SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on Cybersecurity

Read now!

Cohesity & Semperis: Defend against cyberattacks

18 Sep 2025

Cohesity & Semperis: Defend against cyberattacks
Contact company
Contact Cohesity
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Cohesity and Semperis launch Cohesity Identity Resilience to protect against cyberattacks.
  • Solution secures critical Active Directory and Microsoft Entra ID in hybrid environments.
  • Provides rapid and secure recovery from identity infrastructure attacks with specialised forensics.
Related Links
  • Semperis unveils critical nOAuth vulnerability research
  • Semperis' Purple Knight highlights AD security gaps
  • Semperis unveils critical design flaw in Windows 2025
  • Semperis' service account protection for active directory

Cohesity and Semperis announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical identity infrastructure, including Microsoft Active Directory assets from cyberattacks.

Now available for purchase from Cohesity, the solution is the strongest of its kind in the market, enabling companies to proactively harden defences, recover rapidly, and conduct comprehensive post-attack forensic investigations.

Role within IT environments

Active Directory is the central nervous system of most enterprise IT environments, managing authentication and access to critical systems, applications, and data.

Active Directory’s crucial role within IT environments makes it a primary target for cybercriminals. When Active Directory is compromised, attackers can gain unrestricted access to IT resources, often resulting in ransomware infection, data theft, and prolonged business disruption.

Users protect and secure on-premises

Cohesity Identity Resilience supports Active Directory protection and recovery across hybrid environments

Cohesity Identity Resilience supports Active Directory protection and recovery across hybrid environments. The solution helps users protect and secure on-premises Active Directory and extends these safeguards to Microsoft Entra ID in the cloud.

Organisations can protect and recover the source of authority for objects synchronised across their entire Active Directory and Entra ID identity landscape. 

Key battlegrounds of cyberattacks

“Identity Security is one of the key battlegrounds of cyberattacks for enterprises and governments. They need solutions that combine prevention, resilience, and recovery without adding complexity to their existing cyber resilience strategy,” said Sanjay Poonen, chief executive officer, Cohesity.

“Cohesity Identity Resilience delivers a modern, proven approach that helps organisations protect the foundation of their digital operations, so they can recover quickly from even the most critical attacks on identity infrastructures and remain cyber resilient. We’re excited to partner with Semperis on this effort.” 

Semperis’ proven expertise and technology

Cohesity Identity Resilience builds on Semperis’ proven expertise and technology in Active Directory protection and recovery, delivering automated, malware-free recovery capabilities that minimise downtime and ensure a clean, reliable path back to normal business operations. With Cohesity Identity Resilience, customers benefit from:

  • Proactive Active Directory hardening – Provides the ability to scan on-prem or hybrid Active Directory environments for hundreds of indicators of exposure (IOEs), see risk scores, apply remediation guidance, and identify and prioritise attack paths that bad actors could use to reach critical privileged assets (Tier 0). 
  • Secure, immutable backups with capability for cyber vaulting – Enables consistent backup and recovery workflows while providing isolation of AD backups. 
  • Rapid and secure recovery – Restores Active Directory forests after a cyberattack or catastrophic failure, ensuring minimal downtime. 
  • Specialised identity forensics and incident response capabilities – Cleanses the system of attacker artefacts, ensuring Active Directory is restored to a trusted environment. 
  • Comprehensive post-breach analysis – Offers comprehensive post-attack forensic support, including rapid assessments within defined incident windows, and validation of Active Directory integrity before restoring production systems. 

Advantages of critical systems

Cohesity Identity Resilience builds on the partnership between Cohesity and Semperis that began in 2024

“Active Directory compromises are devastating because they give attackers so many paths to take advantage of critical systems,” said Mickey Bresman, chief executive officer, Semperis.

“By partnering with Cohesity, we’re integrating our industry-pioneering Active Directory technology with the broadly adopted Cohesity Data Cloud, ensuring the world’s largest global organisations have a trusted, streamlined path to protect against and recover from even the most sophisticated identity-based attacks.” Cohesity Identity Resilience builds on the partnership between Cohesity and Semperis that began in 2024.

Important step forward in building true cyber resilience

"Active Directory compromises often turn into prolonged business disruptions that are costly and difficult to contain,” said Scott Harrison, director, Hybrid Infrastructure Solutions, CDW.

“With Cohesity Identity Resilience, powered by Semperis, we see a solution that directly addresses this gap—helping enterprises strengthen defences, recover quickly, and maintain confidence in their core identity systems. It’s the kind of capability our customers have been asking for, and it represents an important step forward in building true cyber resilience.” 

Find out about secure physical access control systems through layered cybersecurity practices.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Identity management
  • Cyber security
  • Data Security
  • Related categories
  • Power supplies & batteries
  • Bollards
  • Video servers (IP transmission)
  • Barricades
  • Barriers
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Corporate news
About this page

Defend critical identity infrastructure with Cohesity Identity Resilience, powered by Semperis, to safeguard Active Directory from cyberattacks, ensuring rapid recovery and security across on-premises and hybrid environments.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec