www.cronus-cyber.com | April 2016
CyBot Suite
Always in Control
Machine-Based Penetration Testing
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot
PRODUCT
SUITE
• Unique, patented Machine-based Penetration Testing Software with Global Attack
Path Scenarios (APS) product suite:
• CyBot Pro
• CyBot Enterprise
• Gives organizations the technical and security business intelligence data required to:
• Evaluate resilience to cyber threats
• Mitigate sophisticated cyber attacks
• Accurately invest in the best cyber security strategy
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
• Imitates human hackers to perform around-the-clock
machine-based penetration testing.
• Scans all IP-based components – infrastructure,
applications, and databases.
• Exposes vulnerabilities and complex Attack Path
Scenarios in real-time.
• Uses patented silent and fast scanning technology
that does not disrupt critical systems and IoT.
• Checks up to 1 million Attack Path Scenarios in
three hours.
• Analyzes the data and provides a dynamic risk map
to mitigate the risk of cyber attacks.
• Already runs on approximately 20K machines.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Dashboard
Dashboard features:
• Network Status
• Network Status Trends
• Attack Path Scenarios status
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Network Assets
Scan details:
• List of network assets
• Scan findings for each asset
• Scan profile details
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Asset Details
Asset details:
• Asset (computer) attributes
• Associated Attack Path Scenarios
• Ports and services
• Asset vulnerabilities
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Attack Path Scenarios Report
Attack Path Scenarios:
• List of Attack Path Scenarios
• Attack Path Scenario graphic presentation
• Related exploitable vulnerabilities
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Vulnerabilities Report
Host’s detected vulnerabilities:
• List of vulnerabilities
• Organized by severity
• Commonality and age
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot PRO
Recommended Remediations
Vulnerability details:
• Severity and classification
• Technical description
• Recommended Remediations
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
• Centralized cyber security management
solution to manage multiple CyBot Pros
dispersed in your global network.
• Bridges geographical, language, and cultural
gaps inherent to global organizations.
• Creates complex global Attack Path Scenarios
involving multiple sites and subnets.
• Unified dashboard with comprehensive global
risk map depicting all environments.
• Ability to zoom in and out to control data
resolution based on specific needs.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
CyBot Pro Management
Presents the status of CyBot Pro instances in a specific subnet.
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Dashboard
• High-level global risk map of environments
• Enables drill-down into specific business units to investigate:
• Specific security issues
• Their origin
• Possible mitigation options
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Prioritized Attack Path Scenarios
• Presents potential local and global Attack Path Scenarios
• Prioritized by:
• Type of targeted asset
• Cross-subnets path features
• Difficulty of performing the Attack Path
• Level of risk-path escalation
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CyBot ENTERPRISE
Global Attack Path Scenarios
• Presents specific potential local and global Attack Path Scenarios
• Based on discovered vulnerabilities across multiple systems and subnets
Cronus-cyber.com Dec 2016
www.cronus-cyber.com | April 2016
CONTINUOUS
Perform continuous penetration testing all
year round, not just once a year, including
continuous vulnerability assessment for full
control of your network 24/7, to react
immediately
BUSINESS-DRIVEN SECURITY
Build an efficient information
security policy using business-
based Attack Path Scenarios.
BE EFFICIENT
Unlike human penetration testers
that reach 0.5-10 assets per day,
CyBot Pro can reach hundreds of
thousands of assets per day
GLOBAL
The CyBot Enterprise has a unique
ability unlike any other PT and VA
solution to provide a full global view
of your network's risks
SAVE MONEY
Invest more wisely and
efficiently in security
technologies to reduce costs
and increase security.
PRIORITIZE THREATS
Benefit from multiple tools to
prioritize threats, including the
creation of cause and effect
Attack Path Scenarios.
BENEFITS
Cronus-cyber.com Dec 2016

Cronus Cyber Technologies CyBot - CREST Accredited Continuous Vulnerability Scan.

