{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"ru":"I use it","_type":"localeString","en":"I use it"},"roi-calculator":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"_type":"localeString","en":"Hide","ru":"Скрыть"},"supplier-popover":{"_type":"localeString","en":"supplier","ru":"поставщик"},"implementation-popover":{"ru":"внедрение","_type":"localeString","en":"deployment"},"manufacturer-popover":{"en":"manufacturer","ru":"производитель","_type":"localeString"},"short-description":{"ru":"Краткое описание","_type":"localeString","en":"Pitch"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"description":{"ru":"Описание","_type":"localeString","en":"Description"},"product-features":{"_type":"localeString","en":"Product features","ru":"Особенности продукта"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"solutions":{"ru":"Проблемы которые решает","_type":"localeString","en":" Problems that solves"},"values":{"ru":"Ценности","_type":"localeString","en":"Values"},"сomparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнения","_type":"localeString"},"testing":{"ru":"Тестирование","_type":"localeString","en":"Testing"},"compare":{"ru":"Сравнить с конкурентами","_type":"localeString","en":"Compare with competitors"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"en":"Transaction Features","ru":"Особенности сделки","_type":"localeString"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"en":"Deal protection","ru":"Защита сделки","_type":"localeString"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"en":"Login","ru":"Войти","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"to-know-more":{"en":"To know more","ru":"Чтобы узнать больше","_type":"localeString"},"scheme":{"en":" Scheme of work","ru":"Схема работы","_type":"localeString"},"competitive-products":{"en":" Competitive products","ru":"Конкурентные продукты","_type":"localeString"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"en":"User features","ru":"Особенности пользователей","_type":"localeString"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"en":"Organizational Features","ru":"Организационные особенности","_type":"localeString"},"calculate-price":{"ru":"Рассчитать цену продукта","_type":"localeString","en":" Calculate product price"},"selling-stories":{"en":" Selling stories","ru":"Продающие истории","_type":"localeString"},"materials":{"ru":"Материалы","_type":"localeString","en":"Materials"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"ru":"или","_type":"localeString","en":"or"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"en":"Calculate Product ROI","ru":"Рассчитать ROI продукта","_type":"localeString"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"_type":"localeString","en":"Program Receives Data"},"rebate":{"ru":"Бонус","_type":"localeString","en":"Bonus"},"rebate-for-poc":{"ru":"Бонус 4 POC","_type":"localeString","en":"Bonus 4 POC"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"ru":"тут","_type":"localeString","en":"here"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"ru":"пользователь","_type":"localeString","en":"user"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString","en":"You have to register or login."},"add-to-comparison":{"en":"Add to comparison","ru":"Добавить в сравнение","_type":"localeString"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"ru":"Рассчитайте ROI для данного продукта","_type":"localeString","en":"Calculate ROI for this product here"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"_type":"localeString","en":"Vendor verified","ru":"Подтверждено производителем"},"event-schedule":{"_type":"localeString","en":"Events schedule","ru":"Расписание событий"},"scheduling-tip":{"en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString"},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнений","_type":"localeString"},"compare-with-competitive":{"ru":"Сравнить с конкурентными","_type":"localeString","en":" Compare with competitive"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"en":"Current feature is still developing to become even more useful for you.","ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString"},"product-presentation":{"en":"Product presentation","ru":"Презентация продукта","_type":"localeString"},"go-to-comparison-table":{"ru":"Перейти к таблице сравнения","_type":"localeString","en":" Go to comparison table"},"see-product-details":{"_type":"localeString","en":"See Details","ru":"Детали"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"ru":"Вход","_type":"localeString","en":"Log in","de":"Einloggen"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"en":"FAQ","de":"FAQ","ru":"FAQ","_type":"localeString"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"for-suppliers":{"en":"For suppliers","ru":"Поставщикам","_type":"localeString"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"en":"My account","ru":"Мой кабинет","_type":"localeString"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"en":"Enter your search term","ru":"Введите поисковый запрос","_type":"localeString"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"_type":"localeString","en":"About Us"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"en":"Create an avatar for the event","_type":"localeString"},"catalogs_new":{"en":"Products","_type":"localeString"},"b4reference":{"en":"Bonus4Reference","_type":"localeString"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"en":"Find and compare IT products","_type":"localeString"},"it_implementations":{"en":"Learn implementation reviews","_type":"localeString"},"it_companies":{"en":"Find vendor and company-supplier","_type":"localeString"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"en":"About us","de":"Über uns","ru":"О нас","_type":"localeString"},"infocenter":{"de":"Infocenter","ru":"Инфоцентр","_type":"localeString","en":"Infocenter"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"ru":"Продукты","_type":"localeString","en":"Products","de":"Produkte"},"compare":{"_type":"localeString","en":"Pick and compare","de":"Wähle und vergleiche","ru":"Подобрать и сравнить"},"calculate":{"_type":"localeString","en":"Calculate the cost","de":"Kosten berechnen","ru":"Расчитать стоимость"},"get_bonus":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt"},"salestools":{"_type":"localeString","en":"Salestools","de":"Salestools","ru":"Salestools"},"automatization":{"de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix"},"b4r":{"en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString"},"our_social":{"en":"Our social networks","de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString"},"subscribe":{"de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString","en":"Subscribe to newsletter"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"en":"Privacy Policy","ru":"Политика конфиденциальности","_type":"localeString"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"_type":"localeString","en":"we pay for content","ru":"платим за контент"},"categories":{"en":"categories","ru":"категории","_type":"localeString"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"en":"We send a digest of actual news from the IT world once in a month!","ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString"},"subscribe__email-label":{"en":"Email","ru":"Email","_type":"localeString"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"ru":"Это поле обязательное","_type":"localeString","en":"This field is required"},"subscribe__notify-label":{"_type":"localeString","en":"Yes, please, notify me about news, events and propositions","ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях"},"subscribe__agree-label":{"_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data","ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты","_type":"localeString"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"_type":"localeString","en":"Subscription is unsuccessful. Please, try again later.","ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"ru":"Главная","_type":"localeString","en":"Home"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString"}},"comment-form":{"title":{"en":"Leave comment","ru":"Оставить комментарий","_type":"localeString"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"en":"Company name","ru":"Компания","_type":"localeString"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"_type":"localeString","en":"Received ROI","ru":"Полученный ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"en":"Comment","ru":"Комментарий","_type":"localeString"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"translatable_meta":[{"translations":{"_type":"localeString","en":"Example product","ru":"Конкретный продукт"},"name":"og:title"},{"name":"og:description","translations":{"ru":"Описание для конкретного продукта","_type":"localeString","en":"Description for one product"}},{"name":"title","translations":{"ru":"Продукт","_type":"localeString","en":"Product"}},{"name":"description","translations":{"en":"Product description","ru":"Описание продукта","_type":"localeString"}},{"translations":{"_type":"localeString","en":"Product keywords","ru":"Ключевые слова продукта"},"name":"keywords"}],"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"cymulate-bas":{"id":6245,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/cymulate_logo.png","logo":true,"scheme":false,"title":"Cymulate BAS","vendorVerified":0,"rating":"1.80","implementationsCount":3,"suppliersCount":0,"supplierPartnersCount":0,"alias":"cymulate-bas","companyTitle":"Cymulate","companyTypes":["vendor"],"companyId":8254,"companyAlias":"cymulate","description":"Cymulate automatically identifies security gaps in one click and tells you exactly how to fix them. Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time and empowers companies to safeguard their business-critical assets. With just a few clicks, Cymulate challenges your security controls by initiating thousands of attack simulations, showing you exactly where you’re exposed and how to fix it, making security continuous, fast and part of everyday activities.\r\nCymulate runs quietly in the background without slowing down your business activities. Deploy a single lightweight agent to start running unlimited attack simulations. The easy to use interface makes it simple to understand your security posture.<br /><br />\r\n<span style=\"font-weight: bold;\">Cymulate products</span>\r\n<span style=\"font-weight: bold;\">Full Kill-Chain APT </span><br />Since an Advanced Persistent Threat (APT) attempts to bypass security controls across the cyber kill chain, from attack delivery to exploitation and post-exploitation, defending against an APT requires testing the effectiveness of multiple security controls within your arsenal. Since the efficacy of one control affects the exposure of the next control in the kill chain, ascertaining if your defenses work against a full-blown attack becomes a daunting proposition.\r\nCymulate’s Full Kill-Chain APT Simulation Module solves the challenge of security effectiveness testing across the entire cyber kill chain by instrumenting your security framework in a comprehensive and easy-to-use manner. Instead of challenging each attack vector separately, organizations can now run a simulation of a full-scale APT attack with a click of a button, and gain a convenient, single-pane view of security gaps across their arsenal.<br /><br /><span style=\"font-weight: bold;\">Email Gateway</span>\r\nThis vector is designed to evaluate your organization’s email security and potential exposure to a number of malicious payloads sent by email. The simulated attack exposes critical vulnerabilities within the email security framework. By sending emails with attachments containing ransomware, worms, Trojans, or links to malicious websites, the simulation reveals if simulated malicious emails could bypass your organizations’ first line of defense and reach your employees’ inbox. After running a simulation, the next step would be to test employees’ security awareness regarding socially engineered emails that try to lure them into opening malicious attachments, disclosing their credentials or clicking on malicious links.\r\nThe simulation results are presented in an easy-to-understand comprehensive report. Mitigation recommendations are offered for each security gap discovered depending on the type of attack simulated, and how far the threat has managed to bypass security controls and distribute itself, enabling IT and security teams to take the appropriate countermeasures.<br /><br /><span style=\"font-weight: bold;\">Web Gateway</span>\r\nCymulate’s Web Gateway cyber attack simulation vector is designed to evaluate your organization’s inbound and outbound exposure to malicious or compromised websites and current capabilities to analyze any inbound traffic. It enables you to verify your organization’s exposure to an extensive and continuously growing database of malicious and compromised websites. Immediate, actionable simulation results enable IT and security teams to identify security gaps, prioritize remediation and take corrective measures to reduce your organization’s attack surface.