Katelyn Dunn SC Media

Katelyn Dunn

Most recent articles by Katelyn Dunn

Emerging Products: Breach and attack simulation technologies

 Manual security testing can’t keep pace with the threat landscape. Penetration testing takes time and it’s costly and labor-intensive. It’s also fully dependent on the expertise of the penetration tester. Despite these inefficiencies, security pros need to test security posture and validate controls. Organizations have no way of knowing the efficacy of controls configurations or…

XM Cyber 1.35

Vendor: XM Cyber Price: $95,000 Contact: www.xmcyber.com Quick Read What it does: XM Cyber simulates, validates and remediates attacks through safe, continuous attack simulation to expose real-life security issues stemming from vulnerabilities, human errors and misconfigurations. What we liked: The XM Cyber dashboard is one of our favorites and remains a standout feature of this…

Spirent Communications CyberFlood Data Breach Assessment v2.02

Vendor: Spirent Communications, plc. Price: $45,000 Contact: www.spirent.com Quick Read   What it does: Spirent CyberFlood Data Breach Assessment offers attack simulation technology with hyper-realistic traffic emulation to test production and operational environments safely, while still enabling security posture validation without all the usual false positives that too often come with it. What we liked: The…

Sophos Phish Threat

Vendor: Sophos Price: $4 per user for a 36-month term Contact: www.sophos.com Quick Read   What it does: Sophos Phish Threat leverages many AI-enhanced capabilities and hundreds of customizable attack templates to identify areas of weakness within an organization and empower users with built-in training. What we liked: We are especially impressed with the training content…

SafeBreach Platform

Vendor: SafeBreach Price: N/A – Based on the size of deployment Contact: www.safebreach.com Quick Read  What it does: SafeBreach Platform automatically executes thousands of breach methods from an extensive playbook of research and real-world investigative data and prioritizes remediation activities based on business risk. What we liked: The hacker playbook, which identifies more than 15,000…

The Picus Security Validation Platform 3113

Vendor: Picus Security Price: $10,000 Contact: www.picussecurity.com Quick Read   What it does: The Picus Security Validation Platform takes a threat-centric approach to cyber resilience and offers continuous security validation that assists teams in identifying potential breach gaps and executing real-time and retrospective analysis to mitigate gaps. What we liked: We liked the user-friendly interface that’s…

Cymulate Breach and Attack Simulation Platform 3.30.16

Vendor: Cymulate Price: $40,000 Contact: www.cymulate.com Quick Read   What it does: Cymulate Breach and Attack Simulation proactively assesses the efficacy of security controls against the full attack kill chain using simulated attacks that mimic the tactics and techniques of real adversaries. What we liked: We really like the look and feel of the widget-based dashboard…

AttackIQ Platform v2.17

Vendor: AttackIQ Price: $5,000 per test endpoint Contact: www.attackiq.com Quick Read What it does: AttackIQ Platform identifies gaps in production environments and helps mitigate risk so organizations may measure the effectiveness of their security posture and increase the overall return on investment of their existing security tools. What we liked: We very much appreciate the…

SC Product Reviews: Endpoint Security

SC Labs revisited endpoint security tools this month, an area that’s become increasingly more relevant as the bad guys run phishing attacks via email. These cloud-based management systems have taken endpoint security to the next level with proactive attack prevention, accurate detection and effective remediation. The comprehensive visibility these tools offer uncover visibility gaps at…

SC Product Reviews: Identity & Access Management

This month, SC Labs assessed several identity and access management solutions. This review comes at a relevant time with the recent events surrounding COVID-19 and the global shift to working from home. The traditional, known perimeter has grown increasingly immaterial over the years. The unprecedented, world-wide scramble to work remotely has emphasized that the previously…

Next post in Reviews