Monitor Sensitive Data
Attackers can't steal data without moving it across the network.
Sensitive data is often segmented by internal firewalls but an attacker gains privileges and "known" credentials access the system the data will be exfiltrated before you catch it. To steal valuable data, attackers often move it to a staging area inside the target network, then exfiltrate from there.
With ExtraHop Reveal(x)
Detect Unauthorized Movement of Sensitive Data
With Reveal(x) you have a better chance of detecting post-compromise attack activities like lateral movement data staging, to stop data breaches from occurring. Watching the movement of sensitive data enables faster, more confident investigation with immediate context about the users and protocols involved, as well as compromise scoping and reporting, so analysts can act quickly to stop the breach and contain the damage.