skip to Main Content

The Lateral Movement Cyber Security Platform

Microsegmentation requires more than firewall rules – only TrueFort prevents attacks from spreading across the most leveraged attack vectors

Gain the visibility needed to take control

Segmentation projects fail when security teams lack accurate records of how applications operate. Only TrueFort provides a deep mapping of assets operating in the environment and the continuous behavior analysis needed to enforce automated blocking policies. Best-in-class microsegmentation means lateral movement control across network, process, and service account activity.

Protect business operations from malicious lateral movement


Service Account Protection

File Integrity Monitoring

Workload Hardening

Learn more about the TrueFort Platform

Play Video
Play Video
Play Video

TrueFort protects some of the world’s largest networks

< 1 Second

Alert and block time on anomalous behavior

> 100,000 servers

Scaled to any size environment


Lateral movement is a technique used by cyber attackers to systematically move through an organization’s network as they look for critical data and assets, which become the target of their attacks.

Bad actors want to access sensitive and valuable information while staying undetected. After gaining initial access they will study an organization’s network topology, steal higher profile credentials, and access more systems and sensitive data by moving laterally around throughout the network.

East-west traffic refers to network traffic between devices within a data center, server to server, app to app, or service to service.

As opposed to north-south traffic, which is data packets flowing between systems that are external networks physically outside of the data center, east-west is defined as any communication between two or more components within a specific data center, or even communication between local servers and cloud servers within an organization’s managed boundaries.

Application accounts, or service accounts, are non-human identities utilized by applications or service software to communicate with other applications or operating systems, without the need to log in as user accounts do. Due to their high level of access and permissions, visibility into service accounts, preventively monitoring, managing, and governance is critical in cybercrime prevention, as bad actors actively target these accounts to gain access to applications and other services.

Insider threats are potential accidental or malicious risks from users within an organization. This could be from former or current employees, business associates or contractors, and anyone with existing permissions to access an organization’s computer systems and data. These can also be malicious outsiders from the organization, posing as employees or business partners.

Security teams use benchmarking to highlight deviations from usual practices and flag potential insider threats.

If someone other than a designated user has access to account information or user login details, this is known as compromised credentials. This can be passwords, email addresses, or other relevant personal information.

Compromised credentials are often sold on the Dark Web, and bad actors rely on people using the same login information across multiple accounts to gain access. When one account is breached, they conduct credential-stuffing attacks to find other services using the same details.

Get more details about the TrueFort Platform

Back To Top
TrueFort Advisor and Venture Partner - West Coast at Canaan, Bob Williams

Bob Williams

Advisor | Venture Partner - West Coast, Canaan
Maha Ibrahim, Canaan

Maha Ibrahim

Observer | General Partner - West Coast, Canaan
TrueFort CFO Eileen Spellman

Eileen Spellman

Managing Director Emerald Development Ptrs. And TrueFort Board Member, Charles Collins

Charles Collins

Observer - Mng. Director, Emerald Development Ptrs.
TrueFort CMO Matt Hathaway

Matt Hathaway


Matt Hathaway serves as TrueFort’s Chief Marketing Officer, leading the global marketing strategy to get TrueFort the recognition it deserves. Matt has extensive knowledge of security users, buyers, and landscape, as well as a track record of building high-performing marketing and product teams. He has over 15 years’ experience in the security market that span fraud prevention, vulnerability management, SIEM, cloud workload protection, data security, endpoint protection, and application security.

Prior to joining TrueFort, Mr. Hathaway was VP of Product Marketing at Imperva, a leader in Application and Data Security, where he led Product, Content, and Technical Marketing, SEO, and Competitive Intelligence. He was also VP of Product Marketing at Carbon Black (acquired by VMware), served in multiple product and marketing roles at Rapid7 (including through its IPO), and held product roles at RSA Security and Uptycs.

TrueFort Board Member and Principal & Founder of Bess Ventures & Adv., Lane Bess

Lane Bess

Member - Principal & Founder, Bess Ventures & Adv.
TrueFort Advisor and Chief Information Officer at Intel Corporation, Motti Finkelstein

Motti Finkelstein

Advisor - Chief Information Officer, Intel Corporation
TrueFort Advisor and Founder & President of Security Risk Solutions, Steve Katz

Steve Katz

Advisor - Founder & President, Security Risk Solutions
TrueFort Emblem Logo

Truefort customer support

TrueFort customers receive 24×7 support by phone and email, and all software maintenance, releases, and updates

For questions about our support policy, please contact your TrueFort account manager or our presales team at

Support Hotline

Email Support