CREST Certified for Penetration Testing
Listed on CB Insights "TOP 12 CYBER TECH COMPANIES TRANSFORMING THE CYBER INDUSTRY" and CYBERSECURITY 500 - WORLD’S HOTTEST CYBERSECURITY COMPANIES
Availaible through Data Shepherd and a Managed Security Service
1. www.cronus-cyber.com | April 2016
CyBot Suite
Always in Control
Machine-Based Penetration Testing
Cronus-cyber.com Dec 2016
2. www.cronus-cyber.com | April 2016
CyBot
PRODUCT
SUITE
• Unique, patented Machine-based Penetration Testing Software with Global Attack
Path Scenarios (APS) product suite:
• CyBot Pro
• CyBot Enterprise
• Gives organizations the technical and security business intelligence data required to:
• Evaluate resilience to cyber threats
• Mitigate sophisticated cyber attacks
• Accurately invest in the best cyber security strategy
Cronus-cyber.com Dec 2016
3. www.cronus-cyber.com | April 2016
• Imitates human hackers to perform around-the-clock
machine-based penetration testing.
• Scans all IP-based components – infrastructure,
applications, and databases.
• Exposes vulnerabilities and complex Attack Path
Scenarios in real-time.
• Uses patented silent and fast scanning technology
that does not disrupt critical systems and IoT.
• Checks up to 1 million Attack Path Scenarios in
three hours.
• Analyzes the data and provides a dynamic risk map
to mitigate the risk of cyber attacks.
• Already runs on approximately 20K machines.
Cronus-cyber.com Dec 2016
4. www.cronus-cyber.com | April 2016
CyBot PRO
Dashboard
Dashboard features:
• Network Status
• Network Status Trends
• Attack Path Scenarios status
Cronus-cyber.com Dec 2016
5. www.cronus-cyber.com | April 2016
CyBot PRO
Network Assets
Scan details:
• List of network assets
• Scan findings for each asset
• Scan profile details
Cronus-cyber.com Dec 2016
6. www.cronus-cyber.com | April 2016
CyBot PRO
Asset Details
Asset details:
• Asset (computer) attributes
• Associated Attack Path Scenarios
• Ports and services
• Asset vulnerabilities
Cronus-cyber.com Dec 2016
7. www.cronus-cyber.com | April 2016
CyBot PRO
Attack Path Scenarios Report
Attack Path Scenarios:
• List of Attack Path Scenarios
• Attack Path Scenario graphic presentation
• Related exploitable vulnerabilities
Cronus-cyber.com Dec 2016
8. www.cronus-cyber.com | April 2016
CyBot PRO
Vulnerabilities Report
Host’s detected vulnerabilities:
• List of vulnerabilities
• Organized by severity
• Commonality and age
Cronus-cyber.com Dec 2016
9. www.cronus-cyber.com | April 2016
CyBot PRO
Recommended Remediations
Vulnerability details:
• Severity and classification
• Technical description
• Recommended Remediations
Cronus-cyber.com Dec 2016
10. www.cronus-cyber.com | April 2016
• Centralized cyber security management
solution to manage multiple CyBot Pros
dispersed in your global network.
• Bridges geographical, language, and cultural
gaps inherent to global organizations.
• Creates complex global Attack Path Scenarios
involving multiple sites and subnets.
• Unified dashboard with comprehensive global
risk map depicting all environments.
• Ability to zoom in and out to control data
resolution based on specific needs.
Cronus-cyber.com Dec 2016
11. www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
CyBot Pro Management
Presents the status of CyBot Pro instances in a specific subnet.
Cronus-cyber.com Dec 2016
12. www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Dashboard
• High-level global risk map of environments
• Enables drill-down into specific business units to investigate:
• Specific security issues
• Their origin
• Possible mitigation options
Cronus-cyber.com Dec 2016
13. www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Prioritized Attack Path Scenarios
• Presents potential local and global Attack Path Scenarios
• Prioritized by:
• Type of targeted asset
• Cross-subnets path features
• Difficulty of performing the Attack Path
• Level of risk-path escalation
Cronus-cyber.com Dec 2016
14. www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Global Attack Path Scenarios
• Presents specific potential local and global Attack Path Scenarios
• Based on discovered vulnerabilities across multiple systems and subnets
Cronus-cyber.com Dec 2016
15. www.cronus-cyber.com | April 2016
CONTINUOUS
Perform continuous penetration testing all
year round, not just once a year, including
continuous vulnerability assessment for full
control of your network 24/7, to react
immediately
BUSINESS-DRIVEN SECURITY
Build an efficient information
security policy using business-
based Attack Path Scenarios.
BE EFFICIENT
Unlike human penetration testers
that reach 0.5-10 assets per day,
CyBot Pro can reach hundreds of
thousands of assets per day
GLOBAL
The CyBot Enterprise has a unique
ability unlike any other PT and VA
solution to provide a full global view
of your network's risks
SAVE MONEY
Invest more wisely and
efficiently in security
technologies to reduce costs
and increase security.
PRIORITIZE THREATS
Benefit from multiple tools to
prioritize threats, including the
creation of cause and effect
Attack Path Scenarios.
BENEFITS
Cronus-cyber.com Dec 2016