Company name: Guardicore
Product name: Infection Monkey version: 1.7
Email: [email protected]
Basic Price: Free, Open Source
Customer Support Offerings:  For questions, suggestions and guidance join the Infection Monkey​ community via the Slack channel​.  Guardicore Infection Monkey source code is available for direct download at the ​GitHub​ repository

During past year there have been a flood of new technologies that promise to optimize protection for enterprise organizations – with most of them focused on the zero trust model. Look back just a few years and the typical network perimeter provided enough protection to keep attacks at bay. However, as attack techniques have become more sophisticated, a zero trust approach has become a necessity. Zero trust security means that no user is trusted by default from inside or outside the network. And verification is always required for those looking to gain access to resources on the network. While this sounds fine and dandy theoretically, applying these principles to practical reality can be a resource intensive process. This dynamic is where the people at Guardicore have an upper hand in helping enterprise organizations move zero trust from concept to a full-functioning reality. Guardicore has taken the concept of zero trust to the next level with the Infection Monkey offering by launching the industry’s first free, open source zero trust assessment tool. The tool is built on Guardicore’s four basic principles of zero trust: 1) Invoke a least privilege access strategy; 2) Enforce secure access to all resources; 3) Maintain access control at all levels; 4) Audit everything by reviewing all logs. Infection Monkey applies these principles to help organizations safely evaluate their environment’s zero trust posture.

Infection Monkey is a breach and attack simulation tool that allows organizations to assess a zero trust environment.  To facilitate industry adoption, Guardicore built a software platform that is easy to deploy and run. Infection Monkey tests how the zero trust framework was implemented by attempting to communicate with machines that reside in different segments of the enterprise network, demonstrating policy violations, and generating test results with actionable recommendations for remediation. To start Infection Monkey users must select one of two options to designate the environment from which the tool will run: Monkey Island Server or Machine of Choice.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.