<br /><br /><span style=\"font-weight: bold;\">Web Application Firewall</span>\r\nWAF (Web Application Firewall) vector challenges your WAF security resilience to web payloads and assists in protecting your web apps from future attacks. With Cymulate’s WAF attack simulation, you can check if your WAF configuration, implementation and features are able to block payloads before they get anywhere near your web applications. The platform simulates an attacker who tries to bypass your organization’s WAF and reaches the web application, after which they attempt to perform malicious actions such as mining sensitive information, inflicting damage and forwarding users to infected websites using applicative attacks such as cross-site scripting (XSS), SQL and command injections.\r\nAt the end of each WAF attack simulation, or other simulation vector, a Cymulate Risk Score is provided, indicating the organization’s exposure, along with other KPI metrics and actionable guidelines to fine-tune controls and close security gaps.<br /><br /><span style=\"font-weight: bold;\">Phishing Awareness</span>\r\nThis vector helps companies asses their employees' awareness to socially engineered attack campaigns. Cymulate’s Phishing Awareness vector is designed to evaluate your employees’ security awareness. It simulates phishing campaigns and detects weak links in your organization. Since it is designed to reduce the risk of spear-phishing, ransomware or CEO fraud, the solution can help you to deter data breaches, minimize malware-related downtime and save money on incident response.\r\nSecurity awareness among employees is tested by creating and executing simulated, customized phishing campaigns enabling you to detect who are the weakest links in your organization. The phishing simulation utilizes ready-made out-of-the-box templates or custom-built templates assigned to a corresponding landing page with dummy malicious links. At the end of the simulation, a report is generated summarizing statistics and details of employees who have opened the email, and those who have clicked on the dummy malicious link, enabling organizations to assess their employees’ readiness to identify hazardous email.<br /><br /><span style=\"font-weight: bold;\">Endpoint Security </span>\r\nCymulate’s Endpoint Security vector allows organizations to deploy and run simulations of ransomware, Trojans, worms, and viruses on a dedicated endpoint in a controlled and safe manner. The attacks simulation ascertains if the security products are tuned properly and are actually protecting your organization’s critical assets against the latest attack methods. The comprehensive testing covers all aspects of endpoint security, including but not limited to: behavioral detection, virus detection, and known vulnerabilities.\r\nThe endpoint attack simulation results offer immediate, actionable results, including Cymulate’s risk score, KPI metrics, remediation prioritization and technical and executive-level reporting.<br /><br /><span style=\"font-weight: bold;\">Lateral Movement</span>\r\nLateral Movement (Hopper) vector challenges companies internal networks against different techniques and methods used by attackers to gain access and control additional systems on a network, following the initial compromise of single system. Cymulate’s Lateral Movement vector simulates a compromised workstation inside the organization and exposes the risk posed by a potential cyberattack or threat. Various techniques and methods are used to laterally move inside the network.\r\nThe platform uses a sophisticated and effective algorithm to mimic all the common and clever techniques that the most skilled hackers use to move around inside the network.\r\nThe Hopper attack simulation results are presented in an interactive graphic diagram that shows the attacker’s lateral movement path, along with Cymulate’s risk score, KPI metrics and actionable mitigation recommendations. By taking corrective action, IT and security teams can take the appropriate countermeasures to increase their internal network security.<br /><br /><span style=\"font-weight: bold;\">Data Exfiltration </span>\r\nThe vector challenges company's Data Loss Prevention (DLP) controls, enabling company to assess the security of outbound critical data before company sensitive information is exposed. The Data Exfiltration vector is designed to evaluate how well your DLP solutions and controls prevent any extraction of critical information from outside the organization. The platform tests the outbound flows of data (such as personally identifiable (PII), medical, financial and confidential business information) to validate that those information assets stay indoors.\r\nThe attack simulation results are presented in a comprehensive and easy-to-use format, allowing organizations to understand their DLP-related security gaps and take the appropriate measures using actionable mitigation recommendations.<br /><br /><span style=\"font-weight: bold;\">Immediate Threat Intelligence </span><br />Cymulate’s Immediate Threat Intelligence vector is designed to inform and evaluate your organization’s security posture as quickly as possible against the very latest cyber attacks. The simulation is created by the Cymulate Research Lab which catches and analyzes threats immediately after they are launched by cybercriminals and malicious hackers.\r\nBy running this simulation, you can validate within a short time if your organization would be vulnerable to these latest threats and take measures before an attack takes place.\r\nThe simulation results are presented in an easy-to-understand comprehensive report. Mitigation recommendations are offered for each threat that has been discovered, and vary according to the type of attack simulated, and the extent to which the attack was able to distribute itself. This allows the organization to truly understand its security posture and take action to improve or update controls where necessary.","shortDescription":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button.","type":"Software","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cymulate BAS","keywords":"","description":"Cymulate automatically identifies security gaps in one click and tells you exactly how to fix them. Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time and empowe","og:title":"Cymulate BAS","og:description":"Cymulate automatically identifies security gaps in one click and tells you exactly how to fix them. Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time and empowe","og:image":"https://old.roi4cio.com/fileadmin/user_upload/cymulate_logo.png"},"eventUrl":"","translationId":6247,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":895,"title":"Breach and Attack Simulation Platforms","alias":"breach-and-attack-simulation-platforms","description":"<span style=\"font-weight: bold;\">Breach and attack simulations</span> are an advanced computer security testing method. These simulations identify vulnerabilities in security environments by mimicking the likely attack paths and techniques used by malicious actors. In this sense, a breach and attack simulation acts much like a continuous, automated penetration test, and it improves upon the inherent limitations of red and blue team testing.\r\nGartner defines BAS technologies as tools “that allow enterprises to continually and consistently simulate the full attack cycle (including insider threats, lateral movement, and data exfiltration) against enterprise infrastructure, using software agents, virtual machines, and other means”.\r\nWhat makes BAS special, is its ability to provide continuous and consistent testing at limited risk and that it can be used to alert IT and business stakeholders about existing gaps in the security posture or validate that security infrastructure, configuration settings and detection/prevention technologies are operating as intended. BAS can also assist in validating if security operations and the SOC staff can detect specific attacks when used as a complement to the red team or penetration testing exercises.\r\n<span style=\"font-weight: bold;\">There are three different types of BAS solutions:</span>\r\n<ul><li><span style=\"font-weight: bold;\">Agent-based BAS</span> solutions are the simplest form of BAS. Agents are deployed across the LAN and vulnerabilities are identified to determine which routes are open to a potential attacker to move around the network. An agent-based BAS solution is very similar to vulnerability scanning but offers much more context.</li><li><span style=\"font-weight: bold;\">BAS solutions based on “malicious” traffic.</span> These BAS solutions generate intrusive traffic within the network between dedicated virtual machines that serve as targets for a wide range of attack scenarios. An overview is then created of which events have not been detected and blocked by the company’s own security controls. </li><li><span style=\"font-weight: bold;\">Cloud-based BAS solutions.</span> BAS solutions that are cloud-based are the closest to a real attack. They simulate numerous attack scenarios from the outside via different entry points. (so-called multi-vector attacks) and thus also the network perimeter of the company. The cloud platforms are fed with the latest threats from a wide variety of sources and are therefore always very up-to-date. Being SaaS solutions, they can be implemented very quickly.</li></ul>\r\nBy running these cyber-attack simulations in a controlled environment, an advanced BAS platform can identify vulnerabilities and gaps and then provide prioritized recommendations to help quickly close them. In this sense, a BAS platform works much like a purple team, allowing for comprehensive vulnerability assessment and remediation. Yet unlike a purple team, a BAS platform is automated and can be deployed remotely, making it especially well-suited to today’s challenges.\r\nThis automation is the key to maintaining continuous risk assessment and threat mitigation — the gold standard for today’s cybersecurity solutions.<br /><br />","materialsDescription":"<h1 class=\"align-center\">What problems do BAS tools attempt to solve?</h1>\r\nBAS solutions give companies an answer to the question “Do our cybersecurity programs really work? Large companies invest heavily in security products, but still do not have the confidence that they can withstand increasingly sophisticated attacks. For financial and practical reasons it is also not possible to test entire enterprise production environments permanently and manually for security vulnerabilities. Breach and Attack Simulation fills exactly this gap and allows companies to get more out of their existing security solutions by enabling continuous testing of the enterprise network at low risk.\r\n<h1 class=\"align-center\">For which companies are BAS solutions suitable?</h1>\r\nIf you have a look around the BAS market, you will find that many offers are tailored to large enterprise customers with high security requirements, such as financial institutions and insurance companies. It is not surprising that Breach and Attack Simulation is especially interesting for this kind of companies. They typically have numerous security products in use, a dynamic IT landscape and a high level of IT maturity. In addition, there are high demands on IT security and high compliance pressure. High-end solutions like Breach and Attack Simulation are predestined for this environment.<br />However, there is also the possibility for smaller companies to use BAS technology. Some solution providers have made their BAS tools multi-tenant ready so that smaller companies can also benefit from them via partner companies.\r\n<h1 class=\"align-center\">How to Evaluate a BAS Platform?</h1>\r\n<ul><li>The right BAS platform can simulate attacks in the cloud, identifying misconfigurations and other security gaps, while also allowing organizations to determine if critical assets are truly secure in all environments.</li><li>The ability to identify gaps in detection and prevention in hybrid environments is another key feature. As more data migrates to the cloud, it’s imperative that organizations assess their risk posture and understand how new hybrid environments can be attacked from on-premises devices linked to cloud data. Assessing cloud and on-premises risks separately leads to reduced visibility and expanded threat exposure — you simply don’t know how each side effects the other.</li><li>An advanced BAS platform can safely simulate Advanced Persistent Threats (APTs) against an organization’s “crown jewel” assets. Networks and devices create many pathways for APTs and identifying them is important.</li><li>The right platform can also identify a wide range of attack vectors hackers can exploit, while running safely in a production environment. Testing security controls on an endpoint solution might tell you if you can stop a credential dump but will not tell you which accounts can be harvested, from which devices and the impact those accounts will have.</li><li>Organizations should also look for a BAS solution that offered prioritized remediation of security gaps and validation of security controls.