Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

1/29/2016
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

SafeBreach Arms Defenders with the Hackers Playbook

Innovation in Breach Validation Identifies and Closes Attack Paths Before Exploitation; Company to be Featured in RSA Conference 2016 Innovation Sandbox

MENLO PARK, CA –January 26, 2016 – SafeBreach, a leading innovator of enterprise breach validation, today officially announced the company and the general availability of its platform. Founded by former LivePerson CSO Guy Bejerano and renowned security researcher Itzik Kotler, SafeBreach enables any size organization to precisely and continuously quantify the risk of breaches from specific attack scenarios, harden infrastructure, and achieve greater ROI from current security investments. Recognizing its innovation, the company will be featured as one of the Top 10 Finalists in the Innovation Sandbox ‘Most Innovative Startup’ Contest at the RSA Conference 2016, taking place on February 29, 2016 at the Moscone Center in San Francisco.   

Despite nearly $70 billion in security investment, organizations continue to be besieged by attacks, pummeled by breaches and mired in cleaning up the aftermath. The 2015 Verizon DBIR report highlights that in 60 percent of breaches, attackers were able to compromise organizations within minutes, and these breaches remain undiscovered for weeks and/or months. While innovation abounds in security solutions, it also expands the universe of product and services an organization must maintain and manage. Adding to that, the constant updating, patching and testing of software and infrastructure and it creates too many holes to plug, with too few people and too little time.

Recognizing these challenges, SafeBreach has delivered a platform to better inform defense, one that looks at how a potential attacker views, prioritizes and targets an infrastructure and then how they reach their ultimate target. SafeBreach’s breach validation platform continuously executes scenarios—based on extensive security research and drawing from actual investigations—to simulate real attacks and determine actual risk.

“As we move from perimeter defense to borderless security, I love that SafeBreach can be the ‘ubiquity platform’ running at every segment of my data center. These are not just ‘war games’ we are playing; this is removing the blindfold and really identifying our blind spots,” said Nir Botzer, CISO at Clarizen.

With customers spanning highly targeted sectors such as high-tech, financial services and retail, early SafeBreach deployments found a range of causes that left all organizations of all sizes open to data exfiltration with relative ease. Ignoring common security best practices and lack of layered defenses were major reasons behind successful compromise. Additionally, in many cases, extremely effective, next generation security solutions were rendered weak by IT misconfiguration. In one particular deployment, errors allowed SafeBreach to bypass malware sandboxing solutions in less than two hours.

Unlike static penetration testing or vulnerability management that look for, and at, specific weaknesses, SafeBreach’s platform looks at vulnerabilities and weaknesses in the context of the systems they inhabit and the network relationships they affect, to see how an actual attack could play out—and how far it could go. By doing so, it allows organizations to more intelligently make adjustments and enact fixes to not only close holes in the infrastructure but disrupt and disable paths that could enable greater compromise.

 

SafeBreach customers benefit from:

  • Continuous Validation – Configured to run cyberwar games for continuous validation. SafeBreach is “always on” to keep pace not only with evolving adversarial tactics but also a constantly changing risk profile from new users, applications and devices.
  • Actionable Insights – Offers CISOs and security analysts context-rich details of the building blocks that could create a breach event, specific to an organization’s environment. This informs more specific and targeted actions to prevent or mitigate impact.  
  • Complete Coverage – Comprehensive visibility and validation across cloud, network and endpoints. SafeBreach can also be used to validate security and compliance controls for data protection, segmentation between security zones/networks and third party integration.

 

“Companies don’t need to understand adversaries as much as they need to understand how adversaries view them,” commented Bejerano. “SafeBreach allows CISOs and security analysts to understand their risks from a hacker’s point-of-view. For the first time, we give defenders a way to validate their security controls and the benefit of time to address critical issues.”

Availability and Pricing

The SafeBreach platform is available immediately as Software as a Service (SaaS) or on premise, with pricing based on the number of simulators. In a SafeBreach deployment, breach simulators perform the role of the attacker and play war games within an organization’s actual infrastructure and security solutions—without impacting network performance or exposing assets. The SafeBreach orchestrator manages the network of breach simulators and serves as the central management point from which attack scenarios are executed and analyzed for success, and from which patterns can be tracked over time.

For a free assessment of enterprise security risks, please register at www.safebreach.com.

 

AboutSafeBreach:

Funded by Sequoia Capital and Shlomo Kramer, SafeBreach is a pioneer in the emerging category of breach validation. The company’s groundbreaking platform provides a “hacker's view” of an enterprise’s security posture for total and continuous security assessment, validation and reporting. SafeBreach automatically executes breach methods with an extensive and growing Hacker’s Playbook™ of research and real-world investigative data. For more information, visit www.safebreach.com or follow on Twitter @SafeBreach.

###

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerry,  11/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15073
PUBLISHED: 2019-11-20
An Open Redirect vulnerability for all browsers in MAIL2000 through version 6.0 and 7.0, which will redirect to a malicious site without authentication. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15072
PUBLISHED: 2019-11-20
The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15071
PUBLISHED: 2019-11-20
The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail syste...
CVE-2019-6176
PUBLISHED: 2019-11-20
A potential vulnerability reported in ThinkPad USB-C Dock Firmware version 3.7.2 may allow a denial of service.
CVE-2019-6184
PUBLISHED: 2019-11-20
A potential vulnerability in the discontinued Customer Engagement Service (CCSDK) software version 2.0.21.1 may allow local privilege escalation.