Partial solutions to solve the lateral movement challenge​

SOLUTION #1: Endpoint protection

Existing solutions: EDR, XDR, NGAV, EPP.​

Challenge: Lateral movement is carried out by the same tools admins use to connect to remote machines, such as PsExec and PowerShell. Endpoint solutions see these as legitimate software that’s allowed to run.​

Results: Lack of accurate detection, ability to terminate in real-time. At best, allows for reactive threat hunting for anomalies that have already occurred.​

SOLUTION #2: Network segmentation​

Existing solutions: Zero Trust Network Access (ZTNA), Next-Generation Firewalls (NGFW), Software-Defined Perimeter (SDP), Micro-segmentation Platforms, Network Access Control (NAC)​

Challenge: Adversaries can bypass segments by discovering key resources such as file servers, Domain Controllers, SQL databases,app servers, and even admin workstations.​

Results: Possibility for the attacker to escape the segment and move to other resources uninterruptedly, bypassing the segmentation. At best, can sometimes limit or contain lateral movement depending on how the network is segmented.​​

Preventing Lateral Movement in Active Directory

SOLUTION #2: Network segmentation​

Existing solutions: Zero Trust Network Access (ZTNA), Next-Generation Firewalls (NGFW), Software-Defined Perimeter (SDP), Micro-segmentation Platforms, Network Access Control (NAC)​

Challenge: Adversaries can bypass segments by discovering key resources such as file servers, Domain Controllers, SQL databases,app servers, and even admin workstations.​

Results: Possibility for the attacker to escape the segment and move to other resources uninterruptedly, bypassing the segmentation. At best, can sometimes limit or contain lateral movement depending on how the network is segmented.​​

SOLUTION #1: Endpoint protection

Existing solutions: EDR, XDR, NGAV, EPP.​

Challenge: Lateral movement is carried out by the same tools admins use to connect to remote machines, such as PsExec and PowerShell. Endpoint solutions see these as legitimate software that’s allowed to run.​

Results: Lack of accurate detection, ability to terminate in real-time. At best, allows for reactive threat hunting for anomalies that have already occurred.​

Partial solutions to solve the lateral movement challenge​

Preventing Lateral Movement in Active Directory