RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

PT Knockin

Product
Developers: Positive Technologies
Date of the premiere of the system: 2024/04/03
Technology: TMS - Test Management System

2024: PT Knockin Service Presentation

Positive Technologies on April 3, 2024 announced the PT Knockin service to verify the security of corporate email.

Positive Technologies plans to test its own corporate mail protection products with the help of PT Knockin. Vendor is interested in researching the security of its technologies and their constant verification for real performance

This service from Positive Technologies PT Knockin will check the security of corporate emails in two minutes. The service is provided by the vendor in the format of free and paid versions and is suitable for both large corporations that choose advanced protection and medium-sized businesses that rely on effective services with convenient delivery to users

To use PT Knockin, companies do not need to download or install anything - just enter your email address on the web service page and log in. Within two minutes, PT Knockin will issue a verdict on the effectiveness of the company's mail protection tools, as well as provide recommendations for correcting shortcomings.

File:Aquote1.png
PT Knockin will be of interest primarily to companies with high process maturity INFORMATION SECURITY using corporate tools and information protection organizations looking for advanced and fast services to verify and analyze the security of their own mail services. PT Knockin is suitable for two categories of companies at once for both a new and a long-familiar user segment with Positive Technologies. With the help of a simplified method of service delivery, which allows us to check the security of corporate e-mail with one click and eliminate problems in a short time, we expect to convey to our customers the best practices cyber security and expertise of Positive Technologies, - commented on the launch of the service Egor Nazarov, Head of Business Development for Protection against Complex Attacks Positive Technologies.
File:Aquote2.png

Attackers are always one step ahead. Hackers are constantly changing their techniques to bypass the protection of companies. According to the company, in 73% of successful attacks on organizations, cybercriminals used malware, while in 66% of hacks it was delivered by cybercriminals via e-mail. Therefore, it is necessary to regularly check the company for security in front of new techniques and tools of attackers. If PT Knockin finds flaws, then the available solutions cannot cope and the infrastructure is at risk.

File:Aquote1.png
Each security software vendor is obliged to check whether to "attack" its own products, doing so on an ongoing basis. Otherwise, it will not bring real security to its customers. PT Knockin is another element of the implementation of this strategy, the goal of which is to create products that bring real results. We not only provide PT Knockin to our customers, but also actively use the service to check our own developments, for example PT Sandbox, "said Yaroslav Babin, Director of Attack Simulation Products, Positive Technologies.
File:Aquote2.png

After checking the mail with PT Knockin, you need to follow all the recommendations and check your mailbox again to see if the mail is well protected. All HPEs for security testing (as of April 2024, these are more than 50 samples, including those actively used to exploit trend vulnerabilities, for example CVE-2023-38831 in WinRAR software), which is delivered in letters, have been neutralized. It cannot damage the organization, even if the user opens a malicious file. When a threat is identified, users will be offered recommendations for improving the level of security. For example, this could include disabling all application add-ins with Group Policy, blocking the mail server from receiving *.xll * files.

The commercial version of the service will differ from the free number of samples of HVE for testing, as well as additional features, including the addition of own samples of HVE, advanced recommendations for configuring information protection tools, sending load messages on a convenient schedule, selection of methods of delivery and packing of files with payload, use of own domains for mailings, assigning auto-checks for the release of new samples, subscribing to all new and trend samples and early access (within 12 hours) to the examination of Positive Technologies as part of the detection of HVE.