Cymulate Extends End-to-End Security Position Validation Capabilities with Vulnerability Prioritization Technology and External Attack Surface Assessment US – English US – English US – English

0

Leading Security Validation Platform Dramatically Reduces Exposure of Businesses External and Internal Assets

NEW YORK and RISHON LEZION, Israel, September 23, 2021 / PRNewswire / – Cymulate, the industry standard for continuous SaaS-based security validation, today announced the launch of two new solutions to enable organizations to validate their security technologies and policies. Attack surface management (ASM) discovers exploitable external assets, and Vulnerability prioritization technology (VPT) which integrates with vulnerability scanners to reduce the exposure time to risks on internal assets. These new offerings allow security teams to effectively prioritize vulnerabilities and mitigation steps, ensuring faster resolution time.

With the exponential increase in vulnerabilities and common exposures (CVEs), organizations are in a constant race to discover, prioritize and remediate vulnerable assets. Current vulnerability management platforms do not take into account the effectiveness of compensating controls and their ability to detect and / or prevent exploits associated with discovered vulnerabilities. They end up using vulnerabilities and out of context information that leads to inaccurate prioritization that wastes time trying to push fixes that don’t always resolve the issue.

In order to simulate a large-scale attack, a business must go back to the discovery stage and look for all the weaknesses and vulnerabilities in the organization. Cymulate’s platform maps them, finds weaknesses, and gathers all the initial information about the organization. ASM and VPT immediately enhance vulnerability management programs with these identified exploitable assets and integrate with the VM platform to contextually prioritize discovered vulnerabilities. By demonstrating in real time which exploits can and cannot bypass cybersecurity controls, Cymulate reduces the overwhelming results of vulnerability scanning to an actionable, prioritized, and manageable list.

“Our customers faced the ongoing challenge of remedying vulnerable assets,” said Avihai Ben-Yossef, Cymulate Co-Founder and CTO. “We looked into the possibility of acquiring a company that collects attack surface data to contextualize the vulnerabilities presented by Cymulate, but after extensive research, we found that existing ASM solutions do not provide organizations with the cover. information they need to optimally produce a contextualized priority list of vulnerabilities. We are proud to have developed in-house a solution that meets the needs of our customers. ”

“Security challenges have intensified dramatically over the past year, creating more daily problems for security teams to manage and master, even though many lack the resources to tackle them,” said Eyal wachsman, CEO and co-founder of Cymulate. “Controlling the risk of vulnerability patches in accordance with the corporate security posture makes the difference between organizations losing minutes or hours of downtime versus days or months. Likewise, enabling visibility of the highest-risk vectors of penetration, where attackers are most likely to start from their campaigns, is equally critical. With these additional capabilities, more and more customers are finding that Cymulate solves several use cases as a holistic security posture validation platform. ”

Managing the Cymulate attack surface

Cymulate’s attack surface management technology emulates real attackers to identify digital assets (such as domains, IP addresses, etc.) and assess their usability against organizational security policies and solutions. . With the results mapped to the TTPs (Tactics, Techniques and Procedures) of the MITER ATT & CK® framework, companies can take the necessary mitigation actions. For more information click here.

Vulnerability prioritization technology

A record number of nearly 20,000 vulnerabilities were disclosed in 2020, 57% of which were classified as critical or high severity, but patching remains a challenge for many organizations due to limited resources, the complexity of legacy systems, the inability to prioritize, and internal pressures. This new solution offered to security professionals and executives assesses the potential impact of vulnerabilities on the security posture and prioritizes the patches to be implemented, thus ensuring business continuity.

Cymulate’s VPT solution integrates with leading third-party vulnerability management solutions, including Qualys, Tenable, Insight, and Microsoft Defender. The solution crosses the vulnerability information provided by these vendors, with Cymulate’s security posture validation platform analysis providing a practical view of compensating security controls on unpatched network vulnerabilities.

About Cymulate

The Cymulate Continuous Security Validation platform enables organizations to challenge, assess and optimize their cybersecurity posture against the changing threat landscape in a simple and continuous manner. The platform provides out-of-the-box, expert, threat intelligence-driven RISK assessments that are easy to use for all skill levels and constantly updated. It also provides an open framework for ethical hackers to create and automate red and purple team drills, as well as security assurance programs tailored to their environment and unique security policies. Cymulate helps security professionals understand and control their dynamic environment.

For more information visit www.cymulate.com and sign up for a free try.

Contact for Cymulate:
Levona Simha, Marketing Director at Cymulate
[email protected]
+972 523 536638

Media contact for Cymulate:
Gina Shaffer
[email protected]
United States: +1 (707) 533-1504
IL: + (972) 54-649-3485

Logo: https://mma.prnewswire.com/media/1336659/Cymulate_Logo.jpg

SOURCE Cymule


Source link

Share.

Leave A Reply