Once Ridgeback is installed on your network, our goal is to slow down, interrupt, and prevent malicious lateral movement. We inhibit the compromise of one endpoint from leading to the compromise of multiple endpoints. In Cybersecurity, enterprises deal with a rapidly-evolving threat landscape. As an example, for a network comprising 1,000 endpoints, there are approximately 713,309,000 local lateral movement attack vectors. Delayed action is harmful, and inaction is catastrophic in most cases. Therefore, an enterprise cybersecurity program must be able to adapt to be successful. Effective and timely decisions must be made to address these ever changing cyber threats.
We believe that the only way to create an adaptive security program is to start with insight into what is going on in the network i.e. getting deep visibility into network operations. The reality is, you can’t protect what you can’t see. Once you have the visibility to understand the attack surface, vulnerabilities and potential attack patterns the enterprise needs to deploy strategies to make the network extremely hostile for the bad guys by poisoning the network, using aggressive deception techniques, fine-grained access and communication policies and counter measures and then continuously monitor the network and enforce policy violations and malicious lateral movements automatically and in real time.