  • 1.
    www.cronus-cyber.com | April2016 CyBot Suite Always in Control Machine-Based Penetration Testing Cronus-cyber.com Dec 2016
  • 2.
    www.cronus-cyber.com | April2016 CyBot PRODUCT SUITE • Unique, patented Machine-based Penetration Testing Software with Global Attack Path Scenarios (APS) product suite: • CyBot Pro • CyBot Enterprise • Gives organizations the technical and security business intelligence data required to: • Evaluate resilience to cyber threats • Mitigate sophisticated cyber attacks • Accurately invest in the best cyber security strategy Cronus-cyber.com Dec 2016
  • 3.
    www.cronus-cyber.com | April2016 • Imitates human hackers to perform around-the-clock machine-based penetration testing. • Scans all IP-based components – infrastructure, applications, and databases. • Exposes vulnerabilities and complex Attack Path Scenarios in real-time. • Uses patented silent and fast scanning technology that does not disrupt critical systems and IoT. • Checks up to 1 million Attack Path Scenarios in three hours. • Analyzes the data and provides a dynamic risk map to mitigate the risk of cyber attacks. • Already runs on approximately 20K machines. Cronus-cyber.com Dec 2016
  • 4.
    www.cronus-cyber.com | April2016 CyBot PRO Dashboard Dashboard features: • Network Status • Network Status Trends • Attack Path Scenarios status Cronus-cyber.com Dec 2016
  • 5.
    www.cronus-cyber.com | April2016 CyBot PRO Network Assets Scan details: • List of network assets • Scan findings for each asset • Scan profile details Cronus-cyber.com Dec 2016
  • 6.
    www.cronus-cyber.com | April2016 CyBot PRO Asset Details Asset details: • Asset (computer) attributes • Associated Attack Path Scenarios • Ports and services • Asset vulnerabilities Cronus-cyber.com Dec 2016
  • 7.
    www.cronus-cyber.com | April2016 CyBot PRO Attack Path Scenarios Report Attack Path Scenarios: • List of Attack Path Scenarios • Attack Path Scenario graphic presentation • Related exploitable vulnerabilities Cronus-cyber.com Dec 2016
  • 8.
    www.cronus-cyber.com | April2016 CyBot PRO Vulnerabilities Report Host’s detected vulnerabilities: • List of vulnerabilities • Organized by severity • Commonality and age Cronus-cyber.com Dec 2016
  • 9.
    www.cronus-cyber.com | April2016 CyBot PRO Recommended Remediations Vulnerability details: • Severity and classification • Technical description • Recommended Remediations Cronus-cyber.com Dec 2016
  • 10.
    www.cronus-cyber.com | April2016 • Centralized cyber security management solution to manage multiple CyBot Pros dispersed in your global network. • Bridges geographical, language, and cultural gaps inherent to global organizations. • Creates complex global Attack Path Scenarios involving multiple sites and subnets. • Unified dashboard with comprehensive global risk map depicting all environments. • Ability to zoom in and out to control data resolution based on specific needs. Cronus-cyber.com Dec 2016
  • 11.
    www.cronus-cyber.com | April2016 CyBot ENTERPRISE CyBot Pro Management Presents the status of CyBot Pro instances in a specific subnet. Cronus-cyber.com Dec 2016
  • 12.
    www.cronus-cyber.com | April2016 CyBot ENTERPRISE Dashboard • High-level global risk map of environments • Enables drill-down into specific business units to investigate: • Specific security issues • Their origin • Possible mitigation options Cronus-cyber.com Dec 2016
  • 13.
    www.cronus-cyber.com | April2016 CyBot ENTERPRISE Prioritized Attack Path Scenarios • Presents potential local and global Attack Path Scenarios • Prioritized by: • Type of targeted asset • Cross-subnets path features • Difficulty of performing the Attack Path • Level of risk-path escalation Cronus-cyber.com Dec 2016
  • 14.
    www.cronus-cyber.com | April2016 CyBot ENTERPRISE Global Attack Path Scenarios • Presents specific potential local and global Attack Path Scenarios • Based on discovered vulnerabilities across multiple systems and subnets Cronus-cyber.com Dec 2016
  • 15.
    www.cronus-cyber.com | April2016 CONTINUOUS Perform continuous penetration testing all year round, not just once a year, including continuous vulnerability assessment for full control of your network 24/7, to react immediately BUSINESS-DRIVEN SECURITY Build an efficient information security policy using business- based Attack Path Scenarios. BE EFFICIENT Unlike human penetration testers that reach 0.5-10 assets per day, CyBot Pro can reach hundreds of thousands of assets per day GLOBAL The CyBot Enterprise has a unique ability unlike any other PT and VA solution to provide a full global view of your network's risks SAVE MONEY Invest more wisely and efficiently in security technologies to reduce costs and increase security. PRIORITIZE THREATS Benefit from multiple tools to prioritize threats, including the creation of cause and effect Attack Path Scenarios. BENEFITS Cronus-cyber.com Dec 2016