Videos

Product walkthroughs, webinars, and identity security deep dives—built for busy teams.

DemoFeb 2026

First Scan to First Findings (4-Minute Tour)

Run your first agentless scan and review initial identity findings in under five minutes.

Getting StartedVisibility
4:12Identity Attack Surface Management
TutorialFeb 2026

Attack Paths: The Shortest Route to Tier-0

Discover and prioritize identity-based attack paths that reach Tier-0 assets.

Attack PathsTier-0
9:40Attack Path Management
TutorialJan 2026

Shadow Admins: Detect Hidden Privilege

Find identities with effective admin access that bypass standard privilege groups.

PrivilegeShadow Admins
7:05Identity Attack Surface Management
DemoJan 2026

Compliance Scorecards: CIS & Microsoft Baselines

Generate GPO compliance scorecards against CIS and Microsoft baselines instantly.

ComplianceBaselines
6:18Compliance
TutorialDec 2025

Credential Discovery: Finding Exposed Secrets Safely

Scan shared folders and configs for exposed credentials without touching production data.

CredentialsExposure
8:02Credential Discovery
DemoDec 2025

Risk Triage: Prioritize What Matters First

Use risk scoring to focus remediation on the highest-impact identity exposures.

RiskPrioritization
5:55Risk Assessment
DemoNov 2025

Reporting Automation: From Finding to Action

Turn a security finding into an assigned remediation task with tracking and export.

ReportingWorkflow
4:48Reporting Automation
WebinarNov 2025

Multi-Forest Visibility in Large AD Environments

Explore a unified identity graph spanning multiple AD forests and trust relationships.

Multi-forestHybrid
32:10Identity Attack Surface Management
TutorialOct 2025

Incident Response: Investigating Identity Changes Fast

Investigate identity-related changes during a security incident with full timeline context.

DFIRInvestigation
10:22Digital Forensic & Incident Response
Event TalkOct 2025

Why Identity Resilience Matters (Executive Brief)

A leadership perspective on why identity resilience should be a board-level priority.

ExecutiveStrategy
12:30Risk Assessment
WebinarSep 2025

Common Misconfig Patterns We See in Enterprise AD

The most common Active Directory misconfigurations we find in enterprise environments and how to fix them.

MisconfigurationHygiene
28:45Identity Attack Surface Management
AnnouncementSep 2025

Product Update: New Reporting & Export Options

Overview of new reporting templates, PDF export, and scheduled delivery features.

Product UpdateReporting
3:20Reporting Automation

See it in action.

Request a walkthrough tailored to your environment.

We respect your privacy

We use cookies to keep this site secure and working properly. With your permission, we also use optional cookies to understand usage and improve the experience. Cookie Policy

You can change your choice at any time.

Videos | Forestall