Risk of Lateral Movement

Logo
Presented by

Orca Security

About this talk

Orca Security scans your entire cloud account in a holistic manner. It peers into each machine’s filesystem for private keys, such as on server A, taking a hash of each found. It then checks the authorized key configuration across all other assets for public keys. If any are found, such as on server B, Orca calculates hashes and compares the private key hash to find a match. If there is, Orca sends an alert. Watch, and learn more.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (21)
Subscribers (990)
See how leading enterprises and cloud-first companies detect risks in public cloud environments such as AWS, Microsoft Azure, and Google Cloud Platform.