CxO Trail
Advertisement
  • Home
  • Cybersecurity
    • All
    • Acquisition
    • CISO & Cyber Leadership Africa
    • CxO Security Insights
    • Cyber Governance & Risk
    • Cyber Visionaries
    • Cybersecurity Reports
    • Data-Driven Cyber Watch
    • Featured Stories
    • Global vs African threat landscape insights
    • Leading Women in Cyber
    • Top Threats & Trends
    Sophos Active Adversary Report: Identity is the New Perimeter

    Sophos Active Adversary Report: Identity is the New Perimeter

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Sophos Acquires Arco Cyber to Bridge the Global CISO Gap

    Sophos Acquires Arco Cyber to Bridge the Global CISO Gap

    Why Your Login Information is the Number One Target in 2026, and How to Fix It

    Why Your Login Information is the Number One Target in 2026, and How to Fix It

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Kaspersky Reports 5x Surge in QR Phishing

    Kaspersky Reports 5x Surge in QR Phishing

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    • Cyber Visionaries
    • CISO & Cyber Leadership
    • Cyber Governance & Risk
    • Women in Cyber
    • Data Privacy & Ethics
    • Emerging Cyber Voices
  • Artificial Intelligence
    • All
    • AI & Automation
    • AI for Africa
    • AI Governance & Ethics
    • AI in Cybersecurity
    • AI Insights & Reports
    • AI Leadership
    • Global Industry Updates
    ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

    ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

    Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

    Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

    One Identity Appoints Michael Henricks as CFOO to Drive Global Operational Excellence

    One Identity Appoints Michael Henricks as CFOO to Drive Global Operational Excellence

    Mastercard Debuts Agentic Commerce

    Mastercard Debuts Agentic Commerce

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Tactful AI Secures $1M to Lead the Agentic AI Revolution in MENA

    Tactful AI Secures $1M to Lead the Agentic AI Revolution in MENA

    LG InnoFest 2026 Unveils the AI-Driven Future of the MEA Household

    LG InnoFest 2026 Unveils the AI-Driven Future of the MEA Household

    Identy.io Launches Software-First Biometrics to Modernize Africa’s Digital Infrastructure

    Identy.io Launches Software-First Biometrics to Modernize Africa’s Digital Infrastructure

    CPX Launches AI-Powered DFIR to Close the UAE’s Detection Gap

    CPX Launches AI-Powered DFIR to Close the UAE’s Detection Gap

  • CxO Visionaries
  • Webinars
    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Upcoming Webinar: The Future of Identity Security in Africa

    Upcoming Webinar: The Future of Identity Security in Africa

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

No Result
View All Result
  • Home
  • Cybersecurity
    • All
    • Acquisition
    • CISO & Cyber Leadership Africa
    • CxO Security Insights
    • Cyber Governance & Risk
    • Cyber Visionaries
    • Cybersecurity Reports
    • Data-Driven Cyber Watch
    • Featured Stories
    • Global vs African threat landscape insights
    • Leading Women in Cyber
    • Top Threats & Trends
    Sophos Active Adversary Report: Identity is the New Perimeter

    Sophos Active Adversary Report: Identity is the New Perimeter

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Sophos Acquires Arco Cyber to Bridge the Global CISO Gap

    Sophos Acquires Arco Cyber to Bridge the Global CISO Gap

    Why Your Login Information is the Number One Target in 2026, and How to Fix It

    Why Your Login Information is the Number One Target in 2026, and How to Fix It

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Weaponised AI Is Powering the Fifth Wave of Cybercrime, Group-IB Warns

    Kaspersky Reports 5x Surge in QR Phishing

    Kaspersky Reports 5x Surge in QR Phishing

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    Infoblox to Acquire Axur: Extending Preemptive Security Beyond the Perimeter

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    INTERPOL & Team Cymru Dismantle Cybercrime Across 19 African Nations

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    Ping Identity Marks Digital Trust Milestone: Defeating AI-Fraud with Zero-Knowledge Biometrics

    • Cyber Visionaries
    • CISO & Cyber Leadership
    • Cyber Governance & Risk
    • Women in Cyber
    • Data Privacy & Ethics
    • Emerging Cyber Voices
  • Artificial Intelligence
    • All
    • AI & Automation
    • AI for Africa
    • AI Governance & Ethics
    • AI in Cybersecurity
    • AI Insights & Reports
    • AI Leadership
    • Global Industry Updates
    ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

    ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

    Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

    Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

    One Identity Appoints Michael Henricks as CFOO to Drive Global Operational Excellence

    One Identity Appoints Michael Henricks as CFOO to Drive Global Operational Excellence

    Mastercard Debuts Agentic Commerce

    Mastercard Debuts Agentic Commerce

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Unpacking Africa’s Future with AI & Cybersecurity Specialist Blessing Ifeoluwa Omogbehin

    Tactful AI Secures $1M to Lead the Agentic AI Revolution in MENA

    Tactful AI Secures $1M to Lead the Agentic AI Revolution in MENA

    LG InnoFest 2026 Unveils the AI-Driven Future of the MEA Household

    LG InnoFest 2026 Unveils the AI-Driven Future of the MEA Household

    Identy.io Launches Software-First Biometrics to Modernize Africa’s Digital Infrastructure

    Identy.io Launches Software-First Biometrics to Modernize Africa’s Digital Infrastructure

    CPX Launches AI-Powered DFIR to Close the UAE’s Detection Gap

    CPX Launches AI-Powered DFIR to Close the UAE’s Detection Gap

  • CxO Visionaries
  • Webinars
    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Revolutionising Security Across Africa through Autonomous Penetration Testing

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Empowering Enterprise Networking in Africa with HPE Aruba SD-WAN & SASE Solutions

    Upcoming Webinar: The Future of Identity Security in Africa

    Upcoming Webinar: The Future of Identity Security in Africa

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Autonomous Pen Testing Webinar: How Horizon3.ai & Sechpoint are Empowering African Enterprises

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Sechpoint, in Collaboration with HPE Aruba, to Host SD-WAN and SASE Solutions Webinar on June 18, Powered by SHAHPER Media

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

    Nigeria’s Data Leaders Unite for Automation-First NDPA Compliance Webinar Hosted by Platview and Powered by Securiti.ai

No Result
View All Result
CxO Trail
No Result
View All Result

ManageEngine Enhances AD360 With Risk Exposure Management and Local User MFA Features to Strengthen Identity Threat Defenses

CXO Trail by CXO Trail
July 23, 2025
in Industry News
Reading Time: 3 mins read
0
ManageEngine Enhances AD360 With Risk Exposure Management and Local User MFA Features to Strengthen Identity Threat Defenses

New Capabilities Help Enterprises Visualize Attack Paths, Enforce MFA on Unmanaged Local Accounts, and Align Identity Security With the Zero Trust Framework

  • The identity risk exposure management feature adds identity threat detection capabilities that help uncover how attackers could escalate privileges or move laterally within the environment
  • With local user MFA, enterprises can extend enterprise-grade MFA to previously unmanaged local accounts
  • Read about AD360’s identity risk exposure management at https://mnge.it/riskexposuremgmt and local user MFA capabilities at https://mnge.it/local-user-mfa

ManageEngine, a division of Zoho Corporation and a leading provider of enterprise IT management solutions, today announced the general availability of identity risk exposure management and local user MFA features in AD360, its converged identity and access management (IAM) platform. The release enables security teams to detect privilege escalation risks and secure unmanaged local accounts, two common identity attack vectors that attackers continue to exploit at scale.

Identity remains the primary attack vector in modern enterprises, as shown by Verizon’s 2025 Data Breach Investigations Report, which found that credential abuse was the initial access vector in 22 % of breaches. The report also highlighted widespread abuse of poorly managed local accounts and privilege paths across over 12,000 confirmed breaches.

“With this release, ManageEngine AD360 moves beyond traditional IAM by embedding identity threat defenses into core identity operations. By turning identity data into actionable security insights, we’re helping customers make IAM the first line of defense, not a check box,” said Manikandan Thangaraj, vice president of ManageEngine.

While most IAM tools focus on provisioning and policy enforcement, AD360 adds risk exposure mapping via attack path analysis as well as local MFA enforcement, helping enterprises close attack paths that often go undetected. This marks a key step in identity management evolving from an access control layer into an active security control.

