Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/15/2017
11:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

prooV Enhances Proof-of-Concept Offering with Private Cloud for Attack Simulations

prooV Red Cloud enables pressure-testing technologies against cyber threats before implementation and eliminates public cloud security roadblocks.

TEL AVIV and NEW YORK, November 15, 2017 – prooV, the world's first PoC-as-a-Service platform that facilitates and streamlines the Proof of Concept (PoC) process for startups and enterprises, today announced the immediate availability of prooV Red Cloud. The private cloud enhances the company’s offering by enabling customers to conduct simulated cyberattacks on technologies undergoing POC, effectively measuring the technology’s defense and response capabilities before they are implemented.

One of the main pitfalls of red team penetration testing using the most popular public clouds is that their tight security is designed to block many of the threats that customers are testing against. Whether it’s malware, phishing or trojan horses – penetration testing in public clouds is difficult or impossible to complete. prooV Red Cloud was purposely built to overcome this hurdle.

“In today’s aggressive threat environment, organizations need to ensure that their new solutions are scrutinized against the latest threat vulnerabilities during the POC process -- before they’re deployed,” said Toby Olshanetsky, co-founder and CEO of prooV. “To eliminate the roadblocks that our startup and enterprise customers faced with public cloud environments, we created prooV Red Cloud to run red team simulations on technologies undergoing POC. We are always looking for ways to give our customers the most comprehensive and in-depth experience when testing new solutions on our platform.”

Red team-blue team exercises are well-known in military and corporate settings, where penetration testers conduct a series of exercises to test its security readiness. Simulations can include attacks on business assets that are most vulnerable to threats. From malware, to phishing attacks, to advanced persistent threats, organizations will be able to measure how well the PoCs and new cybersecurity solutions can withstand social, physical, network and application attacks from a simulated real-life adversary in a controlled, private cloud environment. This ensures hassle-free testing and assurance that sensitive data is not put at risk.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 11/19/2020
New Proposed DNS Security Features Released
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/19/2020
The Yellow Brick Road to Risk Management
Andrew Lowe, Senior Information Security Consultant, TalaTek,  11/19/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: He hits the gong anytime he sees someone click on an email link.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7779
PUBLISHED: 2020-11-26
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, [email protected]-----------------------------------------------------------!.
CVE-2020-7778
PUBLISHED: 2020-11-26
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
CVE-2020-29128
PUBLISHED: 2020-11-26
petl before 1.68, in some configurations, allows resolution of entities in an XML document.
CVE-2020-27251
PUBLISHED: 2020-11-26
A heap overflow vulnerability exists within FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to send malicious port ranges, which could result in remote code execution.
CVE-2020-27253
PUBLISHED: 2020-11-26
A flaw exists in the Ingress/Egress checks routine of FactoryTalk Linx Version 6.11 and prior. This vulnerability could allow a remote, unauthenticated attacker to specifically craft a malicious packet resulting in a denial-of-service condition on the device.