Pcysys is proud to share its nomination as the Most Innovative Automated Penetration Testing Tool Award in the 8th Annual InfoSec Awards at #RSAC 2020. The winning platform can be viewed at the RSAC Israeli Pavilion booth #S-735/2.
SAN FRANCISCO, Feb. 24, 2020 — Pcysys is proud to share its nomination as the Most Innovative Automated Penetration Testing Tool Award in the 8th Annual InfoSec Awards at #RSAC 2020.
“We’re thrilled to receive one of the most prestigious and coveted cybersecurity awards from Cyber Defense Magazine. This is very much aligned with our business momentum and customer’s trust as the world’s automated penetration testing platform,” says Pcysys CMO, Aviv Cohen.
“Pcysys truly deserves being named ‘Most Innovative Automated Penetration Testing Tool’ for taking a bold approach to continuous security validation,” said Yan Ross, editor-at-large, Cyber Defense Magazine.
PenTera by Pcysys is a machine-based, agentless, automated penetration testing platform that scans and ethically challenges the network with the latest hacking techniques, prioritizing remediation efforts to exploitable vulnerabilities. Enterprises worldwide use PenTera to grow and strengthen their cybersecurity posture by performing on-demand penetration tests on a daily, weekly or monthly basis. The platform is compliant with the MITRE ATT&CK framework and covers many security validation use cases such as security control validation, credential strength validation, segmentation integrity, sensitive data hygiene, network equipment testing, and privileged access audits.
Join the Pcysys executive team at the RSA Conference 2020 Israeli Pavilion booth #S-735/2 to learn how you can leverage automated penetration testing to continuously test your organization’s security controls and grow your cyber resilience daily.
About Cyber Defense Magazine
With over 5 Million monthly readers and growing, and over 17,000 pages of searchable online infosec content, Cyber Defense Magazine and our sister magazine being announced after the show is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conference. CDM is a proud member of the Cyber Defense Media Group, a division of Ingersoll Lockwood. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives.
Pcysys delivers PenTera™, an automated penetration-testing platform, that assesses and reduces corporate cybersecurity risk. By applying the hacker’s perspective, our software identifies, analyzes and prioritizes remediation of cyber defense vulnerabilities. Hundreds of security professionals and service providers around the world use PenTera to perform continuous machine-based penetration tests that improve their immunity against cyber attacks across their organization networks.
WebLogic is a popular enterprise middleware tool that orchestrates the interaction between backend systems and frontend clients. This makes it a valuable tool for attackers, who can exploit it to access and influence a wide range of organizational applications. In this blog post, we explore how to install a persistent backdoor on WebLogic Server. We...
Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal Red Teams or unlimited security resources to stay on top of the latest threats. On...
We all know the culprits. Cloud adoption, remote and hybrid work arrangements and a long list of must-have technologies have led to an ever-expanding attack surface, compelling organizations to become more agile and responsive in their cyber defense. Taming this unwieldy beast seems to be on everyone’s mind as global spending on security and risk...