SlideShare a Scribd company logo
1 of 15
Download to read offline
www.cronus-cyber.com | April 2016
CyBot Suite
Always in Control
Machine-Based Penetration Testing
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot
PRODUCT
SUITE
• Unique, patented Machine-based Penetration Testing Software with Global Attack
Path Scenarios (APS) product suite:
• CyBot Pro
• CyBot Enterprise
• Gives organizations the technical and security business intelligence data required to:
• Evaluate resilience to cyber threats
• Mitigate sophisticated cyber attacks
• Accurately invest in the best cyber security strategy
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
• Imitates human hackers to perform around-the-clock
machine-based penetration testing.
• Scans all IP-based components – infrastructure,
applications, and databases.
• Exposes vulnerabilities and complex Attack Path
Scenarios in real-time.
• Uses patented silent and fast scanning technology
that does not disrupt critical systems and IoT.
• Checks up to 1 million Attack Path Scenarios in
three hours.
• Analyzes the data and provides a dynamic risk map
to mitigate the risk of cyber attacks.
• Already runs on approximately 20K machines.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Dashboard
Dashboard features:
• Network Status
• Network Status Trends
• Attack Path Scenarios status
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Network Assets
Scan details:
• List of network assets
• Scan findings for each asset
• Scan profile details
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Asset Details
Asset details:
• Asset (computer) attributes
• Associated Attack Path Scenarios
• Ports and services
• Asset vulnerabilities
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Attack Path Scenarios Report
Attack Path Scenarios:
• List of Attack Path Scenarios
• Attack Path Scenario graphic presentation
• Related exploitable vulnerabilities
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Vulnerabilities Report
Host’s detected vulnerabilities:
• List of vulnerabilities
• Organized by severity
• Commonality and age
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Recommended Remediations
Vulnerability details:
• Severity and classification
• Technical description
• Recommended Remediations
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
• Centralized cyber security management
solution to manage multiple CyBot Pros
dispersed in your global network.
• Bridges geographical, language, and cultural
gaps inherent to global organizations.
• Creates complex global Attack Path Scenarios
involving multiple sites and subnets.
• Unified dashboard with comprehensive global
risk map depicting all environments.
• Ability to zoom in and out to control data
resolution based on specific needs.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
CyBot Pro Management
Presents the status of CyBot Pro instances in a specific subnet.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Dashboard
• High-level global risk map of environments
• Enables drill-down into specific business units to investigate:
• Specific security issues
• Their origin
• Possible mitigation options
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Prioritized Attack Path Scenarios
• Presents potential local and global Attack Path Scenarios
• Prioritized by:
• Type of targeted asset
• Cross-subnets path features
• Difficulty of performing the Attack Path
• Level of risk-path escalation
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Global Attack Path Scenarios
• Presents specific potential local and global Attack Path Scenarios
• Based on discovered vulnerabilities across multiple systems and subnets
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CONTINUOUS
Perform continuous penetration testing all
year round, not just once a year, including
continuous vulnerability assessment for full
control of your network 24/7, to react
immediately
BUSINESS-DRIVEN SECURITY
Build an efficient information
security policy using business-
based Attack Path Scenarios.
BE EFFICIENT
Unlike human penetration testers
that reach 0.5-10 assets per day,
CyBot Pro can reach hundreds of
thousands of assets per day
GLOBAL
The CyBot Enterprise has a unique
ability unlike any other PT and VA
solution to provide a full global view
of your network's risks
SAVE MONEY
Invest more wisely and
efficiently in security
technologies to reduce costs
and increase security.
PRIORITIZE THREATS
Benefit from multiple tools to
prioritize threats, including the
creation of cause and effect
Attack Path Scenarios.
BENEFITS
Cronus-cyber.com Dec 2016

More Related Content

Similar to Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan.

SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)Priyanka Aash
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Fernando Montenegro
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerEnrique Gustavo Dutra
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh ShregillAgileNetwork
 
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...Docker, Inc.
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Kai Wähner
 
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...Amazon Web Services
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Centralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CMCentralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CMSerena Software
 
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Kai Wähner
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...Kai Wähner
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 

Similar to Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan. (20)

SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
 
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
 
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Centralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CMCentralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CM
 
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 

More from Jason Newell

Why virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersWhy virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersJason Newell
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentationJason Newell
 
Cloud Cover 365 user introduction
Cloud Cover 365 user introductionCloud Cover 365 user introduction
Cloud Cover 365 user introductionJason Newell
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made EasyJason Newell
 
Reblaze Web Application Firewall
Reblaze Web Application FirewallReblaze Web Application Firewall
Reblaze Web Application FirewallJason Newell
 
Protect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeProtect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeJason Newell
 
DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd SecurityJason Newell
 
DS - Portnox_Unique Advantages
DS - Portnox_Unique AdvantagesDS - Portnox_Unique Advantages
DS - Portnox_Unique AdvantagesJason Newell
 

More from Jason Newell (11)

Why virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersWhy virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellers
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentation
 
Reseller Benefits
Reseller BenefitsReseller Benefits
Reseller Benefits
 
Cloud Cover 365 user introduction
Cloud Cover 365 user introductionCloud Cover 365 user introduction
Cloud Cover 365 user introduction
 
DaaS introduction
DaaS introductionDaaS introduction
DaaS introduction
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made Easy
 
Reblaze Web Application Firewall
Reblaze Web Application FirewallReblaze Web Application Firewall
Reblaze Web Application Firewall
 
Protect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeProtect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with Reblaze
 
DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd Security
 
DS - Portnox_Unique Advantages
DS - Portnox_Unique AdvantagesDS - Portnox_Unique Advantages
DS - Portnox_Unique Advantages
 
Hosted Exchange
Hosted ExchangeHosted Exchange
Hosted Exchange
 

Recently uploaded

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan.

