The Breach & Attack Simulation (BAS) technology Revolution : Cymulate

Forums Security Announcement (Security) The Breach & Attack Simulation (BAS) technology Revolution : Cymulate

Tagged: 

This topic contains 0 replies, has 1 voice, and was last updated by  TelegramGroup IoTForIndia 3 weeks, 4 days ago.

  • Author
    Posts
  • #27577

    TelegramGroup IoTForIndia
    Moderator
    • Topic 842
    • Replies 0
    • posts 842
      @iotforindiatggroup

      #Announcement(Security) #Product [ via IoTForIndiaGroup ]
      #Organizer : Cymulate #IsTraining : Free Trail


      In its Hype Cycle for Threat-Facing Technologies 2017, Gartner introduced a new domain: The Breach & Attack Simulation (BAS). Gartner defines Breach & attack Simulation (BAS) technologies as tools “that allow enterprises to continually and consistently simulate the full attack cycle (including insider threats, lateral movement and data exfiltration) against enterprise infrastructure, using software agents, virtual machines, and other means”. What makes BAS special, is its ability to provide continuous and consistent testing at limited risk and that it can be used to alert IT and business stakeholders about existing gaps in the security posture or validate that security infrastructure, configuration settings and detection/prevention technologies are operating as intended. BAS can also assist in validating if security operations and the SOC staff can detect specific attacks when used as a complement to red team or penetration testing exercises.


      Read More..

    You must be logged in to reply to this topic.