Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cytrex - EN

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Cytrex Solution Key Benefits

Penetration Testing
Malicious attackers are testing your defenses right now. Once they’re in, they often remain on the network
Put your defenses to the test to uncover
for months and look through your data. Get ahead of the curve and test your network’s defenses with
security issues, mimicking the techniques of
Cytrex before others do by simulating a controlled attack. Cytrex reduces the effort of penetration tests by malicious attackers
managing your data and safely automating attacks, validates vulnerabilities found by Nexpose to help you
Get your engagements done in less time
prioritize your efforts, and manages your users’ security awareness by sending out simulated phishing
with data management and automation
campaigns and security trainings.
Reduce training time for new team members
Ability to extend the search and attack to
see how far the attacker can where in
reality
Reduce risk of human error by using only
safe exploits by default
Leverage weak and shared credentials
Audit web applications for OWASP Top 10
Generate reports for internal audiences and
to help comply with PCI DSS and FISMA,
formats such as: HTML, PDF, RTF, WORD.
Support sending report to email.
Collaborate on penetration tests
Includes 20 account types support brute-
force attacks
Penetration Testing: Test your defenses before someone else does Vulnerability Validation
Reduce cost by only remediating real
IT security teams spend almost all of their time setting up and maintaining defenses to protect their data.
vulnerabilities
Only when the company gets breached do they find out where their weaknesses lie.
Improve your security posture by knowing
Penetration testing simulates a real-life attack on the networks to identify weaknesses in your defenses. which vulnerabilities pose a high risk and
Cytrex helps you carry out penetration testing engagements that take a comprehensive approach, using addressing them first
exploits, leveraging passwords, attacking web applications, and sending phishing emails. Increase your credibility with IT operations
by eliminating false positives
Why Cytrex is the best solution for penetration testing:
Integrate with Nexpose, InsightVM and
De-facto standard for penetration testing: Cytrex is based project with 200,000 users and other vulnerability management solutions
contributors, making it the de-facto standard for penetration testing. New exploits developed by
security researchers are often written as a Cytrex module, making them immediately available to Security Awareness Management
Cytrex users. Its exploits and payloads have been tested both in the lab and the field. Measure user awareness to assess overall
risk and training effectiveness
Windows, Red Hat, Ubuntu, Kali Linux: Choose your favorite platform for penetration testing—don’t
limit yourself to a Windows machine. On Kali Linux, combine input from other tools in Metasploit’s Deliver on-demand user awareness
database. trainings

Flexible, open platform: Tweak or create your own exploits and other modules and load them into Test technical controls with real-life attack
Cytrex to suit your penetration testing engagement. techniques

Highly scalable: Assess the security of up to 10,000 hosts in one project. Integrate with HDS UserInsight to provide
more context to user risk
Security controls testing: Test the effectiveness of your security controls with Cytrex MetaModules,
which simplify complex tasks such as firewall egress or credentials testing. Supported Third Party Scan Reports:
Customer-friendly licensing: Install as many machines as you want per licensed user, testing an Cytrex supports most of the major
unlimited number of IPs. For example, you can install your personal Cytrex license on your laptop, in scanners on the market, including HDS's
each physical site, and in the cloud. own Nexpose, and other tools like Qualys
Web UI or command line, your choice: Cytrex offers both a user-friendly command line and an and Core Impact. The following scan
advanced command line interface, the Pro Console. Choose your preferred interface or switch reports are supported: Nessus NBE, Core
between the two. Impact XML, Qualys Scan XML,
Utilize the World’s Largest Code-Reviewed Exploit Database: HDS works with the user NetSparker XML, Burp Sessions XML,
community to add an average of 01 new exploits everyday, currently amassing more than 2,300 Acunetix XML, AppScan XML, Retina
exploits and more than 3,300 modules and payloads XML, Amap Log,...

HDS Headquarters The Gateway West, 150 Beach Rd, Singapore https://hdscorp.net/

HDS
Vulnerability Validation: Know which vulnerabilities pose a real risk What Our Customers Say
“Using hours efficiently is critical, and Cytrex is a
Vulnerability scanners can determine installed software and its vulnerabilities but not whether it poses a
huge help on this. Time savings are the biggest
real risk in the context of your network. This can be dangerous and wasteful because IT teams need to fix
reason for us to use Cytrex. [...] Our clients
all vulnerabilities with equal priority.
should be running Cytrex against their networks
Vulnerability validation helps you to determine if a regularly. If we find issues in a network with a
vulnerability poses a high risk to your environment. standard Cytrex scan, that client has a serious
IFocuses on vulnerabilities with known publicly available problem.”
exploits, including the ability to simulate attacks on a
- Jim O’Gorman, President
network in real-life situations by taking control of a
Offensive Security
computer and remaining invisible. detected by the
world's leading anti-virus software “After eight months of running Nexpose and
Cytrex simplifies and expedites vulnerability Cytrex, we had a follow-up compliance audit. In
validation, guiding you through each step of the comparison with the previous year, we had
vulnerability validation process. After vulnerabilities reduced risk exposure by more than 98%. That’s
have been validated, the results are returned to Nexpose, where exploitability of a vulnerability can be used particularly impressive when you consider the
to create reports and prioritize vulnerabilities for remediation. fact that we brought on five new hospitals in that
timeframe – it proved that using Cytrex prior to
Why Cytrex is the best solution for vulnerability validation:
an acquisition made a significant impact. Our
Only closed-loop solution: Offers closed-loop vulnerability validation, returning information about current goal is to use Cytrex on all assets on a
successful validations and vulnerability exceptions into the vulnerability management solution for quarterly basis.”
easy remediation, reporting, and trending.
Pull existing scan data: Unlike other solutions, that require a manual XML export and import of - Scott Erven, Manager, Information
vulnerability data, Cytrex can pull existing scan data directly from Nexpose. Security Essentia Health

Security Awareness Management: Test users’ vulnerability to phishing


Users are often a weak part of the security chain, exposing organizations to attacks. Phishing attacks have
seen a huge rise in recent years. Many organizations already conduct end-user trainings but find it
challenging to determine how vulnerable their users
really are and which users pose the largest risk.

Cytrex measures the effectiveness of security


awareness trainings by running simulated phishing
campaigns. It optionally integrates with HDS
UserInsight to provide this information in the context
of a more comprehensive user risk.

Why Cytrex is the best solution for managing


phishing risks:

Only penetration testing solution to measure overall user awareness and deliver training:
Unlike alternative penetration testing solutions, Cytrex’s social engineering reports provides
conversion rates at each step in the campaign funnel. Only Cytrex provides advice on how to
address risk at each step in the social engineering funnel. When users take a dangerous action, they
can be redirected to a training site on the spot.
Unique, comprehensive visibility of user risks: Through Cytrex’s integration with UserInsight,
security analysts get a full picture of a user’s accounts, network activity, cloud services, mobile
devices, network activity and now phishing in one place, unifying information normally scattered
across systems.
Only phishing simulation solution that can test your technical controls: While some phishing
simulation services can only measure user awareness, Cytrex can also measure the effectiveness of
technical controls. If desired, phishing web pages or email attachments can contain exploits that test
patch levels, security configurations, and network-based defenses.

HDS Headquarters The Gateway West, 150 Beach Rd, Singapore https://hdscorp.net/

HDS

You might also like