Problem: When it comes to lateral movement it can manifest and present itself as obvious, anomalous network activity, making it suspicious to IT teams right away. It is difficult for Cybersecurity teams to detect lateral movement while performing core business and other daily activities. So how can one prevent lateral movement from taking place on their system? Must show references.