Pcysys Announces PenTera™ 3.0, Providing a Breakthrough in Cyber Security Penetration Testing
PenTera’s new version, 3.0, provides human-like testing of networks and infrastructure to security teams who want to focus remediation on the real threats specific to their environment.
BOSTON and TEL AVIV, Israel, /PRNewswire/ — Pcysys, provider of the PenTera™ Automated Penetration Testing platform, announced today the availability of version 3.0, enabling CISOs to validate their organizational network security daily.
Focused on network and infrastructure, PenTera creates a new category by automating a critical cybersecurity function that, until now, was delivered as an expensive manual service – penetration testing. The platform enables businesses to continuously validate their security defenses against the latest cyber attacks and exploits. The platform is also available for Consultants and MSSPs to provide more competitive penetration testing services to their customers.
“Our roadmap is driven by the use cases coming from our many enterprise customers who are finding new ways to become more efficient in their risk validation practices,” said VP Products of Pcysys, Ran Tamir. “PenTera is a digital penetration testing platform that enables CISOs to find a fresh penetration testing report for the organization on their desk every morning and better guide their decisions as a result.”
New PenTera 3.0 features include:
- Cyber resilience score: every pen-test generates a scorecard and a resilience score in critical cybersecurity areas as privileged users, password strength, lateral movement, critical (static) vulnerabilities, and endpoint security. This score helps focus remediation and governance on the areas at risk as well as prove the returns on cybersecurity technology investments
- SIEM integration: whether you run a stealthy or a noisy pen-test, the results can now be integrated into the company’s SIEM to allow the SOC operators to have a full view of both the attack flow and prevention/detection activity
- Single-method tests: algorithmic pen-testing enables the discovery of complete kill-chains involving many vulnerabilities and hacking techniques, however, sometimes a lean test of a single exploit or vulnerability is required. The new single-method tests “a-la-carte” menu enables the selection of focused attacks of interest as a pen-testing target
- Enhanced attack capabilities: new attack techniques, remote execution, payloads, and evasion methods to assure the latest hacking techniques are tested against
- Remediation portal: Wiki-like documentation to explain the insight and impact of the found vulnerabilities, recommendations for remediation and configuration, as well as the technologies available to mitigate those risks
“The incumbent vulnerability scanning approach has proven less effective in detecting and prioritizing verified kill-chain vulnerabilities,” said CMO, Aviv Cohen. “It’s time for a different approach that discovers real attack vectors and points to the minimal amount of remediation needed to cut all of these kill chains.”
Pcysys (https://www.pcysys.com) delivers an automated Penetration-Testing platform that assesses and reduces corporate cybersecurity risks. By applying the hacker’s perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyber attacks across their organizational networks.
Aviv Cohen, CMO
Related Links: https://www.pcysys.com
Despite major investments in their security suites, organizations continue to be breached. Our Co-founder and CTO, Arik Liberzon, recently sat down with CyberNews to discuss the value of the adversarial perspective and where his inspiration from Pentera came from. Starting out, I arrived at the idea for Pentera and Automated Security Validation in a pretty...
In this post, we will examine one method of encrypting data-at-rest, specifically how to achieve Data-at-Rest Encryption for MongoDB Community Edition (CE) containers through eCryptfs. Introduction Our goal at Pentera was to implement a solution that prevents data discovery upon theft when the system is offline (e.g. if a host is stolen or someone is...
After CentOS 8 was declared end-of-life (EOL), we had to find an alternative operating system (OS) for our on-premise solution, as did many other teams and organizations. Although our deployment is container-based, we still had to prepare the groundwork for different OS areas, from security patches and network modifications to installing required packages. We had...