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hacking.png"}],"characteristics":[],"concurentProducts":[{"id":3655,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/rapid7.png","logo":true,"scheme":false,"title":"Rapid7 insightVM","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":2,"alias":"rapid7-insightvm","companyTitle":"Rapid7","companyTypes":["supplier","vendor"],"companyId":210,"companyAlias":"rapid7","description":"InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pinpoint their location, prioritize them for your business, facilitate collaboration with other teams, and confirm your exposure has been reduced<br /><br /><span style=\"font-weight: bold;\">Secure Your Modern Network</span>\r\nAdapt to your modern network with full visibility of your ecosystem, prioritization of risk using attacker-based analytics, and SecOps-powered remediation. Pair that with unparalleled, ongoing research of the attacker mindset, and you’ll be ready to act before impact.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Collect Data Across Your Ecosystem</span></span>\r\n• Continuous Endpoint Monitoring Using the Insight Agent\r\nThe Rapid7 Insight Agent automatically collects data from all your endpoints, even those from remote workers and sensitive assets that cannot be actively scanned, or that rarely join the corporate network. Pair InsightVM with Rapid7 InsightIDR to get a complete picture of the risks posed by your endpoints and their users.\r\n• Liveboards, Not Static Dashboards\r\nDrawing from fresh vulnerability data, InsightVM Liveboards are live and interactive by nature. You can easily create custom, tailored cards and full dashboards for anyone—from sysadmins to CISOs—and query each card with simple language to track progress of your security program. Visualize, prioritize, assign, and fix your exposures more easily than ever before.\r\n• Cloud, Virtual, and Container Assessment\r\nInsightVM integrates with cloud services, virtual infrastructure, and container repositories like Amazon Web Services, Microsoft Azure, and VMware to make sure you don’t miss any new instances and Docker containers that are brought online. You can also correlate deployed containers to assets, so you can secure both containers and container hosts—all at no additional cost.<br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\"><br />Prioritize Using Attacker Analytics</span></span>\r\n• Attacker-Based Risk Analysis\r\nPrioritize risk the way attackers would. InsightVM translates decades of attacker knowledge into proven analytics. The granular, 1-1000 Real Risk score takes into account CVSS scores, malware exposure, exploit exposure and ease of use, and vulnerability age. This makes it simpler—and more precise than CVSS alone—to prioritize vulnerabilities for remediation. Rapid7 Project Sonar data and threat feeds translate to dashboards within InsightVM, so you can understand which external network doors you’re missing and which vulnerabilities attackers are actively exploiting.\r\n• Live Remediation Planning\r\nOnce the most critical vulnerabilities are brought to the surface, assign and track remediation duties in real time with Remediation Workflows. InsightVM integrates with IT ticketing solutions like Atlassian Jira and ServiceNow, making it easy for IT to take action. InsightVM also integrates with Rapid7 InsightConnect, our security orchestration and automation platform, to bring automation and prioritization to the patching process.<br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Remediate with SecOps Agility</span></span>\r\nTo move faster and more securely, you need to go beyond scanning in silos. InsightVM is built to enable collaboration with IT operations and developers through shared visibility, analytics, and automation. What does this look like in practice? InsightVM integrates with IT’s existing workflows and ticketing systems to provide remediation instructions with context, thus accelerating remediation, and provides actionable reporting on program progress for every audience—from IT and compliance to the C-Suite. On the development side of the house, InsightVM lets you assess containers to ensure services are secure before they go into production, and the Rapid7 Insight Agent helps infrastructure teams automatically assess new cloud infrastructure as soon as it goes live.","shortDescription":"RAPID7 insightVM is an advanced vulnerability management analytics and reporting","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Rapid7 insightVM","keywords":"","description":"InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pin","og:title":"Rapid7 insightVM","og:description":"InsightVM provides a fully available, scalable, and efficient way to collect your vulnerability data, turn it into answers, and minimize risk. InsightVM leverages the latest analytics and endpoint technology to discover vulnerabilities in a real-time view, pin","og:image":"https://old.roi4cio.com/fileadmin/user_upload/rapid7.png"},"eventUrl":"","translationId":3656,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":79,"title":"VM - Vulnerability management","alias":"vm-vulnerability-management","description":"Vulnerability management is the "cyclical practice of identifying, classifying, prioritizing, remediating and mitigating" software vulnerabilities. Vulnerability management is integral to computer security and network security, and must not be confused with a Vulnerability assessment.\r\nVulnerability management is an ongoing process that includes proactive asset discovery, continuous monitoring, mitigation, remediation and defense tactics to protect your organization's modern IT attack surface from Cyber Exposure.\r\nVulnerabilities can be discovered with a vulnerability scanner, which analyzes a computer system in search of known vulnerabilities, such as open ports, insecure software configurations, and susceptibility to malware infections. They may also be identified by consulting public sources, such as NVD, or subscribing to a commercial vulnerability alerting services. Unknown vulnerabilities, such as a zero-day, may be found with fuzz testing, which can identify certain kinds of vulnerabilities, such as a buffer overflow with relevant test cases. Such analysis can be facilitated by test automation. In addition, antivirus software capable of heuristic analysis may discover undocumented malware if it finds software behaving suspiciously (such as attempting to overwrite a system file).\r\nCorrecting vulnerabilities may variously involve the installation of a patch, a change in network security policy, reconfiguration of software, or educating users about social engineering.\r\nNetwork vulnerabilities represent security gaps that could be abused by attackers to damage network assets, trigger a denial of service, and/or steal potentially sensitive information. Attackers are constantly looking for new vulnerabilities to exploit — and taking advantage of old vulnerabilities that may have gone unpatched.\r\nHaving a vulnerability management framework in place that regularly checks for new vulnerabilities is crucial for preventing cybersecurity breaches. Without a vulnerability testing and patch management system, old security gaps may be left on the network for extended periods of time. This gives attackers more of an opportunity to exploit vulnerabilities and carry out their attacks.\r\nOne statistic that highlights how crucial vulnerability management was featured in an Infosecurity Magazine article. According to survey data cited in the article, of the organizations that “suffered a breach, almost 60% were due to an unpatched vulnerability.” In other words, nearly 60% of the data breaches suffered by survey respondents could have been easily prevented simply by having a vulnerability management plan that would apply critical patches before attackers leveraged the vulnerability.","materialsDescription":" <span style=\"font-weight: bold;\">What is vulnerability management?</span>\r\nVulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design compromise the security of an endpoint or network.\r\n<span style=\"font-weight: bold;\">What processes does vulnerability management include?</span>\r\nVulnerability management processes include:\r\n<ul><li><span style=\"font-style: italic;\">Checking for vulnerabilities:</span> This process should include regular network scanning, firewall logging, penetration testing or use of an automated tool like a vulnerability scanner.</li><li><span style=\"font-style: italic;\">Identifying vulnerabilities:</span> This involves analyzing network scans and pen test results, firewall logs or vulnerability scan results to find anomalies that suggest a malware attack or other malicious event has taken advantage of a security vulnerability, or could possibly do so.</li><li><span style=\"font-style: italic;\">Verifying vulnerabilities:</span> This process includes ascertaining whether the identified vulnerabilities could actually be exploited on servers, applications, networks or other systems. This also includes classifying the severity of a vulnerability and the level of risk it presents to the organization.</li><li><span style=\"font-style: italic;\">Mitigating vulnerabilities:</span> This is the process of figuring out how to prevent vulnerabilities from being exploited before a patch is available, or in the event that there is no patch. It can involve taking the affected part of the system off-line (if it's non-critical), or various other workarounds.</li><li><span style=\"font-style: italic;\">Patching vulnerabilities:</span> This is the process of getting patches -- usually from the vendors of the affected software or hardware -- and applying them to all the affected areas in a timely way. This is sometimes an automated process, done with patch management tools. This step also includes patch testing.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VM_-_Vulnerability_management1.png"},{"id":895,"title":"Breach and Attack Simulation Platforms","alias":"breach-and-attack-simulation-platforms","description":"<span style=\"font-weight: bold;\">Breach and attack simulations</span> are an advanced computer security testing method. These simulations identify vulnerabilities in security environments by mimicking the likely attack paths and techniques used by malicious actors. In this sense, a breach and attack simulation acts much like a continuous, automated penetration test, and it improves upon the inherent limitations of red and blue team testing.\r\nGartner defines BAS technologies as tools “that allow enterprises to continually and consistently simulate the full attack cycle (including insider threats, lateral movement, and data exfiltration) against enterprise infrastructure, using software agents, virtual machines, and other means”.\r\nWhat makes BAS special, is its ability to provide continuous and consistent testing at limited risk and that it can be used to alert IT and business stakeholders about existing gaps in the security posture or validate that security infrastructure, configuration settings and detection/prevention technologies are operating as intended. BAS can also assist in validating if security operations and the SOC staff can detect specific attacks when used as a complement to the red team or penetration testing exercises.\r\n<span style=\"font-weight: bold;\">There are three different types of BAS solutions:</span>\r\n<ul><li><span style=\"font-weight: bold;\">Agent-based BAS</span> solutions are the simplest form of BAS. Agents are deployed across the LAN and vulnerabilities are identified to determine which routes are open to a potential attacker to move around the network. An agent-based BAS solution is very similar to vulnerability scanning but offers much more context.</li><li><span style=\"font-weight: bold;\">BAS solutions based on “malicious” traffic.</span> These BAS solutions generate intrusive traffic within the network between dedicated virtual machines that serve as targets for a wide range of attack scenarios. An overview is then created of which events have not been detected and blocked by the company’s own security controls. </li><li><span style=\"font-weight: bold;\">Cloud-based BAS solutions.</span> BAS solutions that are cloud-based are the closest to a real attack. They simulate numerous attack scenarios from the outside via different entry points. (so-called multi-vector attacks) and thus also the network perimeter of the company. The cloud platforms are fed with the latest threats from a wide variety of sources and are therefore always very up-to-date. Being SaaS solutions, they can be implemented very quickly.</li></ul>\r\nBy running these cyber-attack simulations in a controlled environment, an advanced BAS platform can identify vulnerabilities and gaps and then provide prioritized recommendations to help quickly close them. In this sense, a BAS platform works much like a purple team, allowing for comprehensive vulnerability assessment and remediation. Yet unlike a purple team, a BAS platform is automated and can be deployed remotely, making it especially well-suited to today’s challenges.\r\nThis automation is the key to maintaining continuous risk assessment and threat mitigation — the gold standard for today’s cybersecurity solutions.<br /><br />","materialsDescription":"<h1 class=\"align-center\">What problems do BAS tools attempt to solve?