SlideShare a Scribd company logo
www.cronus-cyber.com | April 2016
CyBot Suite
Always in Control
Machine-Based Penetration Testing
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot
PRODUCT
SUITE
• Unique, patented Machine-based Penetration Testing Software with Global Attack
Path Scenarios (APS) product suite:
• CyBot Pro
• CyBot Enterprise
• Gives organizations the technical and security business intelligence data required to:
• Evaluate resilience to cyber threats
• Mitigate sophisticated cyber attacks
• Accurately invest in the best cyber security strategy
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
• Imitates human hackers to perform around-the-clock
machine-based penetration testing.
• Scans all IP-based components – infrastructure,
applications, and databases.
• Exposes vulnerabilities and complex Attack Path
Scenarios in real-time.
• Uses patented silent and fast scanning technology
that does not disrupt critical systems and IoT.
• Checks up to 1 million Attack Path Scenarios in
three hours.
• Analyzes the data and provides a dynamic risk map
to mitigate the risk of cyber attacks.
• Already runs on approximately 20K machines.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Dashboard
Dashboard features:
• Network Status
• Network Status Trends
• Attack Path Scenarios status
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Network Assets
Scan details:
• List of network assets
• Scan findings for each asset
• Scan profile details
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Asset Details
Asset details:
• Asset (computer) attributes
• Associated Attack Path Scenarios
• Ports and services
• Asset vulnerabilities
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Attack Path Scenarios Report
Attack Path Scenarios:
• List of Attack Path Scenarios
• Attack Path Scenario graphic presentation
• Related exploitable vulnerabilities
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Vulnerabilities Report
Host’s detected vulnerabilities:
• List of vulnerabilities
• Organized by severity
• Commonality and age
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Recommended Remediations
Vulnerability details:
• Severity and classification
• Technical description
• Recommended Remediations
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
• Centralized cyber security management
solution to manage multiple CyBot Pros
dispersed in your global network.
• Bridges geographical, language, and cultural
gaps inherent to global organizations.
• Creates complex global Attack Path Scenarios
involving multiple sites and subnets.
• Unified dashboard with comprehensive global
risk map depicting all environments.
• Ability to zoom in and out to control data
resolution based on specific needs.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
CyBot Pro Management
Presents the status of CyBot Pro instances in a specific subnet.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Dashboard
• High-level global risk map of environments
• Enables drill-down into specific business units to investigate:
• Specific security issues
• Their origin
• Possible mitigation options
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Prioritized Attack Path Scenarios
• Presents potential local and global Attack Path Scenarios
• Prioritized by:
• Type of targeted asset
• Cross-subnets path features
• Difficulty of performing the Attack Path
• Level of risk-path escalation
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Global Attack Path Scenarios
• Presents specific potential local and global Attack Path Scenarios
• Based on discovered vulnerabilities across multiple systems and subnets
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CONTINUOUS
Perform continuous penetration testing all
year round, not just once a year, including
continuous vulnerability assessment for full
control of your network 24/7, to react
immediately
BUSINESS-DRIVEN SECURITY
Build an efficient information
security policy using business-
based Attack Path Scenarios.
BE EFFICIENT
Unlike human penetration testers
that reach 0.5-10 assets per day,
CyBot Pro can reach hundreds of
thousands of assets per day
GLOBAL
The CyBot Enterprise has a unique
ability unlike any other PT and VA
solution to provide a full global view
of your network's risks
SAVE MONEY
Invest more wisely and
efficiently in security
technologies to reduce costs
and increase security.
PRIORITIZE THREATS
Benefit from multiple tools to
prioritize threats, including the
creation of cause and effect
Attack Path Scenarios.
BENEFITS
Cronus-cyber.com Dec 2016

More Related Content

Similar to Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan.

SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)Priyanka Aash
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíMarketingArrowECS_CZ
 
Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Fernando Montenegro
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerEnrique Gustavo Dutra
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh ShregillAgileNetwork
 
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...Docker, Inc.
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Kai Wähner
 
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...Amazon Web Services
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Centralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CMCentralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CMSerena Software
 
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Kai Wähner
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...Kai Wähner
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudPaulo Renato
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarAdelaide Hill
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 

Similar to Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan. (20)

SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)SACON - Incident Response Automation & Orchestration (Amit Modi)
SACON - Incident Response Automation & Orchestration (Amit Modi)
 
Symantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucíSymantec: čas přítomný a budoucí
Symantec: čas přítomný a budoucí
 
Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?Evolution of Container Security - What's Next?
Evolution of Container Security - What's Next?
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps  - The What and the Why | Ritesh ShregillAgile Network India | DevSecOps  - The What and the Why | Ritesh Shregill
Agile Network India | DevSecOps - The What and the Why | Ritesh Shregill
 
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
Using the SDACK Architecture on Security Event Inspection by Yu-Lun Chen and ...
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
 
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
CI/CD best practices for building modern applications - MAD301 - Santa Clara ...
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Centralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CMCentralized Secure Vault with Dimensions CM
Centralized Secure Vault with Dimensions CM
 
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
Flink Forward Berlin 2018: Yonatan Most & Avihai Berkovitz - "Anomaly Detecti...
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence WebinarEnhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
Enhancing Your Security Infrastructure with Infoblox Threat Intelligence Webinar
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Building a Hacker Resistant Network
Building a Hacker Resistant Network Building a Hacker Resistant Network
Building a Hacker Resistant Network
 

More from Jason Newell

Why virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersWhy virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersJason Newell
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentationJason Newell
 
Cloud Cover 365 user introduction
Cloud Cover 365 user introductionCloud Cover 365 user introduction
Cloud Cover 365 user introductionJason Newell
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made EasyJason Newell
 
Reblaze Web Application Firewall
Reblaze Web Application FirewallReblaze Web Application Firewall
Reblaze Web Application FirewallJason Newell
 
Protect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeProtect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeJason Newell
 
DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd SecurityJason Newell
 
DS - Portnox_Unique Advantages
DS - Portnox_Unique AdvantagesDS - Portnox_Unique Advantages
DS - Portnox_Unique AdvantagesJason Newell
 

More from Jason Newell (11)

Why virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellersWhy virtualDCS for existing Veeam resellers
Why virtualDCS for existing Veeam resellers
 
Nimbox presentation
Nimbox presentationNimbox presentation
Nimbox presentation
 
Reseller Benefits
Reseller BenefitsReseller Benefits
Reseller Benefits
 
Cloud Cover 365 user introduction
Cloud Cover 365 user introductionCloud Cover 365 user introduction
Cloud Cover 365 user introduction
 
DaaS introduction
DaaS introductionDaaS introduction
DaaS introduction
 
Certificate Management Made Easy
Certificate Management Made EasyCertificate Management Made Easy
Certificate Management Made Easy
 
Reblaze Web Application Firewall
Reblaze Web Application FirewallReblaze Web Application Firewall
Reblaze Web Application Firewall
 
Protect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with ReblazeProtect Websites against DDoS attacks with Reblaze
Protect Websites against DDoS attacks with Reblaze
 
DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd Security
 
DS - Portnox_Unique Advantages
DS - Portnox_Unique AdvantagesDS - Portnox_Unique Advantages
DS - Portnox_Unique Advantages
 
Hosted Exchange
Hosted ExchangeHosted Exchange
Hosted Exchange
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Alison B. Lowndes
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...Elena Simperl
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...Product School
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 

Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan.