New Capabilities

  • Identity risk exposure management: Graph‑based analysis maps lateral movement and privilege escalation paths in Active Directory (AD), automatically prioritizing risky configurations and recommending remediation steps. The graph engine models AD objects as nodes and privilege inheritance as lines, revealing multi‑step attack chains in real time, with actionable suggestions that IT teams can implement to close exposed paths.
  • Local user MFA: This feature extends adaptive MFA to local accounts on non‑domain‑joined servers, DMZ assets, and test environments, thwarting credential stuffing and persistence techniques.
  • ML‑driven access recommendations: During provisioning and access review campaigns, machine learning analyzes permission patterns and suggests adjustments to implement least privilege access, helping prevent excess entitlements.

Additionally, ManageEngine has enhanced AD360’s access certification module, which now includes expanded entitlements for comprehensive review coverage, and the risk assessment capabilities feature new indicators for improved identity risk monitoring across AD and Microsoft 365 environments. These enhancements are designed to streamline compliance reporting and strengthen access governance across the enterprise. The new capabilities support NIST SP 800-207 on Zero Trust architecture, align with PCI DSS Version 4.0 Requirement 8, and facilitate SOX, HIPAA, and GDPR controls.

Tags: ManageEngineZoho Corporation
Previous Post

CyberArk Announces Availability of Tools to Secure AI Agents in the New AWS Marketplace AI Agents and Tools Category

Next Post

Middle East Cybersecurity Market Forecast Report 2025-2030

CXO Trail

CXO Trail

Next Post
Middle East Cybersecurity Market Forecast Report 2025-2030

Middle East Cybersecurity Market Forecast Report 2025-2030

  • Trending
  • Latest
Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

Patchifi Officially Emerges from Stealth with Intelligent Automation at Its Core

October 31, 2025
George Njuguna Leads Kenya’s AI-Driven Cybersecurity and Digital Trust Movement

George Njuguna Leads Kenya’s AI-Driven Cybersecurity and Digital Trust Movement

July 31, 2025
Certified CISO Philip Aiwekhoe on Shaping the Future of Cybersecurity Strategy in Africa’s Financial Sector

Certified CISO Philip Aiwekhoe on Shaping the Future of Cybersecurity Strategy in Africa’s Financial Sector

August 5, 2025
CxOTrail Insight – GITEX Nigeria 2025 Edition Now Live

CxOTrail Insight – GITEX Nigeria 2025 Edition Now Live

September 8, 2025
GITEX AFRICA 2026: Driving Africa’s Sovereign Digital Economy Through AI

GITEX AFRICA 2026: Driving Africa’s Sovereign Digital Economy Through AI

February 27, 2026
ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

February 26, 2026
ESET Named Global Finalist for Best Security Company in the 2026 Cybersecurity Community Awards

ESET Named Global Finalist for Best Security Company in the 2026 Cybersecurity Community Awards

February 26, 2026
Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

February 26, 2026

Recent News

GITEX AFRICA 2026: Driving Africa’s Sovereign Digital Economy Through AI

GITEX AFRICA 2026: Driving Africa’s Sovereign Digital Economy Through AI

February 27, 2026
ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

ESET Uncovers PromptSpy: The First Android Malware to Weaponize Generative AI

February 26, 2026
ESET Named Global Finalist for Best Security Company in the 2026 Cybersecurity Community Awards

ESET Named Global Finalist for Best Security Company in the 2026 Cybersecurity Community Awards

February 26, 2026
Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

Dell Technologies and Ooredoo Partner to Launch Sovereign AI-as-a-Service in Qatar

February 26, 2026
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Email us: editorial@cxotrail.com

© 2025 CxOTrail. A publication by SHAHPER Media Ltd.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

🧠 Stay Ahead in Cybersecurity & AI

Get Africa’s top C-level insights delivered monthly. Free, sharp, and on point.

No Result
View All Result
  • About Us
  • Advertise with Us
  • AI + Cybersecurity
  • AI Governance & Policy
  • Artificial Intelligence
  • CISO & Cyber Leadership
  • Contact Us
  • Cyber Governance & Risk
  • Cyber Visionaries
  • Cyber Visionaries | Africa
  • Data Privacy & Ethics
  • Emerging AI Talent & Startups
  • Emerging Cyber Voices
  • Gitex Nigeria
  • Home
  • Magazine
  • Magazines
  • Privacy Policy
  • Women in AI
  • Women in Cyber

© 2025 CxOTrail. A publication by SHAHPER Media Ltd.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.