11/15/2017
11:50 AM
Dark Reading
Dark Reading
Products and Releases

prooV Enhances Proof-of-Concept Offering with Private Cloud for Attack Simulations

prooV Red Cloud enables pressure-testing technologies against cyber threats before implementation and eliminates public cloud security roadblocks.



TEL AVIV and NEW YORK, November 15, 2017 – prooV, the world's first PoC-as-a-Service platform that facilitates and streamlines the Proof of Concept (PoC) process for startups and enterprises, today announced the immediate availability of prooV Red Cloud. The private cloud enhances the company’s offering by enabling customers to conduct simulated cyberattacks on technologies undergoing POC, effectively measuring the technology’s defense and response capabilities before they are implemented.

One of the main pitfalls of red team penetration testing using the most popular public clouds is that their tight security is designed to block many of the threats that customers are testing against. Whether it’s malware, phishing or trojan horses – penetration testing in public clouds is difficult or impossible to complete. prooV Red Cloud was purposely built to overcome this hurdle.

“In today’s aggressive threat environment, organizations need to ensure that their new solutions are scrutinized against the latest threat vulnerabilities during the POC process -- before they’re deployed,” said Toby Olshanetsky, co-founder and CEO of prooV. “To eliminate the roadblocks that our startup and enterprise customers faced with public cloud environments, we created prooV Red Cloud to run red team simulations on technologies undergoing POC. We are always looking for ways to give our customers the most comprehensive and in-depth experience when testing new solutions on our platform.”

Red team-blue team exercises are well-known in military and corporate settings, where penetration testers conduct a series of exercises to test its security readiness. Simulations can include attacks on business assets that are most vulnerable to threats. From malware, to phishing attacks, to advanced persistent threats, organizations will be able to measure how well the PoCs and new cybersecurity solutions can withstand social, physical, network and application attacks from a simulated real-life adversary in a controlled, private cloud environment. This ensures hassle-free testing and assurance that sensitive data is not put at risk.

 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
RSS
More Insights
Copyright © 2021 UBM Electronics, A UBM company, All rights reserved. Privacy Policy | Terms of Service