Please use your KuppingerCole account to log in or
create one, if you don't have it yet.
Nearly all high-impact cyberattacks have a phase in which the attacker must conduct lateral movement from their initial landing point to their ultimate target. To do this, the attacker needs a combination of credentials and available connections between one system and another. This is the evasive process of “living off the land” using the connectivity native to the organization.
During a normal workday, credentials and connections proliferate within a network. Once inside, attackers use Mimikatz and other attack tools to automate and accelerate credential harvesting, network discovery, and privilege escalation. Until now, defenders have lacked the ability to get ahead of this process. Identifying and removing excess, high-risk, and rogue connections has been a manual effort— impossible at scale.
In this KuppingerCole webinar, we examine the various ways to deprive attackers of what they need to move laterally in your network by identifying and removing the riskiest pathways that lead to your “crown jewels”.
Language: English • Duration: 01:01:30 • Resolution: 1280x720
Cloud Access Security Brokers
Fudo PAM by Fudo Security
Working for the Business, not the Auditors
Atos DirX Directory
R&S®Trusted Gate - Secure Glocalization by Rohde & Schwarz Cybersecurity
OT Discovery & Monitoring
Blockchain & Distributed Ledgers
Privacy Enhancement Technology
Real Time Security Monitoring & Intelligence
Privileged Access Management
Privacy and Consent Management
Artificial Intelligence and Machine Learning