BI Logo

Stop Lateral Movement in On-Prem Apps
How to Extend Modern Identity Security to Legacy Protocols

Tuesday, September 30th, 2025 at 12:00 pm ET 

When credentials are stolen, legacy systems fail: UnitedHealth paid a $22M ransom after attackers accessed a Citrix portal with no MFA, and Microsoft was breached through a forgotten legacy account. 

Most teams don’t realize that stolen credentials can be rendered useless, even in on-prem environments.

Join us to see how CrowdStrike ITDR and Beyond Identity enforce phishing-resistant, device-bound authentication on protocols like NTLM, Kerberos, and LDAP, without ripping out current infrastructure.

You'll learn how to:

  • Block initial access with stolen credentials
  • Stop lateral movement via RDP, SSH, VPN
  • Prevent outdated security exploits

CrowdStrike stops breaches. Beyond Identity prevents them at initial access. 

Stop Lateral Movement in On-Prem Apps
How to Extend Modern Identity Security to Legacy Protocols

Tuesday, September 30th, 2025 at 12:00 pm ET 

When credentials are stolen, legacy systems fail: UnitedHealth paid a $22M ransom after attackers accessed a Citrix portal with no MFA, and Microsoft was breached through a forgotten legacy account. 

Most teams don’t realize that stolen credentials can be rendered useless, even in on-prem environments.

Join us to see how CrowdStrike ITDR and Beyond Identity enforce phishing-resistant, device-bound authentication on protocols like NTLM, Kerberos, and LDAP, without ripping out current infrastructure.

You'll learn how to:

  • Block initial access with stolen credentials
  • Stop lateral movement via RDP, SSH, VPN
  • Prevent outdated security exploits

CrowdStrike stops breaches. Beyond Identity prevents them at initial access. 

Rebranded Webinar Slides (8)
Jasson Casey Webinar - landing page-1