AI Buyer Insights:

Michelin, an e2open customer evaluated Oracle Transportation Management

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Michelin, an e2open customer evaluated Oracle Transportation Management

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

List of SpecterOps BloodHound Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Norwegian Cruise Line Transportation 38900 $8.0B United States SpecterOps SpecterOps BloodHound Threat Modeling 2022 n/a
Norwegian Cruise Line implemented SpecterOps BloodHound in 2022 to extend identity attack path visibility across its hybrid Active Directory and Microsoft Azure environments, aligning the deployment with Threat Modeling for its Identity and IT security function. The deployment targeted global cruise operations with operational governance anchored in IAM and security operations based in the United States and spanning international sites. SpecterOps BloodHound was configured to surface graph-based attack path analytics and attack path management capabilities, enabling analysts to map privilege relationships and identify shortest paths to high-value assets. The implementation emphasized prioritized remediation workflows and visibility into privilege escalation and lateral movement risk, consistent with Threat Modeling practices for identity-centric risk assessment. Integrations focused on collecting directory and identity telemetry from on-premises Active Directory and Azure environments, producing consolidated identity graphs for cross-environment analysis. Operational ownership rested with IAM and security operations teams, who used BloodHound outputs to triage and prioritize remediation efforts across shipboard and shore-side IT estates. Governance changes included embedding attack path visibility into regular IAM reviews and remediation pipelines, with the SpecterOps BloodHound Enterprise outputs informing prioritization of fixes. The stated outcome was enhanced AD and Azure visibility and prioritized remediation to reduce exposure to privilege escalation and lateral movement.
University Of Texas At Austin Education 28761 $4.4B United States SpecterOps SpecterOps BloodHound Threat Modeling 2022 n/a
In 2022, the University of Texas at Austin implemented SpecterOps BloodHound to map and manage Active Directory and Azure AD attack paths across its campus IT estate. The deployment used SpecterOps BloodHound as a Threat Modeling platform aligned to Identity/IT security (IAM), centralizing identity attack path analysis for campus IT operations in the United States. The implementation emphasized graph-based attack path discovery and attack path management capabilities, leveraging BloodHound Enterprise support for Microsoft Azure to extend mapping into Azure AD alongside on-premises Active Directory. Configuration included targeted data ingestion, query-driven investigation workflows, and visualization layers to surface lateral movement, privilege escalation, and misconfiguration relationships. These functional capabilities enabled analysts to prioritize remediation activities based on path criticality. Integrations focused on ingesting directory and permission telemetry from Active Directory domains and Azure AD tenants that cover campus departments and central IT services, providing a unified identity graph across site boundaries. Operational coverage included identity and IT security teams responsible for IAM, incident response, and vulnerability remediation within the United States campus environment. Governance and process changes centered on embedding prioritized remediation workflows into existing IAM and security operations, using SpecterOps BloodHound to inform ticketing and remediation priorities. Outcomes explicitly reported included improved AD and Azure visibility and prioritized remediation to reduce identity attack exposure.
Woodside Petroleum Oil, Gas and Chemicals 3856 $1.0B Australia SpecterOps SpecterOps BloodHound Threat Modeling 2021 n/a
In 2021, Woodside Petroleum deployed SpecterOps BloodHound Enterprise to sustain Tier 0 resiliency in its Active Directory environment across its Australian operations. The Threat Modeling implementation of SpecterOps BloodHound focused on continuous identification and remediation of identity based attack paths, supporting Identity/IT security, Identity & Access Management processes. The deployment centered on BloodHound Enterprise capabilities for graph based visibility into Active Directory relationships, automated attack path discovery, and prioritized remediation guidance. Configurations were tuned to surface Tier 0 exposure, continuously verify high value principals and service accounts, and produce actionable remediation items for identity owners and security operations. Operational coverage was scoped to Woodside Petroleum’s Australia footprint, with Identity/IT security and IAM teams consuming BloodHound outputs to drive remediation workflows and validation runs. Integration points emphasized direct mapping to Active Directory objects and access relationships to maintain near real time discovery of attacker accessible attack paths. Governance and process changes included establishing continuous Tier 0 verification cycles, assigning remediation priorities to identity owners, and embedding BloodHound Enterprise findings into incident response and privileged access review processes. Outcomes reported from the implementation included continuous Tier 0 verification, prioritized remediation guidance, and rapid reduction of attacker accessible attack paths.
Showing 1 to 3 of 3 entries

Buyer Intent: Companies Evaluating SpecterOps BloodHound

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating SpecterOps BloodHound. Gain ongoing access to real-time prospects and uncover hidden opportunities.

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD SpecterOps BloodHound Coverage

SpecterOps BloodHound is a Threat Modeling solution from SpecterOps.

Companies worldwide use SpecterOps BloodHound, from small firms to large enterprises across 21+ industries.

Organizations such as Norwegian Cruise Line, University Of Texas At Austin and Woodside Petroleum are recorded users of SpecterOps BloodHound for Threat Modeling.

Companies using SpecterOps BloodHound are most concentrated in Transportation, Education and Oil, Gas and Chemicals, with adoption spanning over 21 industries.

Companies using SpecterOps BloodHound are most concentrated in United States and Australia, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of SpecterOps BloodHound across Americas, EMEA, and APAC.

Companies using SpecterOps BloodHound range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 0%, large organizations with 1,001-10,000 employees - 33.33%, and global enterprises with 10,000+ employees - 66.67%.

Customers of SpecterOps BloodHound include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified SpecterOps BloodHound customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Threat Modeling.