Can You Block Lateral Movement In Real Time?
Did you know that lateral movement attacks leverage compromised credentials to propagate through the network and gain access to target resources?
In this recorded webinar, we explain these attacks, and the use of compromised credentials in various steps the difference between standard and advanced attacks, and why security solutions often fail to detect and prevent these attacks. Finally, we will explain how Silverfort’s cutting edge identity platform can detect and block these attacks.
- What are the most common lateral movement attacks
- The identity and security aspects of lateral movement
- Why security products often fail to prevent lateral movement
- How Silverfort’s Unified Identity Protection platform eliminates different types of lateral movement attacks in real time
Yiftach Keshet, Director Of Product Marketing at Silverfort
Yiftach Keshet leads the Product Marketing at Silverfort. Prior to joining Silverfort he served in various Product Management and Product Marketing roles with cybersecurity market leaders such as Microsoft, Palo Alto Networks and Team8.
Gal Sadeh, Chief Data Scientist at Silverfort
Gal is Chief Data Scientist in Silverfort’s research team. He is responsible for big data analytics and developing AI engines. He joined Silverfort after many years of research and leadership roles at the 8200 elite cyber unit of the Israel Defense Forces. Gal holds a Masters in Mathematics and Computer Science from Tel Aviv University.