SLIDE 10 CYBOT PROCESS
The CyBot Product Suite validates attack paths on the entire network, on a global level. We provide in depth detail on how such attacks can play out, their business implications and methods of mitigation. We focus on keeping the critical business process protected against possible attacks.
Cronus-cyber.com March 2017
Reporting and Remediation
asset risks
Dashboard and live monitoring
- Remediate with
- ne click using
SIEM integration Attack Path Scenarios TM
networks
attack paths and focus on key scenarios
- Continuous
- Focus on critical
assets Smart Vulnerability management
shortlist that threatens business process
positives Network mapping, validation of connectivity
mapping
- No false negative
- Inventory / asset
management Continuous Scan using Cronus’s
- wn scanner
- INFRA, Web
- OWASP, NIST
compatible
- CVE certified
- CIS certified
- CREST certified