Can You Block Lateral Movement In Real Time?

Presented by

Yiftach Keshet, Director of Product Marketing, Silverfort. Gal Sadeh, Sr. Data Scientist, Silverfort

About this talk

Did you know that lateral movement attacks leverage compromised credentials to propagate through the network and gain access to target resources? In this webinar, we’ll explain these attacks, and the use of compromised credentials in various steps. We will explain the difference between standard and advanced attacks, and explain why security solutions often fail to detect and prevent these attacks. Finally, we will explain how Silverfort’s cutting edge identity platform can detect and block these attacks. Topics covered: What are the most common lateral movement attacks? The identity and security aspects of lateral movement Why security products often fail to prevent lateral movement How Silverfort’s Unified Identity Protection platform eliminates different types of lateral movement attacks in real time

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (24)
Subscribers (1247)
Silverfort extends secure authentication and Zero Trust policies across all sensitive assets, on-premises or in the cloud, without agents or proxies. This includes systems and interfaces that couldn't be protected until today like IT infrastructure, homegrown and legacy applications, file shares, databases, IoT devices and more. In addition, Silverfort extends protection to interfaces and access tools that currently allow attackers to bypass all other MFA solutions (Remote PowerShell, PsExec, etc.)