</h1>\r\nBAS solutions give companies an answer to the question “Do our cybersecurity programs really work? Large companies invest heavily in security products, but still do not have the confidence that they can withstand increasingly sophisticated attacks. For financial and practical reasons it is also not possible to test entire enterprise production environments permanently and manually for security vulnerabilities. Breach and Attack Simulation fills exactly this gap and allows companies to get more out of their existing security solutions by enabling continuous testing of the enterprise network at low risk.\r\n<h1 class=\"align-center\">For which companies are BAS solutions suitable?</h1>\r\nIf you have a look around the BAS market, you will find that many offers are tailored to large enterprise customers with high security requirements, such as financial institutions and insurance companies. It is not surprising that Breach and Attack Simulation is especially interesting for this kind of companies. They typically have numerous security products in use, a dynamic IT landscape and a high level of IT maturity. In addition, there are high demands on IT security and high compliance pressure. High-end solutions like Breach and Attack Simulation are predestined for this environment.<br />However, there is also the possibility for smaller companies to use BAS technology. Some solution providers have made their BAS tools multi-tenant ready so that smaller companies can also benefit from them via partner companies.\r\n<h1 class=\"align-center\">How to Evaluate a BAS Platform?</h1>\r\n<ul><li>The right BAS platform can simulate attacks in the cloud, identifying misconfigurations and other security gaps, while also allowing organizations to determine if critical assets are truly secure in all environments.</li><li>The ability to identify gaps in detection and prevention in hybrid environments is another key feature. As more data migrates to the cloud, it’s imperative that organizations assess their risk posture and understand how new hybrid environments can be attacked from on-premises devices linked to cloud data. Assessing cloud and on-premises risks separately leads to reduced visibility and expanded threat exposure — you simply don’t know how each side effects the other.</li><li>An advanced BAS platform can safely simulate Advanced Persistent Threats (APTs) against an organization’s “crown jewel” assets. Networks and devices create many pathways for APTs and identifying them is important.</li><li>The right platform can also identify a wide range of attack vectors hackers can exploit, while running safely in a production environment. Testing security controls on an endpoint solution might tell you if you can stop a credential dump but will not tell you which accounts can be harvested, from which devices and the impact those accounts will have.</li><li>Organizations should also look for a BAS solution that offered prioritized remediation of security gaps and validation of security controls.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hacking.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3928,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/xm_cyber.png","logo":true,"scheme":false,"title":"XM Cyber HaXM","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"xm-cyber-haxm","companyTitle":"XM Cyber","companyTypes":["supplier","vendor"],"companyId":5594,"companyAlias":"xm-cyber","description":"HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic APT experience on one hand while delivering vital prioritized remediation on the other. Addressing real user behavior and exploits, the full spectrum of scenarios is aligned to your organization’s own network to expose blind spots and is executed using the most up-to-date attack techniques safely, without affecting network availability and user experience.\r\n<b><i>Safeguard your critical assets</i></b>\r\n<b>Always know the attack paths </b>\r\n<ul> <li>Continuously identifies attack vectors to your target assets 24×7 </li> <li>Prioritizes actionable remediation </li> </ul>\r\n<b>Reduce your IT Hygiene risk</b>\r\n<ul> <li>Provides significant IT hygiene lift </li> <li>Drives down IT security risk </li> </ul>\r\n<b>Optimize your cyber resources</b>\r\n<ul> <li>Cost-effectively optimizes your cyber resources </li> <li>Runs risk score formula to quantify impact of breaches </li> </ul>\r\n<b>Make data-driven decisions</b>\r\n<ul> <li>Measures attack critically then follows up with actionable remediation </li> <li>Reports justify security investment </li> </ul>\r\n<b><i>The XM Cyber Approach </i></b>\r\nHarnessing purple team power, HaXM by XM continuously optimizes red and blue team capabilities to expedite the entire exposure, assessment and remediation cycle and improve your security posture. Adopting a 360° end-to-end identification to remediation cycle, HaXM addresses your organization’s distinct network environment and user behavior 24×7. \r\n<b><i>The XM Cyber Technology </i></b>\r\nXM Cyber’s patented technology features proprietary algorithms that account for the most up-to-date attack techniques, endless customer specific scenarios and the human factor to perform advanced APT on the attack path to your critical assets. We use the latest simulation and assessment techniques to provide immediate validation of your security posture. \r\n<b><i>The XM Cyber Team </i></b>\r\nXM Cyber was founded by the highest caliber of security executives from the elite Israel intelligence sector. Together they bring a second-to-none proven track record in offensive and defensive cyber space. ","shortDescription":"One step ahead of the attack. Always\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"XM Cyber HaXM","keywords":"","description":"HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic APT experience ","og:title":"XM Cyber HaXM","og:description":"HaXM by XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7. HaXM’s automated purple teaming aligns red and blue teams to provide the full realistic APT experience ","og:image":"https://old.roi4cio.com/fileadmin/user_upload/xm_cyber.png"},"eventUrl":"","translationId":3927,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":895,"title":"Breach and Attack Simulation Platforms","alias":"breach-and-attack-simulation-platforms","description":"<span style=\"font-weight: bold;\">Breach and attack simulations</span> are an advanced computer security testing method. These simulations identify vulnerabilities in security environments by mimicking the likely attack paths and techniques used by malicious actors. In this sense, a breach and attack simulation acts much like a continuous, automated penetration test, and it improves upon the inherent limitations of red and blue team testing.\r\nGartner defines BAS technologies as tools “that allow enterprises to continually and consistently simulate the full attack cycle (including insider threats, lateral movement, and data exfiltration) against enterprise infrastructure, using software agents, virtual machines, and other means”.\r\nWhat makes BAS special, is its ability to provide continuous and consistent testing at limited risk and that it can be used to alert IT and business stakeholders about existing gaps in the security posture or validate that security infrastructure, configuration settings and detection/prevention technologies are operating as intended. BAS can also assist in validating if security operations and the SOC staff can detect specific attacks when used as a complement to the red team or penetration testing exercises.\r\n<span style=\"font-weight: bold;\">There are three different types of BAS solutions:</span>\r\n<ul><li><span style=\"font-weight: bold;\">Agent-based BAS</span> solutions are the simplest form of BAS. Agents are deployed across the LAN and vulnerabilities are identified to determine which routes are open to a potential attacker to move around the network. An agent-based BAS solution is very similar to vulnerability scanning but offers much more context.</li><li><span style=\"font-weight: bold;\">BAS solutions based on “malicious” traffic.</span> These BAS solutions generate intrusive traffic within the network between dedicated virtual machines that serve as targets for a wide range of attack scenarios. An overview is then created of which events have not been detected and blocked by the company’s own security controls. </li><li><span style=\"font-weight: bold;\">Cloud-based BAS solutions.</span> BAS solutions that are cloud-based are the closest to a real attack. They simulate numerous attack scenarios from the outside via different entry points. (so-called multi-vector attacks) and thus also the network perimeter of the company. The cloud platforms are fed with the latest threats from a wide variety of sources and are therefore always very up-to-date. Being SaaS solutions, they can be implemented very quickly.</li></ul>\r\nBy running these cyber-attack simulations in a controlled environment, an advanced BAS platform can identify vulnerabilities and gaps and then provide prioritized recommendations to help quickly close them. In this sense, a BAS platform works much like a purple team, allowing for comprehensive vulnerability assessment and remediation. Yet unlike a purple team, a BAS platform is automated and can be deployed remotely, making it especially well-suited to today’s challenges.\r\nThis automation is the key to maintaining continuous risk assessment and threat mitigation — the gold standard for today’s cybersecurity solutions.<br /><br />","materialsDescription":"<h1 class=\"align-center\">What problems do BAS tools attempt to solve?</h1>\r\nBAS solutions give companies an answer to the question “Do our cybersecurity programs really work? Large companies invest heavily in security products, but still do not have the confidence that they can withstand increasingly sophisticated attacks. For financial and practical reasons it is also not possible to test entire enterprise production environments permanently and manually for security vulnerabilities. Breach and Attack Simulation fills exactly this gap and allows companies to get more out of their existing security solutions by enabling continuous testing of the enterprise network at low risk.\r\n<h1 class=\"align-center\">For which companies are BAS solutions suitable?</h1>\r\nIf you have a look around the BAS market, you will find that many offers are tailored to large enterprise customers with high security requirements, such as financial institutions and insurance companies. It is not surprising that Breach and Attack Simulation is especially interesting for this kind of companies. They typically have numerous security products in use, a dynamic IT landscape and a high level of IT maturity. In addition, there are high demands on IT security and high compliance pressure. High-end solutions like Breach and Attack Simulation are predestined for this environment.<br />However, there is also the possibility for smaller companies to use BAS technology. Some solution providers have made their BAS tools multi-tenant ready so that smaller companies can also benefit from them via partner companies.\r\n<h1 class=\"align-center\">How to Evaluate a BAS Platform?</h1>\r\n<ul><li>The right BAS platform can simulate attacks in the cloud, identifying misconfigurations and other security gaps, while also allowing organizations to determine if critical assets are truly secure in all environments.</li><li>The ability to identify gaps in detection and prevention in hybrid environments is another key feature. As more data migrates to the cloud, it’s imperative that organizations assess their risk posture and understand how new hybrid environments can be attacked from on-premises devices linked to cloud data. Assessing cloud and on-premises risks separately leads to reduced visibility and expanded threat exposure — you simply don’t know how each side effects the other.</li><li>An advanced BAS platform can safely simulate Advanced Persistent Threats (APTs) against an organization’s “crown jewel” assets. Networks and devices create many pathways for APTs and identifying them is important.</li><li>The right platform can also identify a wide range of attack vectors hackers can exploit, while running safely in a production environment. Testing security controls on an endpoint solution might tell you if you can stop a credential dump but will not tell you which accounts can be harvested, from which devices and the impact those accounts will have.</li><li>Organizations should also look for a BAS solution that offered prioritized remediation of security gaps and validation of security controls.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hacking.