The Business Case
After an attacker has gained an initial foothold in a network, they look to broaden and cement further control over your endpoints, data and systems. This activity is known as lateral movement.
Ridgeback stops lateral movement by disrupting network discovery by attackers and eliminates them before they can succeed.
Almost all types of cyber-attacks involve some kind of lateral movement. Yet, the lateral movement remains undetected by nearly all cybersecurity products.
Offense As Defense in Cybersecurity
Ridgeback creates deterrence at each reconnaissance stage as the attacker attempts to move forward with malicious intent.
Why lateral movement must be stopped
70% of exploits involve lateral movement. On average, the hackers’ dwell time is 277 days.*
If lateral movement is not stopped, an attack such as ransomware is highly likely to succeed.
By Thomas Phillips, Inventor & CTO – Ridgeback
"Ridgeback is like using Weaponized Virtual Reality to thwart adversaries."
Only one single < 1 MB core per network segment (no endpoint agents).
Operates on Layer 2, beneath all other layers.
Exposes hostile behavior and configuration/hygiene problems deterministically. No false positives.
The entire solution can be deployed on a single laptop.
Observes live-to-live and live-to-dark space communications.
Layer 2 addresses IT and OT networks. Any device with a mac address is protected.
The only cyber deterrent: disrupt and impair the adversary at the inception of the exploit.
Instant-on. No network or endpoint overhead.