The Business Case
Why Ridgeback?
After an attacker has gained an initial foothold in a network, they look to broaden and cement further control over your endpoints, data and systems. This activity is known as lateral movement.
Ridgeback stops lateral movement by disrupting network discovery by attackers and eliminates them before they can succeed.
Almost all types of cyber-attacks involve some kind of lateral movement. Yet, the lateral movement remains undetected by nearly all cybersecurity products.
Offense As Defense in Cybersecurity
Ridgeback creates deterrence at each reconnaissance stage as the attacker attempts to move forward with malicious intent.
Why lateral movement must be stopped
70% of exploits involve lateral movement. On average, the hackers’ dwell time is 277 days.*
If lateral movement is not stopped, an attack such as ransomware is highly likely to succeed.
By Thomas Phillips, Inventor & CTO – Ridgeback
"Ridgeback is like using Weaponized Virtual Reality to thwart adversaries."
Easy
Only one single < 1 MB core per network segment (no endpoint agents).
Fundamental
Operates on Layer 2, beneath all other layers.
Deterministic
Exposes hostile behavior and configuration/hygiene problems deterministically. No false positives.
Portable
The entire solution can be deployed on a single laptop.
Comprehensive
Observes live-to-live and live-to-dark space communications.
Agnostic
Layer 2 addresses IT and OT networks. Any device with a mac address is protected.
Deterrent
The only cyber deterrent: disrupt and impair the adversary at the inception of the exploit.
Immediate
Instant-on. No network or endpoint overhead.