prooV Red Cloud enables pressure-testing technologies against cyber threats before implementation and eliminates public cloud security roadblocks.

November 15, 2017

2 Min Read


TEL AVIV and NEW YORK, November 15, 2017 – prooV, the world's first PoC-as-a-Service platform that facilitates and streamlines the Proof of Concept (PoC) process for startups and enterprises, today announced the immediate availability of prooV Red Cloud. The private cloud enhances the company’s offering by enabling customers to conduct simulated cyberattacks on technologies undergoing POC, effectively measuring the technology’s defense and response capabilities before they are implemented.

One of the main pitfalls of red team penetration testing using the most popular public clouds is that their tight security is designed to block many of the threats that customers are testing against. Whether it’s malware, phishing or trojan horses – penetration testing in public clouds is difficult or impossible to complete. prooV Red Cloud was purposely built to overcome this hurdle.

“In today’s aggressive threat environment, organizations need to ensure that their new solutions are scrutinized against the latest threat vulnerabilities during the POC process -- before they’re deployed,” said Toby Olshanetsky, co-founder and CEO of prooV. “To eliminate the roadblocks that our startup and enterprise customers faced with public cloud environments, we created prooV Red Cloud to run red team simulations on technologies undergoing POC. We are always looking for ways to give our customers the most comprehensive and in-depth experience when testing new solutions on our platform.”

Red team-blue team exercises are well-known in military and corporate settings, where penetration testers conduct a series of exercises to test its security readiness. Simulations can include attacks on business assets that are most vulnerable to threats. From malware, to phishing attacks, to advanced persistent threats, organizations will be able to measure how well the PoCs and new cybersecurity solutions can withstand social, physical, network and application attacks from a simulated real-life adversary in a controlled, private cloud environment. This ensures hassle-free testing and assurance that sensitive data is not put at risk.

Read more about:

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights