Core Insight Enterprise Overview

4,960 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
4,960
On SlideShare
0
From Embeds
0
Number of Embeds
3,463
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Step 1: Environment ProfilingTell INSIGHT about your environment topography, for instance:Import network info from your network asset mgt solutionProvide a range of IPsProvide a range of web application URLsProvide a list of end user email addressesStep 2: Campaign DefinitionDefine the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).Define the scope of systems to be tested (e.g., a specific subnet).Define which systems are in and out of bounds for the campaignOptionally, delegate campaigns to IT staff who own the systems, web app developers, etc.Establish the campaign schedule (e.g., once, daily, weekly, etc.).Step 3: Attack Path CalculationINSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.Step 4: Attack ReplicationCORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.Can target web applications, network systems, endpoint systems and end users (via phishing).All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.Product receives 20-30 new exploits and other modules per month.Step 5: Adaptive Path AdjustmentUses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.Stays “in bounds” as defined in the campaign.Only tests calculated attack pathsLess disruptive than scanningStealthy attacker behaviorStep 6: Infrastructure ChangeNewly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run. Ensures that security tests keep up with your changing environmentStep 7: Dashboard / ReportingDetails real potential for breach of critical assets with no false positives.Shows where defenses stop attacks.Reveals exposures to attacks that combine different techniques and vectors.Details attack paths and penetration points for remediation planning.
  • Core Insight Enterprise Overview

    1. 1. CORE INSIGHT Enterprise<br />Security Testing & Measurement Solution<br />
    2. 2. How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 1: Environment Profiling<br /><ul><li>Tell INSIGHT about your environment topography, for instance:
    3. 3. Import info from your network asset mgt solution or network / web scanner
    4. 4. Provide a range of IPs
    5. 5. Provide a range of web application URLs
    6. 6. Provide a list of end user email addresses</li></li></ul><li>How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 2: Campaign Definition<br /><ul><li>Define the goal of the INSIGHT assessment campaign (e.g., access a specific customer database).
    7. 7. Define the scope of systems to be tested (e.g., a specific subnet).
    8. 8. Define which systems are in and out of bounds for the campaign
    9. 9. Optionally, delegate campaigns to IT staff who own the systems, web app developers, etc.
    10. 10. Establish the campaign schedule (e.g., once, daily, weekly, etc.).</li></ul>2. Campaign Definition<br />You define critical IT assets (aka goals), scope and timing.<br />GOAL<br />
    11. 11. How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 3: Attack Path Calculation<br /><ul><li>INSIGHT profiles systems defined by the campaign and identifies potentially vulnerable systems.
    12. 12. INSIGHT’s attack planning algorithm combines knowledge of system profiles with GPS-like intelligence to determine most likely path(s) to achieve the campaign goal.
    13. 13. INSIGHT weights potential paths based on exploit efficacy, leveraging CORE IMPACT’s usage statistics and our unique research and field expertise.</li></ul>2. Campaign Definition<br />You define critical IT assets (aka goals), scope and timing.<br />GOAL<br />3. Attack Path Calculation<br />INSIGHT calculates likely attack paths to your defined assets.<br />
    14. 14. How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 4: Attack Replication<br /><ul><li>CORE INSIGHT’s Exploit Engine replicates an attacker’s attempts at compromising systems along the paths.
    15. 15. Can target web applications, network systems, endpoint systems and end users (via phishing).
    16. 16. All exploits are commercial-grade, developed in-house, and repeatedly updated, QAed and tested.
    17. 17. Product receives 20-30 new exploits and other modules per month.</li></ul>2. Campaign Definition<br />You define critical IT assets (aka goals), scope and timing.<br />GOAL<br />3. Attack Path Calculation<br />INSIGHT calculates likely attack paths to your defined assets.<br />4. Attack Replication<br />INSIGHT attempts to exploit vulnerabilities along the paths.<br />
    18. 18. How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 5: Adaptive Path Adjustment<br /><ul><li>Uses GPS-like intelligence to adjust and recalculate Attack Paths as it attempts to compromise systems, like an attacker would.
    19. 19. Stays “in bounds” as defined in the campaign.
    20. 20. Only tests calculated attack paths
    21. 21. Less disruptive than scanning
    22. 22. Stealthy attacker behavior</li></ul>2. Campaign Definition<br />You define critical IT assets (aka goals), scope and timing.<br />GOAL<br />3. Attack Path Calculation<br />INSIGHT calculates likely attack paths to your defined assets.<br />5. Adaptive Path Adjustment<br />INSIGHT seeks new paths as systems are compromised.<br />4. Attack Replication<br />INSIGHT attempts to exploit vulnerabilities along the paths.<br />
    23. 23. How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 6: Infrastructure Change<br /><ul><li>Newly deployed systems that fall within the scope of a campaign (e.g., and IP range) can automatically be tested the next time a campaign is run.
    24. 24. Ensures that security tests keep up with your changing environment</li></ul>2. Campaign Definition<br />You define critical IT assets (aka goals), scope and timing.<br />GOAL<br />3. Attack Path Calculation<br />INSIGHT calculates likely attack paths to your defined assets.<br />6. Infrastructure Change<br />Campaigns can automatically adapt as you deploy new systems. <br />5. Adaptive Path Adjustment<br />INSIGHT seeks new paths as systems are compromised.<br />New system added to environment! <br />4. Attack Replication<br />INSIGHT attempts to exploit vulnerabilities along the paths.<br />
    25. 25. How CORE INSIGHT Enterprise Works<br />1. Environment Profiling<br />Tell INSIGHT about your environment.<br />Step 7: Dashboard / Reporting<br /><ul><li>Details real potential for breach of critical assets with no false positives.
    26. 26. Shows where defenses stop attacks.
    27. 27. Reveals exposures to attacks that combine different techniques and vectors.
    28. 28. Details attack paths and penetration points for remediation planning.</li></ul>2. Campaign Definition<br />You define critical IT assets (aka goals), scope and timing.<br />7. Dashboard / Reporting<br />INSIGHT presents findings in terms relevant to your organization.<br />3. Attack Path Calculation<br />INSIGHT calculates likely attack paths to your defined assets.<br />6. Infrastructure Change<br />Campaigns can automatically adapt as you deploy new systems. <br />5. Adaptive Path Adjustment<br />INSIGHT seeks new paths as systems are compromised.<br />4. Attack Replication<br />INSIGHT attempts to exploit vulnerabilities along the paths.<br />

    ×