Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/15/2017
11:50 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

prooV Enhances Proof-of-Concept Offering with Private Cloud for Attack Simulations

prooV Red Cloud enables pressure-testing technologies against cyber threats before implementation and eliminates public cloud security roadblocks.

TEL AVIV and NEW YORK, November 15, 2017 – prooV, the world's first PoC-as-a-Service platform that facilitates and streamlines the Proof of Concept (PoC) process for startups and enterprises, today announced the immediate availability of prooV Red Cloud. The private cloud enhances the company’s offering by enabling customers to conduct simulated cyberattacks on technologies undergoing POC, effectively measuring the technology’s defense and response capabilities before they are implemented.

One of the main pitfalls of red team penetration testing using the most popular public clouds is that their tight security is designed to block many of the threats that customers are testing against. Whether it’s malware, phishing or trojan horses – penetration testing in public clouds is difficult or impossible to complete. prooV Red Cloud was purposely built to overcome this hurdle.

“In today’s aggressive threat environment, organizations need to ensure that their new solutions are scrutinized against the latest threat vulnerabilities during the POC process -- before they’re deployed,” said Toby Olshanetsky, co-founder and CEO of prooV. “To eliminate the roadblocks that our startup and enterprise customers faced with public cloud environments, we created prooV Red Cloud to run red team simulations on technologies undergoing POC. We are always looking for ways to give our customers the most comprehensive and in-depth experience when testing new solutions on our platform.”

Red team-blue team exercises are well-known in military and corporate settings, where penetration testers conduct a series of exercises to test its security readiness. Simulations can include attacks on business assets that are most vulnerable to threats. From malware, to phishing attacks, to advanced persistent threats, organizations will be able to measure how well the PoCs and new cybersecurity solutions can withstand social, physical, network and application attacks from a simulated real-life adversary in a controlled, private cloud environment. This ensures hassle-free testing and assurance that sensitive data is not put at risk.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27852
PUBLISHED: 2021-01-20
A stored Cross-Site Scripting (XSS) vulnerability in the survey feature in Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary web script or HTML via a textarea field. This code is interpreted by users in a privileged role (Administrator, Editor, etc.).
CVE-2021-3137
PUBLISHED: 2021-01-20
XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.
CVE-2020-27850
PUBLISHED: 2021-01-20
A stored Cross-Site Scripting (XSS) vulnerability in forms import feature in Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary web script or HTML via the import of a GF form. This code is interpreted by users in a privileged role (Administrator, Editor, etc.).
CVE-2020-27851
PUBLISHED: 2021-01-20
Multiple stored HTML injection vulnerabilities in the "poll" and "quiz" features in an additional paid add-on of Rocketgenius Gravity Forms before 2.4.21 allows remote attackers to inject arbitrary HTML code via poll or quiz answers. This code is interpreted by users in a privile...
CVE-2020-13134
PUBLISHED: 2021-01-20
Tufin SecureChange prior to R19.3 HF3 and R20-1 HF1 are vulnerable to stored XSS. The successful exploitation requires admin privileges (for storing the XSS payload itself), and can exploit (be triggered by) admin users. All TOS versions with SecureChange deployments prior to R19.3 HF3 and R20-1 HF1...