RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

PT Boost

Product
Developers: Positive Technologies
Date of the premiere of the system: 2025/05/22
Branches: Information security
Technology: IT outsourcing

Main article: IT outsourcing

2025: PT Boost Presentation

Positive Technologies on May 22, 2025 introduced PT Boost, a set of services, products and services that can increase the company's cyber resistance in just 6-9 months and make sure that it is safe from unacceptable events. The proposal is based on more than 20 years of experience of Positive Technologies in the cybersecurity market. PT Boost allows you to look at the IT infrastructure through the eyes of a hacker, fill in the missing expertise and rally internal teams. Small companies will be able to build the core of cyber resilience, and organizations with mature infrastructure will strengthen it with measurable results and reliance on business priorities.

One of the trends in 2024 in Russia was the growing interest in effective cybersecurity. To make the security of a measurable company, they often check the possibility of implementing unacceptable events on cyber tests. According to forecasts of Positive Technologies experts, in the coming years the number of organizations launching such programs will double. However, it is difficult for many companies to begin implementing the concept of effective cybersecurity. Stop factors can be lack of resources, incomplete projects or uncertainty about the current level of security.

As part of PT Boost, Positive Technologies experts will act as mentors. They will help small businesses lay the foundation for building effective cybersecurity, and companies with an already formed information security foundation - test themselves by looking at the infrastructure through the eyes of attackers, and strengthen the most significant and vulnerable routes for cyber attacks.

At the start, Positive Technologies specialists, together with the information security division of the company, determine the most important business systems, analyze the IT infrastructure and the information protection tools used, and determine attack scenarios.

When the main goals and deadlines are determined, the transformation stage begins. Information security and IT departments, with expert and resource support from Positive Technologies, form and implement recommendations for strengthening the infrastructure: configure monitoring and response using Positive Technologies products, and connect pilot licenses for missing solutions. To further maintain and improve the security of companies, Positive Technologies provides training for information security specialists and helps with the hiring of qualified employees.

The project takes an average of 6-9 months. At the final stage, white hackers are trying to implement unacceptable events on the Standoff Bug Bounty platform in order to receive a reward of up to 5 million rubles. Cyber ​ ​ tests allow you to unite information security and IT teams and give business a clear understanding of at what level its security is, how to improve it and improve the qualifications of specialists.

File:Aquote1.png
Many companies understand how important security is and correctly assess risks. But, unfortunately, all of them cannot be leveled due to limited resources, changes in the IT architecture following the transformation of business processes and personnel hunger in IT and information security. Even organizations with mature IT infrastructure often turn a blind eye to the tasks necessary to strengthen it. The resulting weaknesses can be convenient loopholes for hackers, "said Alexei Tripkosh, director of effective cybersecurity at Positive Technologies. - To increase confidence in the cyber resilience of a business, a task is needed that activates the collaboration of IT and information security specialists. And such a task may be the company's exit to cyber tests. For a business aimed at achieving effective cybersecurity, this is a starting point that allows you to assess the current situation and form the right strategy.
File:Aquote2.png