lateral movement detection Blog Terms - Attivo Networks

lateral movement detection

Help Net Security Logo

Attivo Networks and Swimlane empower organizations to get ahead of would-be cyber attacks

Attivo Networks and Swimlane announced a technology alliance partnership that brings together privilege escalation prevention and threat lateral movement detection with security automation. The integration combines Attivo’s deception technology that deploys decoys to help hide critical assets with Swimlane’s automation platform. With this integration, security operations teams gain the ability to stay ahead of would-be attackers by identifying …

Attivo Networks and Swimlane empower organizations to get ahead of would-be cyber attacks Read More »

Stopping the Next SolarWinds Requires Doing Something Different

By Tony Cole, CTO, Attivo Networks Will the SolarWinds breach finally prompt the right legislative and regulatory actions on a broader, more effective scale? The SolarWinds breach is not the first major supply chain breach, but previous similar breaches failed to prompt effective regulatory action. Both governments and businesses remain focused on things like cyber …

Stopping the Next SolarWinds Requires Doing Something Different Read More »

Attivo Networks’® EDN Solution Integrates with SentinelOne Singularity XDR to Deliver Protection Against Credential-Based Attacks

Integration couples unparalleled endpoint security with Active Directory protection, credential theft detection and credential exposure prevention FREMONT, Calif. – April 27, 2021 – Attivo Networks®, the industry experts in lateral movement attack detection and privilege escalation prevention, announced today a new integration for the Attivo EDN Suite with SentinelOne’s Singularity XDR platform. With an uptick …

Attivo Networks’® EDN Solution Integrates with SentinelOne Singularity XDR to Deliver Protection Against Credential-Based Attacks Read More »

The Criticality of Lateral Movement Detection for Healthcare Organizations

The relentless stream of ransomware and high-profile breaches in 2021 have highlighted the importance of detecting lateral movement early in an attack to limit the intruder damages. Attackers have demonstrated their ability to evade defenses, compromise Active Directory, and freely move laterally within networks to conduct wide-spread attacks. Now more than ever, healthcare organizations must …

The Criticality of Lateral Movement Detection for Healthcare Organizations Read More »

defense-in-depth

Defense in Depth – Filling the Gaps to Detect and Stop Lateral Movement

Written by: Kevin Hiltpold, Federal Sr. Solutions Engineer – At my first job in cybersecurity at one of the biggest Internet providers that ever existed, I asked, “Do we have multiple vendors in our network security stack to provide defense in depth?” The Chief Architect replied, “No, we have multiple vendors to use as leverage when we have a feature request that one of them doesn’t want to fulfill.” With that answer, my philosophy was set. Defense in depth is about being able to detect and stop what the first line of defense lets through, not vendor diversity. It is hard enough finding qualified security professionals who can respond to attacks quickly without forcing them to be fluent with multiple vendors. If you are wondering if several well-meaning security architects and SOC chiefs told me over the years that their environment had defense in depth because their firewall was from one vendor and their IDS from another, sadly, the answer is yes.

Detecting Lateral Movement

Preventing Lateral Movement

Written by: Vikram Navali, Senior Technical Product Manager – All it takes is one compromised system to start a cyberattack. Once attackers get a foothold inside the network, they can gather information or escalate privileges to complete their mission. After gaining initial access, attackers use lateral movement techniques to gain access to critical assets. A perfect example is the recent SolarWinds software supply chain attack, where attackers kept their malware footprint very low. As sophisticated attackers will do, they quietly stole and used credentials to perform lateral movement through the network and establish legitimate remote access.

Scroll to Top