Endpoint Detection & Response (EDR) , Network Detection & Response , Next-Generation Technologies & Secure Development

OnDemand Webinar I Defense in Depth – Filling the Gaps to Detect and Stop Lateral Movement

Close the gap by efficiently detecting escalation activities early in the attack cycle

When attackers evade the first line of network defense, having secondary controls to fill in the gaps is crucial in detecting adversaries who can break free to infiltrate the network. All they need is a single unwary user to click on a link in an email, and they can establish a beachhead in the network from which they can spread. With the SolarWinds breach, attackers have a back door into potentially thousands of networks. Typical security controls focus on detecting the initial compromise but seldom the lateral movement and privilege escalation activities that attackers spend most of their time executing. The Attivo Networks Endpoint Detection Net suite of products closes this gap by efficiently detecting such activities early in the attack cycle.

Watch this webinar to learn how security teams can:

  • Detect an adversary who looks and acts like a member of the organization and is moving in operational blind spots
  • Slow down the adversary with every piece of information they gather for lateral movement
  • Deceive the adversary, turn the tables, and lower the Mean-Time-To-Detection (MTTD) from months to hours, or even less

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.