The complexity of public cloud networks means that a user may have ingress and egress points that are not adequately protected. Using AI/ML, this SEG aims to determine what are the most vulnerable parts of a customers network, and suggest remedies to resolve.
The full Attack and Breach feature set involves the following steps:
This involves multiple entry point testing which can be simlated by building up a graph of all:
The first iteration where can immediately add value is to provide our users with asset discovery/attack surface & inventories.
Companies doing BAS:
Companies doing Asset Discovery/Attack Surface Management AKA (Cyber Asset Attack Surface Management (CAASM):