  • 1. www.cronus-cyber.com | April 2016 CyBot Suite Always in Control Machine-Based Penetration Testing Cronus-cyber.com Dec 2016
  • 2. www.cronus-cyber.com | April 2016 CyBot PRODUCT SUITE • Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: • CyBot Pro • CyBot Enterprise • Gives organizations the technical and security business intelligence data required to: • Evaluate resilience to cyber threats • Mitigate sophisticated cyber attacks • Accurately invest in the best cyber security strategy Cronus-cyber.com Dec 2016
  • 3. www.cronus-cyber.com | April 2016 • Imitates human hackers to perform around-the-clock machine-based penetration testing. • Scans all IP-based components – infrastructure, applications, and databases. • Exposes vulnerabilities and complex Attack Path Scenarios in real-time. • Uses patented silent and fast scanning technology that does not disrupt critical systems and IoT. • Checks up to 1 million Attack Path Scenarios in three hours. • Analyzes the data and provides a dynamic risk map to mitigate the risk of cyber attacks. • Already runs on approximately 20K machines. Cronus-cyber.com Dec 2016
  • 4. www.cronus-cyber.com | April 2016 CyBot PRO Dashboard Dashboard features: • Network Status • Network Status Trends • Attack Path Scenarios status Cronus-cyber.com Dec 2016
  • 5. www.cronus-cyber.com | April 2016 CyBot PRO Network Assets Scan details: • List of network assets • Scan findings for each asset • Scan profile details Cronus-cyber.com Dec 2016
  • 6. www.cronus-cyber.com | April 2016 CyBot PRO Asset Details Asset details: • Asset (computer) attributes • Associated Attack Path Scenarios • Ports and services • Asset vulnerabilities Cronus-cyber.com Dec 2016
  • 7. www.cronus-cyber.com | April 2016 CyBot PRO Attack Path Scenarios Report Attack Path Scenarios: • List of Attack Path Scenarios • Attack Path Scenario graphic presentation • Related exploitable vulnerabilities Cronus-cyber.com Dec 2016
  • 8. www.cronus-cyber.com | April 2016 CyBot PRO Vulnerabilities Report Host’s detected vulnerabilities: • List of vulnerabilities • Organized by severity • Commonality and age Cronus-cyber.com Dec 2016
  • 9. www.cronus-cyber.com | April 2016 CyBot PRO Recommended Remediations Vulnerability details: • Severity and classification • Technical description • Recommended Remediations Cronus-cyber.com Dec 2016
  • 10. www.cronus-cyber.com | April 2016 • Centralized cyber security management solution to manage multiple CyBot Pros dispersed in your global network. • Bridges geographical, language, and cultural gaps inherent to global organizations. • Creates complex global Attack Path Scenarios involving multiple sites and subnets. • Unified dashboard with comprehensive global risk map depicting all environments. • Ability to zoom in and out to control data resolution based on specific needs. Cronus-cyber.com Dec 2016
  • 11. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE CyBot Pro Management Presents the status of CyBot Pro instances in a specific subnet. Cronus-cyber.com Dec 2016
  • 12. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE Dashboard • High-level global risk map of environments • Enables drill-down into specific business units to investigate: • Specific security issues • Their origin • Possible mitigation options Cronus-cyber.com Dec 2016
  • 13. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE Prioritized Attack Path Scenarios • Presents potential local and global Attack Path Scenarios • Prioritized by: • Type of targeted asset • Cross-subnets path features • Difficulty of performing the Attack Path • Level of risk-path escalation Cronus-cyber.com Dec 2016
  • 14. www.cronus-cyber.com | April 2016 CyBot ENTERPRISE Global Attack Path Scenarios • Presents specific potential local and global Attack Path Scenarios • Based on discovered vulnerabilities across multiple systems and subnets Cronus-cyber.com Dec 2016
  • 15. www.cronus-cyber.com | April 2016 CONTINUOUS Perform continuous penetration testing all year round, not just once a year, including continuous vulnerability assessment for full control of your network 24/7, to react immediately BUSINESS-DRIVEN SECURITY Build an efficient information security policy using business- based Attack Path Scenarios. BE EFFICIENT Unlike human penetration testers that reach 0.5-10 assets per day, CyBot Pro can reach hundreds of thousands of assets per day GLOBAL The CyBot Enterprise has a unique ability unlike any other PT and VA solution to provide a full global view of your network's risks SAVE MONEY Invest more wisely and efficiently in security technologies to reduce costs and increase security. PRIORITIZE THREATS Benefit from multiple tools to prioritize threats, including the creation of cause and effect Attack Path Scenarios. BENEFITS Cronus-cyber.com Dec 2016