The Product
- Readily Communicable – Graphical interface with automated and easy to use charts for threat-sharing potential vulnerabilities to non-cyber experts.
- Continuous Monitoring – Mobile kit allows for on-demand monitoring and added to daily routine of other employees.
- Externally based – True adversarial perspective of what an attacker would see.
Our Mission
To provide precise, actionable solutions without disrupting business operations and to enable enterprise security leaders to discover/remediate their enterprise’s critical cyber attack vectors.
Technology
Mobile kit that enables passive collection of data on multiple RF and imagery modalities (802.11 (Wi-Fi) , BTLE, and Z-Wave) to detect vulnerabilities all around facilities.
- Enable enterprise security leaders
- Discover critical cyber-attack vectors
- Provide precise, actionable solutions
- Identify unseen vulnerabilities in multiple modalities
- Present remediation steps without disrupting operations
How it Works
- Collects RF detections and metadata to send to Data Service Enclave (DSE)
- DSE Produces device classification
- Matches device to known vulnerabilities
- Calculates aggregate risk score