RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Infosecurity ETHIC.CPT (Continuous Penetration Testing)

Product
Developers: Infosecurity
Date of the premiere of the system: 2024/02/13
Technology: TMS - Test Management System,  Information and Events Management (SIEM)

The main articles are:

2024: ETHIC.CPT Service Presentation

Softline On February 13, 2024, Infosecurity a company introduced vulnerabilities the ETHIC.CPT (Continuous Penetration Testing) management service to provide IT perimeter control in a simple and efficient way through regular automatic scanning and manual verification of vulnerabilities found.

The service as part of the platform and the experienced pentester team Infosecurity provides perimeter monitoring 24/7. Compared to the classic pentest, the service provides comprehensive security control through continuous perimeter monitoring and timely detection of vulnerabilities.

The platform combines several scanners aimed at constantly monitoring the state of the external perimeter and web applications. All data is automatically aggregated in the system with which the Infosecurity command works. The ETHIC.CPT service completely eliminates false positives by manually verifying each event with a pentester team.

File:Aquote1.png
The service was created primarily for companies that cannot allocate a highly specialized team for such a task, which must constantly monitor running processes, process incoming information and eliminate vulnerabilities, Konstantin Melnikov, head of the ETHIC special services department, said: "As a result, we provide organizations not only with a pool of scanners in one platform, but also dedicated specialists who will analyze the vulnerabilities of the customer's perimeter in a timely manner. Thus, the customer reduces the cost of the task and optimizes the process of responding to threats.
File:Aquote2.png

The ETHIC.CPT platform dashboard is equipped with all the necessary vulnerability information in an understandable and accessible format, including summary information:

  • on the state of perimeter security;
  • top critical vulnerabilities;
  • full description for each vulnerability;
  • recommendations for addressing vulnerabilities.

This allows customers to effectively monitor the status of vulnerability handling and security dynamics of their perimeter.