New Partnership will bring revolutionary machine-based Pen Testing solutions to UK Partners
TEL AVIV, Israel, Sept. 13, 2018 /PRNewswire/ — Pcysys, provider of the Automated Penetration Testing platform, announced today that it has unveiled its flagship platform, PenTera™ 2.0, to address the increasing need for a threat-oriented, cybersecurity validation solution.
Focused on the “inside” threat, PenTera changes the rules of the game by addressing the many pitfalls of manual pen-testing – namely, that it is labor and time-intensive, inconsistent, and represents a point-in-time snapshot.
The platform enables businesses to continuously validate their security defenses against the latest Advanced Persistent Threats (APT) and consistently enforce security policies across the organization.
“As the demand for increased security of our network continues to grow under pressure from both cyber attacks and regulators, the transition to automated machine-based pen-testing is inevitable,” said Chief Executive Officer of Pcysys, Amitai Ratzon. “As a result of its consistent and continuous nature, Pcycys PenTera is viewed by its customers as the ultimate IT sanitation platform, utilizing the latest exploits and hacking techniques known in the industry today.”
PenTera’s features include:
- Business disruption alerts: When a sequence of vulnerabilities and human errors could lead to a business application exploitation, the company is alerted with prioritized remedies to defend against this “game over” scenario.
- Multi-vector attacks: With the power of algorithmic pen-testing, the platform can supersede a human pen-tester’s capacity a thousand times over. It can validate large networks simultaneously, repeatedly going through all the pen-testing stages of discovery, vulnerability analysis, and exploitation.
- Exploitation checkpoints: For mission-critical systems, a company’s security officer can assume discrete control for higher-order exploitative stages. This capability serves in validating defenses against the most advanced attacks, yet selectively control the intrusiveness level practiced during pen-testing.
- Targeted scenarios: In addition to Blackbox pen-tests, the platform allows for pen-testing specific critical assets. This feature allows focusing on specific network segments and applications, as well as validate previously discovered and fixed vulnerabilities.”Becoming the risk validation standard software comes with great responsibility,” said Vice President of Products, Ran Tamir. “Our research team is working daily to model more hacker practices and techniques into the product. It’s a cyber arms race and we are determined to have our customers win and remain resilient.”
Pcysys (https://www.pcysys.com) delivers an automated Penetration-Testing platform that assesses and reduces corporate cybersecurity risks. By applying the hacker’s perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyber attacks across their organizational networks.
Aviv Cohen, CMO
Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often under various leadership teams with different priorities and goals. As those technologies age, they can leave your organization vulnerable to cyber threats. While replacing legacy...
LOLBAS (Living Off the Land Binaries And Scripts) is an attack method that uses binaries and scripts that are already part of the system for malicious purposes. This makes it hard for security teams to distinguish between legitimate and malicious activities, since they are all performed by trusted system utilities. Since LOLBAS are one of...
The rapid pace of technological advancements constantly create new attack vectors and attack surfaces. Consequently, it is critical to constantly stay up-to-date on new changes, in addition to revisiting older technologies and previously identified attack surfaces to ensure that proper security protocols were put in place. As part of Pentera Labs’ mission, we aim to...