"If you're looking for malware you won't see breaches using legitimate credentials," Kurtz explained. Simply put, hackers are stealing login information and using those credentials to access applications and sensitive data. As a result, it's hard to identify when organizations are breached, and many have lost data, only to discover those intrusions months and years later.
2.5.2 Lateral hacker movement/breach containment: Once cybercriminals find their way inside corporate networks, they're moving laterally between applications until they find the most sensitive and valuable data. "Cryptographic isolation and end-to-end encryption prevents lateral movement."
This information security challenge is why Gartner predicted that micro-segmentation technologies will be one of the must-haves for enterprise security in 2016. The research firm explained that by cryptographically isolating workloads and encrypting network traffic end-to-end, organizations can prevent lateral "east/west" hacker movement, contain breaches and better secure