Workflow Detail

Lateral Movement

Detects and analyzes lateral movement patterns across your network infrastructure. This workflow identifies unauthorized access attempts, privilege escalation, and suspicious network traversal that may indicate advanced persistent threats or compromised credentials.

How It Works

Fluency's AI monitors network traffic, authentication events, and system access patterns to detect lateral movement attempts. The system analyzes user behavior, network connections, and privilege changes to identify suspicious patterns that may indicate an attacker moving through your infrastructure.

  • Monitors network connections and authentication events
  • Analyzes user privilege escalation patterns
  • Detects unusual access to sensitive systems
  • Identifies suspicious network traversal patterns
  • Correlates events across multiple systems and timeframes
  • Provides context on potential attack progression

Feature Comparison

AI Analysis vs Splunk SPL-Based Detection

See how advanced AI-driven security analysis compares to traditional SPL-based detection in key areas of context, logic, and output quality.

Feature / CapabilityAI AnalysisSplunk SPL-Based Detection
IP to location logicAccurate with human-readable locations (Barcelona → Opfikon) and real-world travel distanceBased on iplocation, sometimes inaccurate or outdated; no city-to-city distance context
Device context awarenessThe AI recognize the second IP is from a known AVD endpoint, and distinguish cloud-hosted vs. personal deviceSPL treats IPs as flat values; doesn’t infer context from device names unless explicitly encoded in a lookup
User role logicKnows the user is a subcontractor marked ONLY REMOTE, making virtual desktop infrastructure login expected.SPL cannot infer or evaluate user roles without joining external HR or identity data.
Session analysisThe AI considered whether logins belong to the same session or different contexts (VDI vs. local)SPL can’t link session context unless it’s engineered manually (e.g., through token IDs, session IDs)
False positive suppression logicAdvises suppression based on trusted IP/device combinations, remote work patterns, and device typeRequires custom correlation searches, lookups, or external context ingestion
ML signal interpretationDistinguishes why the alert triggered (ML_NEW_USER, ML_NEW_GEO_ISP) and de-risks based on identity validationSPL will just flag those risks; human/AI interpretation must be layered on top
Analyst judgmentEmulates how a human SOC analyst would reason through intent, identity, and environmentSPL doesn’t support nuanced intent modeling without external logic or ML/UEBA tooling
Output qualityClear, contextual, explainable narrative with defensive recommendationsSPL produces tabular alerts and risk scores; lacks explanation without additional dashboards or notes