Cyber Security Startup Pcysys Unveils PenTera™ 2.0, Delivering the Power of 1,000 Ethical Hackers
New Partnership will bring revolutionary machine-based Pen Testing solutions to UK Partners
TEL AVIV, Israel, Sept. 13, 2018 /PRNewswire/ — Pcysys, provider of the Automated Penetration Testing platform, announced today that it has unveiled its flagship platform, PenTera™ 2.0, to address the increasing need for a threat-oriented, cybersecurity validation solution.
Focused on the “inside” threat, PenTera changes the rules of the game by addressing the many pitfalls of manual pen-testing – namely, that it is labor and time-intensive, inconsistent, and represents a point-in-time snapshot.
The platform enables businesses to continuously validate their security defenses against the latest Advanced Persistent Threats (APT) and consistently enforce security policies across the organization.
“As the demand for increased security of our network continues to grow under pressure from both cyber attacks and regulators, the transition to automated machine-based pen-testing is inevitable,” said Chief Executive Officer of Pcysys, Amitai Ratzon. “As a result of its consistent and continuous nature, Pcycys PenTera is viewed by its customers as the ultimate IT sanitation platform, utilizing the latest exploits and hacking techniques known in the industry today.”
PenTera’s features include:
- Business disruption alerts: When a sequence of vulnerabilities and human errors could lead to a business application exploitation, the company is alerted with prioritized remedies to defend against this “game over” scenario.
- Multi-vector attacks: With the power of algorithmic pen-testing, the platform can supersede a human pen-tester’s capacity a thousand times over. It can validate large networks simultaneously, repeatedly going through all the pen-testing stages of discovery, vulnerability analysis, and exploitation.
- Exploitation checkpoints: For mission-critical systems, a company’s security officer can assume discrete control for higher-order exploitative stages. This capability serves in validating defenses against the most advanced attacks, yet selectively control the intrusiveness level practiced during pen-testing.
- Targeted scenarios: In addition to Blackbox pen-tests, the platform allows for pen-testing specific critical assets. This feature allows focusing on specific network segments and applications, as well as validate previously discovered and fixed vulnerabilities.”Becoming the risk validation standard software comes with great responsibility,” said Vice President of Products, Ran Tamir. “Our research team is working daily to model more hacker practices and techniques into the product. It’s a cyber arms race and we are determined to have our customers win and remain resilient.”
Pcysys (https://www.pcysys.com) delivers an automated Penetration-Testing platform that assesses and reduces corporate cybersecurity risks. By applying the hacker’s perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyber attacks across their organizational networks.
Aviv Cohen, CMO
The version of an MSSQL database is a valuable piece of information for cyber attackers. With the version details in hand, they can attempt to find and exploit any of the version’s known vulnerabilities. As part of our research at Pentera Labs, we attempted to obtain the version of the widely-used MSSQL (Microsoft SQL Server)...
Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has accelerated the connection of machinery to digital systems and data. Computer systems for managing and monitoring digital systems and data have been added to the hardware and software used for managing and...
Despite major investments in their security suites, organizations continue to be breached. Our Co-founder and CTO, Arik Liberzon, recently sat down with CyberNews to discuss the value of the adversarial perspective and where his inspiration from Pentera came from. Starting out, I arrived at the idea for Pentera and Automated Security Validation in a pretty...