Cyber Security Startup Pcysys Unveils PenTera™ 2.0, Delivering the Power of 1,000 Ethical Hackers
TEL AVIV, Israel, Sept. 13, 2018 /PRNewswire/ — Pcysys, provider of the Automated Penetration Testing platform, announced today that it has unveiled its flagship platform, PenTera™ 2.0, to address the increasing need for a threat-oriented, cybersecurity validation solution.
Focused on the “inside” threat, PenTera changes the rules of the game by addressing the many pitfalls of manual pen-testing – namely, that it is labor and time-intensive, inconsistent, and represents a point-in-time snapshot.
The platform enables businesses to continuously validate their security defenses against the latest Advanced Persistent Threats (APT) and consistently enforce security policies across the organization.
“As the demand for increased security of our network continues to grow under pressure from both cyber attacks and regulators, the transition to automated machine-based pen-testing is inevitable,” said Chief Executive Officer of Pcysys, Amitai Ratzon. “As a result of its consistent and continuous nature, Pcycys PenTera is viewed by its customers as the ultimate IT sanitation platform, utilizing the latest exploits and hacking techniques known in the industry today.”
PenTera’s features include:
- Business disruption alerts: When a sequence of vulnerabilities and human errors could lead to a business application exploitation, the company is alerted with prioritized remedies to defend against this “game over” scenario.
- Multi-vector attacks: With the power of algorithmic pen-testing, the platform can supersede a human pen-tester’s capacity a thousand times over. It can validate large networks simultaneously, repeatedly going through all the pen-testing stages of discovery, vulnerability analysis, and exploitation.
- Exploitation checkpoints: For mission-critical systems, a company’s security officer can assume discrete control for higher-order exploitative stages. This capability serves in validating defenses against the most advanced attacks, yet selectively control the intrusiveness level practiced during pen-testing.
- Targeted scenarios: In addition to Blackbox pen-tests, the platform allows for pen-testing specific critical assets. This feature allows focusing on specific network segments and applications, as well as validate previously discovered and fixed vulnerabilities.”Becoming the risk validation standard software comes with great responsibility,” said Vice President of Products, Ran Tamir. “Our research team is working daily to model more hacker practices and techniques into the product. It’s a cyber arms race and we are determined to have our customers win and remain resilient.”
Pcysys (http://www.pcysys.com) delivers an automated Penetration-Testing platform that assesses and reduces corporate cybersecurity risks. By applying the hacker’s perspective, our software identifies, analyzes and remediates cyber defense vulnerabilities. Security officers and service providers around the world use Pcysys to perform continuous machine-based penetration tests and improve their immunity against cyber attacks across their organizational networks.
Aviv Cohen, CMO