New Partnership will bring revolutionary machine-based Pen Testing solutions to UK Partners
TEL AVIV, Israel, Sept. 13, 2018 /PRNewswire/ — Pcysys, provider of the Automated Penetration Testing platform, announced today that it has unveiled its flagship platform, PenTera™ 2.0, to address the increasing need for a threat-oriented, cybersecurity validation solution.
Focused on the “inside” threat, PenTera changes the rules of the game by addressing the many pitfalls of manual pen-testing – namely, that it is labor and time-intensive, inconsistent, and represents a point-in-time snapshot.
The platform enables businesses to continuously validate their security defenses against the latest Advanced Persistent Threats (APT) and consistently enforce security policies across the organization.
“As the demand for increased security of our network continues to grow under pressure from both cyber attacks and regulators, the transition to automated machine-based pen-testing is inevitable,” said Chief Executive Officer of Pcysys, Amitai Ratzon. “As a result of its consistent and continuous nature, Pcycys PenTera is viewed by its customers as the ultimate IT sanitation platform, utilizing the latest exploits and hacking techniques known in the industry today.”
PenTera’s features include:
- Business disruption alerts: When a sequence of vulnerabilities and human errors could lead to a business application exploitation, the company is alerted with prioritized remedies to defend against this “game over” scenario.
- Multi-vector attacks: With the power of algorithmic pen-testing, the platform can supersede a human pen-tester’s capacity a thousand times over. It can validate large networks simultaneously, repeatedly going through all the pen-testing stages of discovery, vulnerability analysis, and exploitation.
- Exploitation checkpoints: For mission-critical systems, a company’s security officer can assume discrete control for higher-order exploitative stages. This capability serves in validating defenses against the most advanced attacks, yet selectively control the intrusiveness level practiced during pen-testing.
- Targeted scenarios: In addition to Blackbox pen-tests, the platform allows for pen-testing specific critical assets. This feature allows focusing on specific network segments and applications, as well as validate previously discovered and fixed vulnerabilities.”Becoming the risk validation standard software comes with great responsibility,” said Vice President of Products, Ran Tamir. “Our research team is working daily to model more hacker practices and techniques into the product. It’s a cyber arms race and we are determined to have our customers win and remain resilient.”
Pcysys (https://www.pcysys.com) delivers an automated Penetration-Testing platform that assesses and reduces corporate cybersecurity risks. By applying the hacker’s perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyber attacks across their organizational networks.
Aviv Cohen, CMO
Why Gartner is Calling External Attack Surface Management (EASM) a Critical Functionality
External Attack Surface Management (EASM) tools are not new, but only this year has Gartner named this category as a top trend to keep an eye on in 2022. So, why does the top research & consulting firm think its time has come? The main reason is the relentless expansion of the digital footprint of...
The Good, Bad and Compromisable Aspects of Linux eBPF
2022 discoveries of new privilege escalation techniques Reading this blog will allow you to understand the eBPF mechanism and how a fairly small bug can lead to the compromise of the entire system. Executive summary Modern hacking techniques often use legitimate operating system tools for bad purposes. Such is the potential case with the common...
CVE-2022-22948: Sensitive Information Disclosure in VMware vCenter
New zero-day vulnerability joins a chain of recently discovered vulnerabilities capable of operating an end-to-end attack on ESXi. Organizations should evaluate risk and apply vCenter client patches immediately. Executive Summary Pentera Labs’ Senior Security Researcher, Yuval Lazar, discovered an Information Disclosure vulnerability impacting more than 500,000 appliances running default vCenter Server deployments. This finding is...