  • 1. www.cronus-cyber.com | April 2016 CyBot Suite Always in Control Machine-Based Penetration Testing Cronus-cyber.com Dec 2016
  • 2. www.cronus-cyber.com | April 2016 CyBot PRODUCT SUITE • Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: • CyBot Pro • CyBot Enterprise • Gives organizations the technical and security business intelligence data required to: • Evaluate resilience to cyber threats • Mitigate sophisticated cyber attacks • Accurately invest in the best cyber security strategy Cronus-cyber.com Dec 2016
  • 3. www.cronus-cyber.com | April 2016 • Imitates human hackers to perform around-the-clock machine-based penetration testing. • Scans all IP-based components – infrastructure, applications, and databases. • Exposes vulnerabilities and complex Attack Path Scenarios in real-time. • Uses patented silent and fast scanning technology that does not disrupt critical systems and IoT. • Checks up to 1 million Attack Path Scenarios in three hours. • Analyzes the data and provides a dynamic risk map to mitigate the risk of cyber attacks. • Already runs on approximately 20K machines. Cronus-cyber.com Dec 2016
  • 4. www.cronus-cyber.com | April 2016 CyBot PRO Dashboard Dashboard features: • Network Status • Network Status Trends • Attack Path Scenarios status Cronus-cyber.com Dec 2016
  • 5. www.cronus-cyber.com | April 2016 CyBot PRO Network Assets Scan details: • List of network assets • Scan findings for each asset • Scan profile details Cronus-cyber.com Dec 2016
  • 6. www.cronus-cyber.com | April 2016 CyBot PRO Asset Details Asset details: • Asset (computer) attributes • Associated Attack Path Scenarios • Ports and services • Asset vulnerabilities Cronus-cyber.com Dec 2016
  • 7. www.cronus-cyber.com | April 2016 CyBot PRO Attack Path Scenarios Report Attack Path Scenarios: • List of Attack Path Scenarios • Attack Path Scenario graphic presentation • Related exploitable vulnerabilities Cronus-cyber.com Dec 2016
  • 8. www.cronus-cyber.com | April 2016 CyBot PRO Vulnerabilities Report Host’s detected vulnerabilities: • List of vulnerabilities • Organized by severity • Commonality and age Cronus-cyber.com Dec 2016
  • 9. www.cronus-cyber.com | April 2016 CyBot PRO Recommended Remediations Vulnerability details: • Severity and classification • Technical description • Recommended Remediations Cronus-cyber.com Dec 2016
  • 10. www.cronus-cyber.com | April 2016 • Centralized cyber security management solution to manage multiple CyBot Pros dispersed in your global network. • Bridges geographical, language, and cultural gaps inherent to global organizations. • Creates complex global Attack Path Scenarios involving multiple sites and subnets. • Unified dashboard with comprehensive global risk map depicting all environments. • Ability to zoom in and out to control data resolution based on specific needs. Cronus-cyber.com Dec 2016
  • 11. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE CyBot Pro Management Presents the status of CyBot Pro instances in a specific subnet. Cronus-cyber.com Dec 2016
  • 12. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE Dashboard • High-level global risk map of environments • Enables drill-down into specific business units to investigate: • Specific security issues • Their origin • Possible mitigation options Cronus-cyber.com Dec 2016
  • 13. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE Prioritized Attack Path Scenarios • Presents potential local and global Attack Path Scenarios • Prioritized by: • Type of targeted asset • Cross-subnets path features • Difficulty of performing the Attack Path • Level of risk-path escalation Cronus-cyber.com Dec 2016
  • 14. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE Global Attack Path Scenarios • Presents specific potential local and global Attack Path Scenarios • Based on discovered vulnerabilities across multiple systems and subnets Cronus-cyber.com Dec 2016
  • 15. www.cronus-cyber.com | April 2016 CONTINUOUS Perform continuous penetration testing all year round, not just once a year, including continuous vulnerability assessment for full control of your network 24/7, to react immediately BUSINESS-DRIVEN SECURITY Build an efficient information security policy using business- based Attack Path Scenarios. BE EFFICIENT Unlike human penetration testers that reach 0.5-10 assets per day, CyBot Pro can reach hundreds of thousands of assets per day GLOBAL The CyBot Enterprise has a unique ability unlike any other PT and VA solution to provide a full global view of your network's risks SAVE MONEY Invest more wisely and efficiently in security technologies to reduce costs and increase security. PRIORITIZE THREATS Benefit from multiple tools to prioritize threats, including the creation of cause and effect Attack Path Scenarios. BENEFITS Cronus-cyber.com Dec 2016