We've launched out of stealth, read more here!
Identity is the new perimeter. 



Protect access to your organization critical resources to mitigate risk of unauthorized access, data breaches and operational disruptions.

Pass-the-Hash (PtH)

Pass the hash (PtH) is a hacking technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LanMan hash of a user’s password, instead of requiring the associated plaintext password as is normally the case.