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4228,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/safebreach.png","logo":true,"scheme":false,"title":"SafeBreach Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"safebreach-platform","companyTitle":"SafeBreach","companyTypes":["supplier","vendor"],"companyId":5798,"companyAlias":"safebreach","description":"The SafeBreach platform provides unmatched visibility into an organization's true cyber-security posture. SafeBreach enables data-driven risk analysis, resource prioritization and guided mitigation. The platform continuously and safely tests and optimizes the effectiveness of your security infrastructure against the business value of your assets. \r\n<b>Testing Your Security </b>\r\n<ul> <li>Deploy simulators within your organization's information ecosystem</li> <li>Specify the value of your IT resources and the types of tests that are relevant to your organization's defenses</li> <li>Execute the SafeBreach tests to fully validate the state of your security architecture</li> </ul>\r\n<b>Prioritizing Results </b>\r\n<ul> <li>Visualize results across the kill chain, to easily identify where to focus remediation efforts</li> <li>Identify the security gaps which open the largest number of attack vectors and rank the gaps by their potential business impact</li> <li>Review the remediation options provided by the SafeBreach Insights instructions and set your priorities accordingly</li> </ul>\r\n<b>Remediate Issues </b>\r\n<ul> <li>Review SafeBreach Insights information for detailed instructions and data on closing the security gaps</li> <li>Integrate with the broad range of SafeBreach technology partners to provide fully automated remediation</li> <li>Monitor and act on the regularly</li> </ul>\r\n<b>How it works?</b>\r\nThe SafeBreach platform carries out continuous, automated testing of an organization’s security architecture using advanced, patented simulation technology. SafeBreach attack simulations are exact reproductions of an attacker's tactics and techniques, but pose no risk to the organization’s operations or assets. Attacks are executed between simulator instances deployed both within and outside the organization’s network. This approach provides broad coverage and fully tests the entire security ecosystem deployed by your organization. ","shortDescription":"The SafeBreach Platform safely executes real attacks in production environments to prove where security can withstand attacks, and where it needs to be improved","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":3,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"SafeBreach Platform","keywords":"","description":"The SafeBreach platform provides unmatched visibility into an organization's true cyber-security posture. SafeBreach enables data-driven risk analysis, resource prioritization and guided mitigation. The platform continuously and safely tests and optimizes the","og:title":"SafeBreach Platform","og:description":"The SafeBreach platform provides unmatched visibility into an organization's true cyber-security posture. SafeBreach enables data-driven risk analysis, resource prioritization and guided mitigation. The platform continuously and safely tests and optimizes the","og:image":"https://old.roi4cio.com/fileadmin/user_upload/safebreach.png"},"eventUrl":"","translationId":4227,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":24,"title":"DLP - Data Leak Prevention","alias":"dlp-data-leak-prevention","description":"Data leak prevention (DLP) is a suite of technologies aimed at stemming the loss of sensitive information that occurs in enterprises across the globe. By focusing on the location, classification and monitoring of information at rest, in use and in motion, this solution can go far in helping an enterprise get a handle on what information it has, and in stopping the numerous leaks of information that occur each day. DLP is not a plug-and-play solution. The successful implementation of this technology requires significant preparation and diligent ongoing maintenance. Enterprises seeking to integrate and implement DLP should be prepared for a significant effort that, if done correctly, can greatly reduce risk to the organization. Those implementing the solution must take a strategic approach that addresses risks, impacts and mitigation steps, along with appropriate governance and assurance measures.","materialsDescription":" <span style=\"font-weight: bold;\">How to protect the company from internal threats associated with leakage of confidential information?</span>\r\nIn order to protect against any threat, you must first realize its presence. Unfortunately, not always the management of companies is able to do this if it comes to information security threats. The key to successfully protecting against information leaks and other threats lies in the skillful use of both organizational and technical means of monitoring personnel actions.\r\n<span style=\"font-weight: bold;\">How should the personnel management system in the company be organized to minimize the risks of leakage of confidential information?</span>\r\nA company must have a special employee responsible for information security, and a large department must have a department directly reporting to the head of the company.\r\n<span style=\"font-weight: bold;\">Which industry representatives are most likely to encounter confidential information leaks?</span>\r\nMore than others, representatives of such industries as industry, energy, and retail trade suffer from leaks. Other industries traditionally exposed to leakage risks — banking, insurance, IT — are usually better at protecting themselves from information risks, and for this reason they are less likely to fall into similar situations.\r\n<span style=\"font-weight: bold;\">What should be adequate measures to protect against leakage of information for an average company?</span>\r\nFor each organization, the question of protection measures should be worked out depending on the specifics of its work, but developing information security policies, instructing employees, delineating access to confidential data and implementing a DLP system are necessary conditions for successful leak protection for any organization. Among all the technical means to prevent information leaks, the DLP system is the most effective today, although its choice must be taken very carefully to get the desired result. So, it should control all possible channels of data leakage, support automatic detection of confidential information in outgoing traffic, maintain control of work laptops that temporarily find themselves outside the corporate network...\r\n<span style=\"font-weight: bold;\">Is it possible to give protection against information leaks to outsourcing?</span>\r\nFor a small company, this may make sense because it reduces costs. However, it is necessary to carefully select the service provider, preferably before receiving recommendations from its current customers.\r\n<span style=\"font-weight: bold;\">What data channels need to be monitored to prevent leakage of confidential information?</span>\r\nAll channels used by employees of the organization - e-mail, Skype, HTTP World Wide Web protocol ... It is also necessary to monitor the information recorded on external storage media and sent to print, plus periodically check the workstation or laptop of the user for files that are there saying should not.\r\n<span style=\"font-weight: bold;\">What to do when the leak has already happened?</span>\r\nFirst of all, you need to notify those who might suffer - silence will cost your reputation much more. Secondly, you need to find the source and prevent further leakage. Next, you need to assess where the information could go, and try to somehow agree that it does not spread further. In general, of course, it is easier to prevent the leakage of confidential information than to disentangle its consequences.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Data_Leak_Prevention.png"},{"id":895,"title":"Breach and Attack Simulation Platforms","alias":"breach-and-attack-simulation-platforms","description":"<span style=\"font-weight: bold;\">Breach and attack simulations</span> are an advanced computer security testing method. These simulations identify vulnerabilities in security environments by mimicking the likely attack paths and techniques used by malicious actors. In this sense, a breach and attack simulation acts much like a continuous, automated penetration test, and it improves upon the inherent limitations of red and blue team testing.\r\nGartner defines BAS technologies as tools “that allow enterprises to continually and consistently simulate the full attack cycle (including insider threats, lateral movement, and data exfiltration) against enterprise infrastructure, using software agents, virtual machines, and other means”.\r\nWhat makes BAS special, is its ability to provide continuous and consistent testing at limited risk and that it can be used to alert IT and business stakeholders about existing gaps in the security posture or validate that security infrastructure, configuration settings and detection/prevention technologies are operating as intended. BAS can also assist in validating if security operations and the SOC staff can detect specific attacks when used as a complement to the red team or penetration testing exercises.\r\n<span style=\"font-weight: bold;\">There are three different types of BAS solutions:</span>\r\n<ul><li><span style=\"font-weight: bold;\">Agent-based BAS</span> solutions are the simplest form of BAS. Agents are deployed across the LAN and vulnerabilities are identified to determine which routes are open to a potential attacker to move around the network. An agent-based BAS solution is very similar to vulnerability scanning but offers much more context.</li><li><span style=\"font-weight: bold;\">BAS solutions based on “malicious” traffic.</span> These BAS solutions generate intrusive traffic within the network between dedicated virtual machines that serve as targets for a wide range of attack scenarios. An overview is then created of which events have not been detected and blocked by the company’s own security controls. </li><li><span style=\"font-weight: bold;\">Cloud-based BAS solutions.</span> BAS solutions that are cloud-based are the closest to a real attack. They simulate numerous attack scenarios from the outside via different entry points. (so-called multi-vector attacks) and thus also the network perimeter of the company. The cloud platforms are fed with the latest threats from a wide variety of sources and are therefore always very up-to-date. Being SaaS solutions, they can be implemented very quickly.</li></ul>\r\nBy running these cyber-attack simulations in a controlled environment, an advanced BAS platform can identify vulnerabilities and gaps and then provide prioritized recommendations to help quickly close them. In this sense, a BAS platform works much like a purple team, allowing for comprehensive vulnerability assessment and remediation. Yet unlike a purple team, a BAS platform is automated and can be deployed remotely, making it especially well-suited to today’s challenges.\r\nThis automation is the key to maintaining continuous risk assessment and threat mitigation — the gold standard for today’s cybersecurity solutions.<br /><br />","materialsDescription":"<h1 class=\"align-center\">What problems do BAS tools attempt to solve?</h1>\r\nBAS solutions give companies an answer to the question “Do our cybersecurity programs really work? Large companies invest heavily in security products, but still do not have the confidence that they can withstand increasingly sophisticated attacks. For financial and practical reasons it is also not possible to test entire enterprise production environments permanently and manually for security vulnerabilities. Breach and Attack Simulation fills exactly this gap and allows companies to get more out of their existing security solutions by enabling continuous testing of the enterprise network at low risk.\r\n<h1 class=\"align-center\">For which companies are BAS solutions suitable?</h1>\r\nIf you have a look around the BAS market, you will find that many offers are tailored to large enterprise customers with high security requirements, such as financial institutions and insurance companies. It is not surprising that Breach and Attack Simulation is especially interesting for this kind of companies. They typically have numerous security products in use, a dynamic IT landscape and a high level of IT maturity. In addition, there are high demands on IT security and high compliance pressure. High-end solutions like Breach and Attack Simulation are predestined for this environment.<br />However, there is also the possibility for smaller companies to use BAS technology. Some solution providers have made their BAS tools multi-tenant ready so that smaller companies can also benefit from them via partner companies.\r\n<h1 class=\"align-center\">How to Evaluate a BAS Platform?</h1>\r\n<ul><li>The right BAS platform can simulate attacks in the cloud, identifying misconfigurations and other security gaps, while also allowing organizations to determine if critical assets are truly secure in all environments.</li><li>The ability to identify gaps in detection and prevention in hybrid environments is another key feature. As more data migrates to the cloud, it’s imperative that organizations assess their risk posture and understand how new hybrid environments can be attacked from on-premises devices linked to cloud data. Assessing cloud and on-premises risks separately leads to reduced visibility and expanded threat exposure — you simply don’t know how each side effects the other.