Products
Identity Threat Detection and Response (ITDR)
Prevent, detect and respond to identity threats in real-time
Learn more
Privilege Assurance
Identity Assurance
Managed Detection and Response
Cost-effective cybersecurity for small to medium-sized firms
Learn more
Attack Surface Monitoring
Discover cyber vulnerabilities and size of your attack surface
Learn more
Q:SCAN
Third Party
White Paper
ManyKatz: How Active Directory Hacks Went Mainstream
Read more
Services
Offensive Security Services
Gain a hacker’s perspective on your network
Active Directory Security Assessment
Identify and mitigate AD security risks to your network
vCISO
On-demand cybersecurity experts
Resources
Blog
Check out important cybersecurity topics and the QOMPLX perspective
Learn more
Content hub
Research thought leadership, product benefits, use cases, and more
Learn more
Case studies
Data sheets
Overviews
Tech specs
Videos
Webinars
Whitepapers
Data Sheet
QOMPLX Privilege Assurance AD data sheet
Read more
Partners
Company
About QOMPLX
Gain unified visibility into cyber risks & trust in identity
Events
Want to meet QOMPLX? View our list of upcoming events and trade shows
Newsroom
Research current news about QOMPLX
Contact Us
Discuss your firm’s cyber challenges with an expert
White Paper
Aite Impact Brief: Fixing Vulnerabilities in Active Directory and Kerberos
Read more
Login
Request a meeting
Request a demo
Blog
Q:CYBER Translating Sigma Rules
Log Ingest and Detection
Blog
Q:CYBER Using Windowed Rules for Advanced Detection
Log Ingest and Detection
Blog
Q:CYBER Using Rule Templates
Log Ingest and Detection
Blog
Q:CYBER: Introduction to Rules Builder
Log Ingest and Detection
Blog
Q:CYBER Streaming Rules Engine
Log Ingest and Detection
Blog
Q:CYBER Ingesting Windows Event Logs
Log Ingest and Detection