION
Gartner Cool Vendor
Network Products Guide IT World Awards 2018, Bronze Winner
SC Awards
IoT Cloud Innovation Awards 2016, Finalist
Cyber Security Excellence 2017, Winner
Best Emerging Technology, Finalist
UPCOMING EVENTS
DerbyCon 8.0
0
DAYS
:
0
HOURS
:
0
MIN
:
0
SEC
October 3-7, 2018 @ Marriott / Louisville
 
MISSION
Protect every machine in the world connected to
Active Directory.
After serving in the military, the Javelin team promised to create a solution that would defend what they so often attacked: Active Directory. Shocked at how easy it was to gain access to the domain and query the Active Directory for information, they knew this was a problem that needed to be solved.

Nine out of ten companies around the world use Active Directory to control and maintain their internal resources. What they don’t realize is that this IT component exposes them to data breaches. With one machine connected to an Active Directory network, attackers can obtain all the information they need for a successful operation.

It is Javelin’s mission to educate the industry and other security personnel about Active Directory exposure and, in the process, protect every machine connected to an Active Directory network.
Stop
with Javelin AD | Protect
 
Request a Demo
Required
Required
Required
NUMBER OF EMPLOYEES
FEDERAL ENTITY
*COUNTRY
I'M INTERESTED IN
 
 
 
Request a Demo
Required
Required
Required
NUMBER OF EMPLOYEES
FEDERAL ENTITY
*COUNTRY
I'M INTERESTED IN