</li><li>An advanced BAS platform can safely simulate Advanced Persistent Threats (APTs) against an organization’s “crown jewel” assets. Networks and devices create many pathways for APTs and identifying them is important.</li><li>The right platform can also identify a wide range of attack vectors hackers can exploit, while running safely in a production environment. Testing security controls on an endpoint solution might tell you if you can stop a credential dump but will not tell you which accounts can be harvested, from which devices and the impact those accounts will have.</li><li>Organizations should also look for a BAS solution that offered prioritized remediation of security gaps and validation of security controls.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hacking.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":6079,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Picus.png","logo":true,"scheme":false,"title":"Picus Security Platform","vendorVerified":0,"rating":"0.00","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"picus-security-platform","companyTitle":"Picus Security Inc.","companyTypes":["vendor"],"companyId":5771,"companyAlias":"picus-security-inc","description":"<p class=\"align-center\"><b>How Does Picus Work? </b></p>\r\n<b>Deploy</b>\r\nPicus promises an off-the-shelf software solution that can be installed and configured in hours. After software deployment, our users get their results within only minutes. \r\n<b>Assess </b>\r\nIdentify security gaps in real-time and take action in minutes with Picus mitigation guidance. \r\n<b>Mitigate </b>\r\nFor gaps revealed during our assessments, Picus provides vendor specific remediation signatures and creates a prioritization list. \r\n<b>Measure </b>\r\nInteractive dashboards present the overall picture with objective metrics and list the gaps revealed. \r\n<p class=\"align-center\"><b>Key Benefits </b></p>\r\n<b>Continuous & Real World Cyber-Threat Simulation </b>\r\n<ul> <li>No technology dependency </li> <li>No security vendor or version dependency </li> <li>Works in the Production Environment </li> <li>Functions in the most complex environments </li> <li>Pinpoints weaknesses and strengths of your defense layers in real-time </li> <li>Modules: HTTP/HTTPS/Endpoint/Email </li> </ul>\r\n<b>Instant Security Control Metrics </b>\r\n<ul> <li>Measure - Picus tells you security effectiveness right now including all emerging threats </li> <li>Categorize - Picus helps you prioritize your security resources to where you need it the most </li> <li>Monitor - Picus continually assesses your resilience to threats </li> <li>Alarm - Picus sends alarms for the situations where your security risk increases </li> </ul>\r\n<b>Detailed Analysis of Your Security Posture </b>\r\nIt doesn’t matter if you have a single security technology or a security stack composed of several technologies. Our black-box testing approach is independent from underlying security topology. This will enable you to reveal the effectiveness of a single system, or security posture provided by your security stack. \r\n<b>Industry-Leading Mitigation Suggestions </b>\r\nPicus mitigation suggestions are designed to deliver an actionable to-do list to increase your security level. Proposed actions are customized for existing security infrastructures. The easy-to-apply signatures are always ready for use. Picus also ships with an open source remediation know-how that can be consumed by your security technologies. \r\n<b>Flexible Deployment, Easy Installation & Reports in Hours </b>\r\nPicus promises an off-the-shelf software solution that can be installed and configured within hours to make sure users get their results within only minutes. Its flexible architecture supports both the Picus-hosted assessment for Internet vector testing and the on-site installation for internal and cross-zone vector testing. Picus exists as a virtual appliance or as software to run on physical or virtual Linux platforms. ","shortDescription":"Explore how Picus can help you to assess security controls continuously.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Picus Security Platform","keywords":"","description":"<p class=\"align-center\"><b>How Does Picus Work? </b></p>\r\n<b>Deploy</b>\r\nPicus promises an off-the-shelf software solution that can be installed and configured in hours. After software deployment, our users get their results within only minutes. \r\n<b>Assess </","og:title":"Picus Security Platform","og:description":"<p class=\"align-center\"><b>How Does Picus Work? </b></p>\r\n<b>Deploy</b>\r\nPicus promises an off-the-shelf software solution that can be installed and configured in hours. After software deployment, our users get their results within only minutes. \r\n<b>Assess </","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Picus.png"},"eventUrl":"","translationId":6078,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":895,"title":"Breach and Attack Simulation Platforms","alias":"breach-and-attack-simulation-platforms","description":"<span style=\"font-weight: bold;\">Breach and attack simulations</span> are an advanced computer security testing method. These simulations identify vulnerabilities in security environments by mimicking the likely attack paths and techniques used by malicious actors. In this sense, a breach and attack simulation acts much like a continuous, automated penetration test, and it improves upon the inherent limitations of red and blue team testing.\r\nGartner defines BAS technologies as tools “that allow enterprises to continually and consistently simulate the full attack cycle (including insider threats, lateral movement, and data exfiltration) against enterprise infrastructure, using software agents, virtual machines, and other means”.\r\nWhat makes BAS special, is its ability to provide continuous and consistent testing at limited risk and that it can be used to alert IT and business stakeholders about existing gaps in the security posture or validate that security infrastructure, configuration settings and detection/prevention technologies are operating as intended. BAS can also assist in validating if security operations and the SOC staff can detect specific attacks when used as a complement to the red team or penetration testing exercises.\r\n<span style=\"font-weight: bold;\">There are three different types of BAS solutions:</span>\r\n<ul><li><span style=\"font-weight: bold;\">Agent-based BAS</span> solutions are the simplest form of BAS. Agents are deployed across the LAN and vulnerabilities are identified to determine which routes are open to a potential attacker to move around the network. An agent-based BAS solution is very similar to vulnerability scanning but offers much more context.</li><li><span style=\"font-weight: bold;\">BAS solutions based on “malicious” traffic.</span> These BAS solutions generate intrusive traffic within the network between dedicated virtual machines that serve as targets for a wide range of attack scenarios. An overview is then created of which events have not been detected and blocked by the company’s own security controls. </li><li><span style=\"font-weight: bold;\">Cloud-based BAS solutions.</span> BAS solutions that are cloud-based are the closest to a real attack. They simulate numerous attack scenarios from the outside via different entry points. (so-called multi-vector attacks) and thus also the network perimeter of the company. The cloud platforms are fed with the latest threats from a wide variety of sources and are therefore always very up-to-date. Being SaaS solutions, they can be implemented very quickly.</li></ul>\r\nBy running these cyber-attack simulations in a controlled environment, an advanced BAS platform can identify vulnerabilities and gaps and then provide prioritized recommendations to help quickly close them. In this sense, a BAS platform works much like a purple team, allowing for comprehensive vulnerability assessment and remediation. Yet unlike a purple team, a BAS platform is automated and can be deployed remotely, making it especially well-suited to today’s challenges.\r\nThis automation is the key to maintaining continuous risk assessment and threat mitigation — the gold standard for today’s cybersecurity solutions.<br /><br />","materialsDescription":"<h1 class=\"align-center\">What problems do BAS tools attempt to solve?</h1>\r\nBAS solutions give companies an answer to the question “Do our cybersecurity programs really work? Large companies invest heavily in security products, but still do not have the confidence that they can withstand increasingly sophisticated attacks. For financial and practical reasons it is also not possible to test entire enterprise production environments permanently and manually for security vulnerabilities. Breach and Attack Simulation fills exactly this gap and allows companies to get more out of their existing security solutions by enabling continuous testing of the enterprise network at low risk.\r\n<h1 class=\"align-center\">For which companies are BAS solutions suitable?</h1>\r\nIf you have a look around the BAS market, you will find that many offers are tailored to large enterprise customers with high security requirements, such as financial institutions and insurance companies. It is not surprising that Breach and Attack Simulation is especially interesting for this kind of companies. They typically have numerous security products in use, a dynamic IT landscape and a high level of IT maturity. In addition, there are high demands on IT security and high compliance pressure. High-end solutions like Breach and Attack Simulation are predestined for this environment.<br />However, there is also the possibility for smaller companies to use BAS technology. Some solution providers have made their BAS tools multi-tenant ready so that smaller companies can also benefit from them via partner companies.\r\n<h1 class=\"align-center\">How to Evaluate a BAS Platform?</h1>\r\n<ul><li>The right BAS platform can simulate attacks in the cloud, identifying misconfigurations and other security gaps, while also allowing organizations to determine if critical assets are truly secure in all environments.</li><li>The ability to identify gaps in detection and prevention in hybrid environments is another key feature. As more data migrates to the cloud, it’s imperative that organizations assess their risk posture and understand how new hybrid environments can be attacked from on-premises devices linked to cloud data. Assessing cloud and on-premises risks separately leads to reduced visibility and expanded threat exposure — you simply don’t know how each side effects the other.</li><li>An advanced BAS platform can safely simulate Advanced Persistent Threats (APTs) against an organization’s “crown jewel” assets. Networks and devices create many pathways for APTs and identifying them is important.</li><li>The right platform can also identify a wide range of attack vectors hackers can exploit, while running safely in a production environment. Testing security controls on an endpoint solution might tell you if you can stop a credential dump but will not tell you which accounts can be harvested, from which devices and the impact those accounts will have.</li><li>Organizations should also look for a BAS solution that offered prioritized remediation of security gaps and validation of security controls.</li></ul>\r\n<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/hacking.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[{"id":58,"title":"Chief Executive Officer"},{"id":60,"title":"Chief Information Officer"},{"id":64,"title":"Chief IT Security Officer"},{"id":70,"title":"IT Security and Risk Management"}],"organizationalFeatures":["NIST Compliance","GDPR Compliance","Personal data operation","Internet access is available for employees"],"complementaryCategories":[],"solutions":["Risk of data loss or damage","Risk of attacks by hackers","IT infrastructure does not meet business tasks","Risk or Leaks of confidential information","Unauthorized access to corporate IT systems and data"],"materials":[{"id":2453,"title":"","description":"Breach and Attack Simulation Made Simple","uri":"https://l.cymulate.com/hubfs/Cymulate%20Brochure%20-%20Introduction%20to%20Breach%20and%20Attack%20Simulation%20Made%20Simple.pdf"},{"id":2454,"title":"","description":"Lateral Movement Solution Brief","uri":"https://l.cymulate.com/hubfs/Solution_Brief/Cymulate%20-%20Lateral%20Movement%20Assessment%20Solution%20Brief.pdf"},{"id":2455,"title":"","description":"Immediate Threats Solution Brief ","uri":"https://l.cymulate.com/hubfs/Solution_Brief/Cymulate%20-%20Immediate%20Threats%20Assessment%20Solution%20Brief.pdf"},{"id":2456,"title":"","description":"Email Gateway Solution Brief","uri":"https://l.cymulate.com/hubfs/Solution_Brief/Cymulate%20-%20Email%20Gateway%20Assessment%20Solution%20Brief.pdf"},{"id":2457,"title":"","description":"Web Gateway Solution Brief ","uri":"https://l.cymulate.com/hubfs/Cymulate%20-%20Web%20Gateway%20Assessment%20Solution%20Brief.pdf"},{"id":2458,"title":"","description":"Phishing Awareness Solution Brief","uri":"https://l.cymulate.com/hubfs/Cymulate%20-%20Phishing%20Assessment%20Solution%20Brief.pdf"},{"id":2459,"title":"","description":"WAF Solution Brief","uri":"https://l.cymulate.com/hubfs/Cymulate%20-%20Web%20Application%20Firewall%20Solution%20Brief.pdf"},{"id":2460,"title":"","description":"Endpoint Security Assessment Solution Brief","uri":"https://l.cymulate.com/hubfs/Cymulate%20-%20Endpoint%20Assessment%20Solution%20Brief.pdf"},{"id":2461,"title":"","description":"Data Exfiltration Solution Brief","uri":"https://l.cymulate.com/hubfs/Solution_Brief/Cymulate%20-%20Data%20Exfiltration%20Assessment%20Solution%20Brief.pdf"}],"useCases":[],"best_practices":[],"values":["Ensure Security and Business Continuity","Ensure Compliance"],"implementations":[{"id":1233,"title":"Cymulate BAS for Integrated Health Plan (IHP)","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cymulate-bas-for-integrated-health-plan-ihp/"},{"id":1235,"title":"Cymulate BAS for Assuta Medical Center","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cymulate-bas-for-assuta-medical-center/"},{"id":1237,"title":"Cymulate BAS for Euronext","url":"https://old.roi4cio.com/vnedrenija/vnedrenie/cymulate-bas-for-euronext/"}],"presenterCodeLng":"https://slides.roi4presenter.com/presentation/daf04e509a1d08bc2d445c2a5be6b893","productImplementations":[{"id":1233,"title":"Cymulate BAS for Integrated Health Plan (IHP)","description":"<span style=\"font-weight: bold;\">Business Challenge</span>\r\nBased in Singapore, IHP is subject to some of the world’s most stringent cybersecurity regulatory oversight. Moreover, like most healthcare organizations, the company is highly vulnerable to existing and emerging cyberthreats. In recent years, the company invested significant resources in security enhancement, security tool configuration, and deployment of security solutions.<br />\r\nThe company was focused on setting up and optimizing the most up-to-date protection for its production environment - production servers, exchanges, web applications and network infrastructure.<br />\r\nIn addition to these efforts, IHP wanted to increase the reliability of the solutions they had adopted to enhance their security posture. To protect themselves from the next threat, they needed assurance that their security solutions were consistently well configured and fully operational. Their network vulnerabilities assessment needed to be robust in order to maintain security at peak performance.<br /><br />\r\n<span style=\"font-weight: bold;\">Solution</span><br />\r\nIHP chose Cymulate to automatically and continuously identify and remediate gaps in their cybersecurity posture. Every day, IHP uses Cymulate to test real-world security strength by simulating actual cyberattacks across all attack vectors.<br />\r\nCymulate monitors the company’s email gateway, web gateway, and web application firewall - while also seeking out signs of penetration including lateral movement.Cymulate enables IHP to evaluate their controls to identify gaps - delivering a clear report detailing the company’s up-to-the-moment security posture and score, benchmarked across their industry. And, Cymulate translates these findings into actionable insights – delivering clear instructions that help IHP constantly reduce their attack surface and prioritize which gaps to close first.<br /><br /><span style=\"font-weight: bold;\">Benefits</span><br />Cymulate enabled IHP to gain a better ongoing overview of their environment’s security posture. In addition to facilitating daily cyberthreat monitoring based on up-to-the-minute cyber intelligence, Cymulate also identifies gaps in security and facilitates their rapid remediation.<br />\r\nWhen IHP needs to roll out new applications or services, Cymulate enables testing during the POC stage, to assess actual impact on their production environment.<br />\r\nLeveraging Cymulate, IHP lowered their daily security check time by around 40%, and their testing time investment by approximately 60%. Finally, Cymulate has measurably helped IHP optimize their defences to better comply with both cybersecurity regulations and corporate policies.<br />\r\nWith Cymulate, we gain enhanced security level assurance that helps our existing clients increase their trust in us to handle their information. Moreover, we gain the confidence of new clients to engage our services.<br />David Chang, IT Infrastructure Manager, IHP","alias":"cymulate-bas-for-integrated-health-plan-ihp","roi":0,"seo":{"title":"Cymulate BAS for Integrated Health Plan (IHP)","keywords":"","description":"<span style=\"font-weight: bold;\">Business Challenge</span>\r\nBased in Singapore, IHP is subject to some of the world’s most stringent cybersecurity regulatory oversight. Moreover, like most healthcare organizations, the company is highly vulnerable to existing ","og:title":"Cymulate BAS for Integrated Health Plan (IHP)","og:description":"<span style=\"font-weight: bold;\">Business Challenge</span>\r\nBased in Singapore, IHP is subject to some of the world’s most stringent cybersecurity regulatory oversight. Moreover, like most healthcare organizations, the company is highly vulnerable to existing "},"deal_info":"","user":{"id":8915,"title":"Integrated Health Plans Pte Ltd (IHP)","logoURL":"https://old.roi4cio.com/uploads/roi/company/IHP_logo.jpg","alias":"integrated-health-plans-pte-ltd-ihp","address":"","roles":[],"description":" Established in 1994, Integrated Health Plans Pte Ltd (IHP) provides managed healthcare services to corporate clients ranging from SMEs to MNCs. As a neutral third party administrator, IHP is committed to providing organisations with quality medical care at highly-competitive rates regardless of business size. IHP does this by contracting with medical providers who are sensitive to the issue of increasing healthcare costs, negotiating significant rate concessions with these providers, undertaking utilisation reviews and analyses to manage consumption, and establishing quality assurance processes to ensure the highest standard of medical care.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://ihp.com.sg/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Integrated Health Plans Pte Ltd (IHP)","keywords":"","description":" Established in 1994, Integrated Health Plans Pte Ltd (IHP) provides managed healthcare services to corporate clients ranging from SMEs to MNCs. As a neutral third party administrator, IHP is committed to providing organisations with quality medical care","og:title":"Integrated Health Plans Pte Ltd (IHP)","og:description":" Established in 1994, Integrated Health Plans Pte Ltd (IHP) provides managed healthcare services to corporate clients ranging from SMEs to MNCs. As a neutral third party administrator, IHP is committed to providing organisations with quality medical care","og:image":"https://old.roi4cio.com/uploads/roi/company/IHP_logo.jpg"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":8254,"title":"Cymulate","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cymulate.png","alias":"cymulate","address":"Rishon Lezion, Israel","roles":[],"description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an elite team of former IDF intelligence officers who identified frustrating inefficiencies during their cyber security operations. From this came their mission to empower organizations worldwide and make advanced cyber security as simple and familiar as sending an e-mail. Today, Cymulate is trusted by hundreds of companies worldwide, including leading banks and financial services.\r\n<br />Highly experienced and diverse researchers are fluent in security intelligence practices, combining expertise in private security, military and intelligence experience. Continuously examining the cyber-threat landscape, experts deliver in-depth visibility into today’s threats and the actors behind them. Evolving methodologies accordingly, ensure to continuously protect against current emerging threats, zero-day vulnerabilities, and the most advanced attack tactics, techniques, and procedures (TTP) to date.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cymulate.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cymulate","keywords":"","description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an ","og:title":"Cymulate","og:description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cymulate.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://cymulate.com/resources/collateral/ihp-tests-real-world-cyberattacks-using-cymulate/","title":"-"}},"comments":[],"referencesCount":0},{"id":1235,"title":"Cymulate BAS for Assuta Medical Center","description":"<span style=\"font-weight: bold;\">Challenge</span>\r\nThe fear of a cyberattack is real. The hospital’s security officers live with that fear every day because they know cyberattacks happen every day. So far, Assuta has evaded such a devastating attack on its information system. But in the past, Tamir Ronen, Assuta’s Chief Information Security Officer, hired penetration testers to test his system for vulnerabilities. However, the labor costs were significant and the actual testing took a long time. On some occasions, Tamir had to wait for the assessment results and reports to be delivered. When a test was completed, a meeting with Tamir’s staff and the penetration testers was required to resolve the findings and root out any “false” results. And, finally, Tamir’s staff would have run its own tests to double-check the findings of each report. The whole process was labor intensive and time consuming.<br />\r\nImagine Tamir Ronen’s surprise when he learned from Cymulate that the entire security assessment procedure could be accomplished much more quickly through on-demand simulation.<br />\r\n<span style=\"font-weight: bold;\">Solution</span><br />Cymulate’s SaaS-based, on-demand Breach and Attack simulation platform keeps Assuta one step ahead of cyber attackers 24 hours-a-day, every day of the year. The platform not only assess against the latest threats and most advanced multi-vector attacks—it also delivers an immediate and complete picture of Assuta’s current security posture.<br />\r\nThe platform uses an offensive approach and defensive tactics to simulate multi-vector cyberattacks from an attacker’s perspective, revealing critical vulnerabilities before exploitation from real attackers. After a simple implementation that required no labor from its own staff, Assuta had the ability to perform simulated attacks to reveal security exposures through email and Internet browsing.<br />\r\n<span style=\"font-weight: bold;\">Results</span><br />\r\nTamir Ronen works through the Cymulate main portal where he can pick and choose what type of attack, he wants to spring on any of his security solutions at any time. He generally conducts tests on each once a month. <span style=\"font-style: italic;\">“But each time there is a global virus attack campaign that is spreading, Cymulate immediately gets a sample of it and we can test its effect on our network immediately,” he said. “It’s a really big benefit. You can test it before it comes to you.”</span><br />\r\nTamir notes that Cymulate has more than satisfied his main objectives by conducting penetration testing automatically through simulation. <span style=\"font-style: italic;\">“It’s not only money,”</span> he said. <span style=\"font-style: italic;\">“It’s time.” </span>He said hiring manual penetration testers to conduct a test would take several days or more. Now he said testing can take place on-demand and only takes an hour, maybe less. The fixes, he said, are illuminated immediately.<br />\r\n<span style=\"font-style: italic;\">“Using Cymulate, I was able to find out that several of my security products were not configured as I wanted them to be,” Tamir said. “I discovered I had several vulnerabilities based on the misconfigured products. Once everything was configured correctly, I tested the system again using Cymulate. And the security hole within my network was eliminated.”</span>","alias":"cymulate-bas-for-assuta-medical-center","roi":0,"seo":{"title":"Cymulate BAS for Assuta Medical Center","keywords":"","description":"<span style=\"font-weight: bold;\">Challenge</span>\r\nThe fear of a cyberattack is real. The hospital’s security officers live with that fear every day because they know cyberattacks happen every day. So far, Assuta has evaded such a devastating attack on its inf","og:title":"Cymulate BAS for Assuta Medical Center","og:description":"<span style=\"font-weight: bold;\">Challenge</span>\r\nThe fear of a cyberattack is real. The hospital’s security officers live with that fear every day because they know cyberattacks happen every day. So far, Assuta has evaded such a devastating attack on its inf"},"deal_info":"","user":{"id":8916,"title":"Assuta","logoURL":"https://old.roi4cio.com/uploads/roi/company/Assuta.png","alias":"assuta","address":"","roles":[],"description":" Assuta Medical Center is the largest private hospital system in Israel, comprising nine clinics and hospitals across Israel and providing innovative surgeries and diagnostic procedures in all fields of medicine, including cardiology, oncology, gynecology, urology and more. Assuta serves patients from all over the world including Europe, the UK and the United States. Each year, Assuta handles approximately 92,000 operations, 683,000 ambulatory checks and treatments, 440,000 imaging tests, 4,000 heart catheterization procedures and 16,000 IVF treatments.