Ridgeback Network Defense

What's going on in your network?

Ridgeback Network Defense is a revolutionary security product that gives you an edge over emerging threats. With its unique capability to tap into the overlooked dark space in your network, Ridgeback provides the ultimate protection for your systems and peace of mind for your IT and security teams.

The Business Case

Flip the script. Impose your will on the adversary.

Ridgeback sees the live and dark space, turning every unused port and IP into a sensor.

Ridgeback sensors actively engage and disrupt exploitation operations after an attacker has gained an initial foothold in your network. 

We stop lateral movement like no other.

Power of The Invisible

Going beyond live space monitoring provides unprecedented network visibility into previously unseen traffic in your network.

Unobserved traffic to dark IPs.

The adversary takes advantage of errant signals as opportunities to learn the topology, enumerate assets, steal and escalate credentials and to extend their command-and-control laterally.

"Ridgeback is a force multiplier."

CISO – A large manufacturer

"This certainly is in a category of its own."

Executive – An IT Research Company

"Ridgeback is so intuitive and elegant."

CISO – A financial firm

"This takes security to another level for my clients."

CISO – A middle-market MSSP

Why Ridgeback is a unique product?

Deployment

Easy to install. Simple to manage.

Deterrent

The only cyber deterrent: disrupt and impair the adversary at the inception of the exploit.

Deterministic

Exposes hostile behavior deterministically. No false positives.

Portable

The entire solution can be deployed on a single laptop.

Agnostic

Layer 2 addresses IT and OT networks. Endpoint OS agnostic solution.

Immediate

Instant-on. No network or endpoint overhead.

Why lateral movement must be stopped

70% of exploits involve lateral movement. On average, the hackers’ dwell time is 277 days.*

The adversary uses errant signals to learn the topology, enumerate assets, steal and escalate credentials and laterally extend their command-and-control. After an attack, orchestrated through methods like spear-phishing, the hacker will quietly conduct reconnaissance to understand key network characteristics such as hostnames, operating systems and network topology. These are the prerequisites to expanding their control over your systems.

If lateral movement is not stopped, an attack such as ransomware is likely to succeed.

Offense As Defense in Cybersecurity

Ridgeback creates deterrence at each reconnaissance stage as the attacker attempts to move forward with malicious intent.

Our patented technology protects your network and IT assets by implementing man-in-the-middle techniques as a defense.