Cyrin

FOR PEN TESTING –
CYRIN’s CYBER RANGE - RUN SIMULATIONS, PEN TESTING, VIRTUALLY AND IN THE CLOUD.

What are companies worried about

  1. Ransomware
  2. Supply Chain (Man in the Middle)
  3. Corporate Espionage

With CYRIN’s Cyber Range, Pen Testers have a new and exciting option to create virtual copies of a client’s network. This allows you to run attack simulations in the cloud, probe weaknesses and see how individuals and teams perform under a “real” attack scenario.

CYRIN’s patented software module – Exercise Builder (EB) – allows you to build a virtual copy of your customer’s network.

Why A Virtual Simulation is Important to Pen Testers

Cyberattacks, ransomware, are on the rise. Companies need their people to practice on real scenarios to deal with these threats. Exercise Builder allows you to create a virtual copy of a company’s network. At that point the cyber teams (attack and defend teams) can test this virtual network in the cloud to discover potential vulnerabilities and weaknesses in their cyber-defense playbook. These virtual exercises allow them and you to test the playbook and the readiness of team members in a real-world simulation, similar to what pilots do when they train on a simulator which creates actual conditions they would experience in the cockpit.

CYRIN’s simulated Pen Testing component gives you a new, virtual training ground, a report on readiness, an ability to train, create benchmarks and scores and allows you to track and trace subsequent events to indicate preparedness and measurements for continued improvement.

All of this can be performed in a simulation you control in a remote, virtual environment with a virtual copy of your client’s network and the ability to grade performance of individuals and teams to see how they perform under “real-world” attacks. CYRIN’s patented Exercise Builder program gives you new options remotely, virtually and in the cloud. Because it’s in the cloud, it’s scalable and accessible to your team.

Exercise Builder

Exercise builder

  • Exercise Builder and CYRIN provide templated virtual machines (VMs), allowing you to drag the appropriate virtual machines into your network topology.
  • All VMs can be customized, additionally authors can upload their own virtual machines as OVA files.
  • Exercise Builder and CYRIN offer a wide variety of operating systems and network components to build a network. Components can be customized by installing necessary packages.
  • This happens in the cloud, so it’s totally customized and scalable to match your needs.
  • The result is that companies, testers and trainers (virtually anyone), can upload custom VM images with specialized or proprietary software.
  • Intelligent agents can be configured to automatically monitor user activities or system events. Saves humans from having to analyze system logs to find events of interest.
  • Allows you to create a virtual attack simulation, test and find the weaknesses in company networks, discover where individuals and teams may need more training.
  • Create metrics and reports for you and top management on the state of the network, where to look for vulnerabilities that need to be patched or paid attention to and shore up individual strengths and weaknesses of team members.

These scenarios reflect the reality of a real-world attack

These tests reflect how things really happen in an organization. You can’t wait for a real attack to see if people know what they are doing. Now, to run real-world simulations you do not have to have an “on premise” range. CYRIN cyber range and Exercise Builder allow you to create a scenario that matches a clients’ network, do it virtually so it can be accessed remotely and, in these uncertain times safely, and still have it customized to fit a clients’ needs.

Now available for the first time for Penetration Testing Companies, allow us to demonstrate the power and ability of Exercise Builder and CYRIN to allow you to take Pen Testing to a new level of realism to provide a full and accurate reading of your clients’ level of vulnerability and preparedness in this always changing, always dangerous cyber security world.

For more information, to set up a demonstration, free consultation and free access to CYRIN – please fill out the form below.

 

cyrin.atcorp.com