SpecterOps BloodHound: From Open-Source to Enterprise

BloodHound started as an open-source project to give security professionals new visibility into the hidden attack paths inside Active Directory and Azure environments. It is a trusted resource for penetration testers and researchers around the world. BloodHound Enterprise expands and transforms those insights into a powerful platform for defenders to continuously reduce identity risk at the source, preventing attacks, and protecting critical assets.

BHExBHCE-HeroImage@2x

Built for different missions 

BloodHound Enterprise vs. BloodHound Community Edition 

Take a closer look at BloodHound Enterprise 

BloodHound Enterprise helps modern organizations defend against relentless identity-based attacks. It continuously identifies and prioritizes millions of identity attack paths to critical assets across the environment, then provides expert guidance to help teams remediate risk. By giving defenders an adversary’s view of the environment, it is the centerpiece of a holistic Attack Path Management practice.

BloodHound Community Edition enables point-in-time assessments of attack paths to Tier Zero assets, helping offensive security pros evaluate identity tech debt and existing configurations during strategic engagements or research.

BHExBHCE-Image3@2x

Enterprise Security Features for Hybrid Environments

Technical and Tradecraft Expertise

BloodHound Enterprise customers work with a named Technical Account Manager who guides deployment, optimizes data collection across all environments, and runs regular monthly sessions to build internal capability and keep your program advancing.

To accelerate operational maturity, BloodHound Scentry pairs BloodHound Enterprise with our tradecraft experts to accelerate your identity APM practice.

BHE-Bottom@2x

Compare BloodHound Enterprise and BloodHound Community Edition

Capability/ Value

BloodHound Community Edition

BloodHound Enterprise

Scenario Example

Provides offensive security pros with deep insight into abusable identity conditions during strategic engagements

Defenders continuously detect high-risk attack paths to critical assets and work alongside IAM teams to eliminate them with safe remediation guidance

Continuous attack path mapping

Privilege Zones

Attack Path Prioritization

Attack Path Choke Points

Remediation Guidance

Targeted Access Control

Enterprise Integrations

OpenGraph Findings

Dedicated Technical Account Manager

BloodHound Scentry

Available

On-Prem Deployment

Available

FedRAMP High Authorized

Available

Ready to get started?

See how BloodHound Enterprise eliminates millions of attack paths while focusing your defenses on the routes attackers actually use to reach your critical assets.