2025년 특권 액세스 관리에 대한 매직 쿼드런트™: Netwrix가 4년 연속 인정받았습니다.보고서 다운로드.

Resource centereBook
What is Lateral Movement?

What is Lateral Movement?

Once cybercriminals have established a foothold in a network — for example, through a password attack — they often seek to expand their reach to other assets. Using a variety of lateral movement tactics, they stealthily move from one system to another, searching for sensitive data to steal or critical systems to exploit.
To thwart cyberattacks, your organization needs a strong defense against lateral movement. Download the whitepaper now to get answers to these key questions:

  • How does lateral movement work?
  • What are the three stages of lateral movement?
  • Why is it so hard to detect lateral movement?
  • How can a Zero Trust approach help prevent lateral movement?

Share on