SentinelOne, a pioneer in delivering autonomous AI-powered security for the endpoint, datacenter and cloud, today announced their Lateral Movement Detection Engine to identify and stop malicious actors from accessing further parts of a network. One of the most common tactics used by an attacker once infiltrating a network is to start to move laterally, hopping from machine to machine in an attempt to traverse the network for specific assets, or just as means to infect and gain persistence over multiple hosts. Lateral movement attempts will also often involve credentials scraping techniques to attempt to steal admin passwords or pass the ticket techniques to hop from machine to machine.

Lateral movement can also be attributed to two main causes: a live attacker traversing a network, or malicious code with automatic spreading abilities such as a worm. The techniques to perform lateral movements can include utilizing exploits such as the EternalBlue SMB exploit, using remote desktop protocols, using harvested credentials with tools/interfaces like Powershell and WMI, and executing code on a remote machine.

Given that the vast majority of the above techniques are fileless methods most traditional security controls have a hard time identifying an attacker or a piece of code moving within a network. The stealthy nature of these attacks make them highly efficient and lucrative for the attacker on one hand and can allow mass infections on the other hand.

SentinelOne’s Lateral Movement Detection engine utilizes the platform’s low-level monitoring to gain visibility into all machine operations, including the above script language and protocols. It is able to detect and mitigate lateral movement attacks in real time by building execution context in real time and applying Behavioral AI to identify the anomalies in the usage of these various techniques to move around on the network, preventing the spread of malware or a “roaming” attacker.

The type of detection and visibility offered by the SentinelOne Lateral Movement Detection is far superior to every other EDR tool out there and is integrated holistically for automated operation into our 2.0 platform – no configuration needed.

Watch the video below to see the Lateral Movement Engine in action. An infected machine will attempt to infect additional machines on the same network by utilizing ps.exe in order to make that infection happen. The video will show how a machine with the SentinelOne agent installed would detect and block this type of lateral movement attack from an infected machine. It will then show some of the information that SentinelOne provides about the attack such as information about the identified threat and the infected machine, the actual engine that blocked the attack, and an attack storyline that shows the visual forensics of the attack.

Last month, the SentinelOne Platform was deployed alongside an existing EDR tool on a prospect network, and within minutes of deployment, SentinelOne identified an attacker moving laterally in the network. Read the full incidence report to learn more about a real live case – from deployment to full mitigation. DOWNLOAD NOW.

Additional Resources:

About SentinelOne
SentinelOne is shaping the future of endpoint security with an integrated platform that unifies the detection, prevention and remediation of threats initiated by nation states, terrorists, and organized crime. SentinelOne’s unique approach is based on deep inspection of all system processes combined with innovative machine learning to quickly isolate malicious behaviours, protecting devices against advanced, targeted threats in real time. SentinelOne was formed by an elite team of cyber security and defence experts from IBM, Intel, Check Point Software Technologies, Cylance, McAfee, and Palo Alto Networks.

View the original post by SentinelOne.

Predictive, Pre-Deployment, Post Installation and Health Check Wireless Surveys carried out by certified wireless engineers.

We look at Wi-Fi fundamentals, explore the benefits of and technology behind Wi-Fi 6, Wi-Fi 6E and what the future holds for Wi-Fi 7

Net-Ctrl provide network and structured cabling solutions as either a stand-alone installation, or to compliment products and solutions that we offer.

Connect-the-Classroom scheme  is allowing schools to upgrade their infrastructure to a solution that should last 10 years

Net-Ctrl provides two excellent support packages in addition to any equipment purchased. Find out about our Silver or Gold support package

IP-CCTV site survey to assess camera locations and requirement and existing Mobotix solution health checks.

Net-Ctrl offers our Cloud WLAN. Delivering market-leading patented technology managed by the Net-Ctrl engineering team.

We provide an automated Cybersecurity awareness training solution covering both simulated phishing and training courses.

Net-Ctrl offers a range of wireless network solutions. We explore some common questions related to these solutions.

Offering end-to-end, affordable and competitive financing solutions to help you achieve your business goals.