Pcysys Announced Winner of “Most Innovative Automated Penetration Testing Tool” Infosec RSAC Award
Pcysys is proud to share its nomination as the Most Innovative Automated Penetration Testing Tool Award in the 8th Annual InfoSec Awards at #RSAC 2020. The winning platform can be viewed at the RSAC Israeli Pavilion booth #S-735/2.
SAN FRANCISCO, Feb. 24, 2020 — Pcysys is proud to share its nomination as the Most Innovative Automated Penetration Testing Tool Award in the 8th Annual InfoSec Awards at #RSAC 2020.
“We’re thrilled to receive one of the most prestigious and coveted cybersecurity awards from Cyber Defense Magazine. This is very much aligned with our business momentum and customer’s trust as the world’s automated penetration testing platform,” says Pcysys CMO, Aviv Cohen.
“Pcysys truly deserves being named ‘Most Innovative Automated Penetration Testing Tool’ for taking a bold approach to continuous security validation,” said Yan Ross, editor-at-large, Cyber Defense Magazine.
PenTera by Pcysys is a machine-based, agentless, automated penetration testing platform that scans and ethically challenges the network with the latest hacking techniques, prioritizing remediation efforts to exploitable vulnerabilities. Enterprises worldwide use PenTera to grow and strengthen their cybersecurity posture by performing on-demand penetration tests on a daily, weekly or monthly basis. The platform is compliant with the MITRE ATT&CK framework and covers many security validation use cases such as security control validation, credential strength validation, segmentation integrity, sensitive data hygiene, network equipment testing, and privileged access audits.
Join the Pcysys executive team at the RSA Conference 2020 Israeli Pavilion booth #S-735/2 to learn how you can leverage automated penetration testing to continuously test your organization’s security controls and grow your cyber resilience daily.
About Cyber Defense Magazine
With over 5 Million monthly readers and growing, and over 17,000 pages of searchable online infosec content, Cyber Defense Magazine and our sister magazine being announced after the show is the premier source of IT Security information. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products and services in the information technology industry. We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conference. CDM is a proud member of the Cyber Defense Media Group, a division of Ingersoll Lockwood. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives.
Pcysys delivers PenTera™, an automated penetration-testing platform, that assesses and reduces corporate cybersecurity risk. By applying the hacker’s perspective, our software identifies, analyzes and prioritizes remediation of cyber defense vulnerabilities. Hundreds of security professionals and service providers around the world use PenTera to perform continuous machine-based penetration tests that improve their immunity against cyber attacks across their organization networks.
Despite major investments in their security suites, organizations continue to be breached. Our Co-founder and CTO, Arik Liberzon, recently sat down with CyberNews to discuss the value of the adversarial perspective and where his inspiration from Pentera came from. Starting out, I arrived at the idea for Pentera and Automated Security Validation in a pretty...
In this post, we will examine one method of encrypting data-at-rest, specifically how to achieve Data-at-Rest Encryption for MongoDB Community Edition (CE) containers through eCryptfs. Introduction Our goal at Pentera was to implement a solution that prevents data discovery upon theft when the system is offline (e.g. if a host is stolen or someone is...
After CentOS 8 was declared end-of-life (EOL), we had to find an alternative operating system (OS) for our on-premise solution, as did many other teams and organizations. Although our deployment is container-based, we still had to prepare the groundwork for different OS areas, from security patches and network modifications to installing required packages. We had...