- Date: 15 June 2011
- Author: Trevor
- Category: APT, Cloud, Network Security, PCI, spear phishing, Stratum Announcements, ThreatSim
- Comments: 0
We are finally able to share something exciting that Stratum has been working on for the past several months.
If you look at recent data breaches– the kind where the attackers are inside the network hanging out and shipping sensitive data out of the network– you will find two things in common: spear phishing is how they got in and some form of data exfiltration is how they got out. Read Mandiant’s M-Trends report or the Verizon Data Breach Reports; it’s all discussed in-depth. Attackers are exploiting user endpoints to get right to the heart of the network. Why mess around with finding a perimeter vulnerability (sure they still exist) when you can own something in the soft chewy center of a network with access to almost everything? While this represents a major, actively exploited attack vector, the industry does not have a comprehensive, repeatable and scaleable solution to test organizations’ susceptibility to these attacks. Until now.
Today we are announcing our new Security-as-a-Service (SaaS) offering:
ThreatSim allows customers to easily run their own advanced attacker simulation campaigns that tests users, user end point devices, network security controls, 3rd party security solutions and incident response plans. ThreatSim answers three critical questions that all organizations should be asking right now:
- How can attackers get in?
- How do attackers get my data out?
- What can we do to prevent it?
The ThreatSim website, www.threatsim.com, has more details on our new service, including how to sign up to be a beta customer. We will provide more updates here on our blog and via our ThreatSim twitter account, @threatsim. For inquires please email us at email@example.com or fill out the Request A Demo page on the ThreatSim website.