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://assutatop.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Assuta","keywords":"","description":" Assuta Medical Center is the largest private hospital system in Israel, comprising nine clinics and hospitals across Israel and providing innovative surgeries and diagnostic procedures in all fields of medicine, including cardiology, oncology, gynecology, uro","og:title":"Assuta","og:description":" Assuta Medical Center is the largest private hospital system in Israel, comprising nine clinics and hospitals across Israel and providing innovative surgeries and diagnostic procedures in all fields of medicine, including cardiology, oncology, gynecology, uro","og:image":"https://old.roi4cio.com/uploads/roi/company/Assuta.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":8254,"title":"Cymulate","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cymulate.png","alias":"cymulate","address":"Rishon Lezion, Israel","roles":[],"description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an elite team of former IDF intelligence officers who identified frustrating inefficiencies during their cyber security operations. From this came their mission to empower organizations worldwide and make advanced cyber security as simple and familiar as sending an e-mail. Today, Cymulate is trusted by hundreds of companies worldwide, including leading banks and financial services.\r\n<br />Highly experienced and diverse researchers are fluent in security intelligence practices, combining expertise in private security, military and intelligence experience. Continuously examining the cyber-threat landscape, experts deliver in-depth visibility into today’s threats and the actors behind them. Evolving methodologies accordingly, ensure to continuously protect against current emerging threats, zero-day vulnerabilities, and the most advanced attack tactics, techniques, and procedures (TTP) to date.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cymulate.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cymulate","keywords":"","description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an ","og:title":"Cymulate","og:description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cymulate.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://cymulate.com/resources/collateral/assuta-automated-cybersecurity-testing-program/","title":"-"}},"comments":[],"referencesCount":0},{"id":1237,"title":"Cymulate BAS for Euronext","description":"<span style=\"font-weight: bold;\">Euronext’s Information Security Department</span>\r\nEuronext’s information security department is comprised of multiple teams, including its Security Operation Centre (SOC) team and the Assessment and Exploitation Team. While the SOC’s main mission deals with incident response, continuously monitoring and improving the organization’s security posture, it works closely with Assessment and Exploitation Team, which is responsible for running vulnerability and red team assessments.<br />The SOC is entrusted with the security of all Euronext infrastructure and systems, all Euronext trading services and platforms, as well as all internal users and external users, including but not limited to the stock exchange service itself. The SOC works around the clock 24x7.<br />\r\n<span style=\"font-weight: bold;\">Business Challenge</span><br />\r\nKeeping a vigilant eye out for the latest developments in the cybersecurity market, Jorge Ruão, Head of Security Operations Centre at Euronext, sought better ways to prevent and detect cyber attacks.<br />\r\nThe Information Security Department is experienced in developing and running their own homegrown simulations of cyberattacks to test the organization’s security posture vis-à-vis specific threats.<br />\r\nAfter implementing new technology, deploying a specific security policy or updating the rule engine of a cybersecurity tool, the teams would run simulations of specific attacks to ensure that they could be blocked, or alternatively, be detected and mitigated.<br />\r\nWhile the practice of running attack simulations is highly effective, building simulations of specific attacks can be a resource-intensive undertaking, depending on the complexity of a malware strain or its associated variants. <span style=\"font-style: italic;\">“This is of special concern if time is critical, for example,”</span> says Ruão, <span style=\"font-style: italic;\">“when you are made aware that a new malware campaign exploiting zero-day vulnerabilities is spreading through the internet and you’ve just deployed mitigation or workaround measures received from your intel services.</span><br />\r\n<span style=\"font-weight: bold;\">Solution</span><br />\r\nImpressed by Cymulate’s ease of use and ability to repeatedly run the same battery of tests to test the organization’s security posture, Ruão implemented the cyberattack simulation platform, removing the need to build and prepare a manual framework to execute those very same tests. On top of manual penetration testing, red team exercises and vulnerability assessments performed periodically, Cymulate lets Euronext’s Information Security department run frequent security tests in response to a variety of events.<br />\r\nFor example, “when there is a new specific threat in the wild (e.g. WannaCry, etc.) Cymulate incorporates the threat’s indicators of compromise (IoCs) very quickly,” comments Ruão, “and you can immediately see how vulnerable you are to that threat without the need to internally develop a simulation to mimic that new threat.”<br />Similarly, if a security tool suddenly proves to be less effective following a configuration change, its settings can be updated and then thoroughly tested against a barrage of simulated cyber attacks.<br />\r\nHaving purchased four Cymulate attack vectors (modules) the year prior, including the Immediate Threat Assessment, Web Gateway, Email and Endpoint modules, Euronext has recently renewed their Cymulate subscription, adding one more module to the mix—the Hopper—which simulates potential lateral movement within the company’s network.<br />\r\nCommenting about the initial integration, Ruão says, “It was very easy and quick to deploy the solution with satisfactory results. No major issues were found during the deployment besides the need to provide the minimum requirements.”<br />\r\n<span style=\"font-weight: bold;\">Benefits</span><br />\r\nSince deploying the solution one year ago, both the SOC and Assessment and Exploitation teams use Cymulate together to find out and understand whether current security controls are in fact blocking threats.<br />By using Cymulate, Euronext’s Information Security<br />Department can now:\r\n<ul><li><span style=\"font-weight: bold;\">Test controls against the latest threats</span> – Imminent attacks detected in the wild are simulated by the platform, enabling up-to-date security assessments.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Frequently and repeatedly evaluate security controls</span> – New technology, configuration changes, or software/hardware updates can be easily tested to see their impact on the organization.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Complement homegrown simulations </span>– While highly effective, these are resource-intensive and may not be practical when time is of the essence.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Prove the value of business decisions</span> – By using Cymulate as a benchmark before deploying new technology, the team can demonstrate the efficacy of new solutions.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Understand cyber threats’ modus operandi</span> – This includes where in the attack kill chain a potential threat may be successful in circumventing security controls.</li></ul>\r\n<ul><li><span style=\"font-weight: bold;\">Provide executive and technical-level reporting</span> – With its built-in reports, visibility is provided into how each technology contributes to the organization’s overall security posture.</li></ul>\r\nSince implementing the platform, comments Ruão, <span style=\"font-style: italic;\">“We are very happy with the Cymulate solution and are already looking to expand the functionalities with additional tests.”</span><br />To conclude, Ruão says, <span style=\"font-style: italic;\">“I would recommend Cymulate because of its ease of use, it can quickly provide you a window into how vulnerable or how protected your organization is against external threats.”</span>","alias":"cymulate-bas-for-euronext","roi":0,"seo":{"title":"Cymulate BAS for Euronext","keywords":"","description":"<span style=\"font-weight: bold;\">Euronext’s Information Security Department</span>\r\nEuronext’s information security department is comprised of multiple teams, including its Security Operation Centre (SOC) team and the Assessment and Exploitation Team. While th","og:title":"Cymulate BAS for Euronext","og:description":"<span style=\"font-weight: bold;\">Euronext’s Information Security Department</span>\r\nEuronext’s information security department is comprised of multiple teams, including its Security Operation Centre (SOC) team and the Assessment and Exploitation Team. While th"},"deal_info":"","user":{"id":8917,"title":"Euronext","logoURL":"https://old.roi4cio.com/uploads/roi/company/Euronext_logo.png","alias":"euronext","address":"Амстердам, Нидерланды","roles":[],"description":" Euronext is the leading pan-European marketplace, rooted in four centuries of exchanges that are now at the heart of European capital markets. The exchange boasts 1,300 domestic and foreign companies listed for trading, with a combined 3.5 trillion Euro market capitalization.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://euronext.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Euronext","keywords":"","description":" Euronext is the leading pan-European marketplace, rooted in four centuries of exchanges that are now at the heart of European capital markets. The exchange boasts 1,300 domestic and foreign companies listed for trading, with a combined 3.5 trillion Euro marke","og:title":"Euronext","og:description":" Euronext is the leading pan-European marketplace, rooted in four centuries of exchanges that are now at the heart of European capital markets. The exchange boasts 1,300 domestic and foreign companies listed for trading, with a combined 3.5 trillion Euro marke","og:image":"https://old.roi4cio.com/uploads/roi/company/Euronext_logo.png"},"eventUrl":""},"supplier":{"id":8760,"title":"Hidden supplier","logoURL":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg","alias":"skrytyi-postavshchik","address":"","roles":[],"description":" Supplier Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":76,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden supplier","keywords":"","description":" Supplier Information is confidential ","og:title":"Hidden supplier","og:description":" Supplier Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/znachok_postavshchik.jpg"},"eventUrl":""},"vendors":[{"id":8254,"title":"Cymulate","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cymulate.png","alias":"cymulate","address":"Rishon Lezion, Israel","roles":[],"description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an elite team of former IDF intelligence officers who identified frustrating inefficiencies during their cyber security operations. From this came their mission to empower organizations worldwide and make advanced cyber security as simple and familiar as sending an e-mail. Today, Cymulate is trusted by hundreds of companies worldwide, including leading banks and financial services.\r\n<br />Highly experienced and diverse researchers are fluent in security intelligence practices, combining expertise in private security, military and intelligence experience. Continuously examining the cyber-threat landscape, experts deliver in-depth visibility into today’s threats and the actors behind them. Evolving methodologies accordingly, ensure to continuously protect against current emerging threats, zero-day vulnerabilities, and the most advanced attack tactics, techniques, and procedures (TTP) to date.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":1,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":3,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://cymulate.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cymulate","keywords":"","description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an ","og:title":"Cymulate","og:description":"Cymulate is a breach and attack simulation platform that lets you protect your organization at the click of a button. Operating thousands of attack strategies, Cymulate shows you exactly where you’re exposed, and how to fix it.<br />Cymulate was founded by an ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cymulate.png"},"eventUrl":""}],"products":[],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://cymulate.com/resources/collateral/euronext-secures-trading-with-breach-and-attack-simulation/","title":"-"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}