Automate Security Control Gap Identification by Picus Security

Platform by Picus - Overview

Reduce Risks: Focus on Protection Gaps

After investing in well-known security solutions, many enterprises think they are safe from cyber-attacks. Then why do we keep reading about a new breach succeeding each week? Improve efficiency of your existing security stack and be prepared for the emerging threats.

Respond Faster: Agile SecOps

Enterprises need to track new threats and react to them in a timely manner but fast response to emerging threats is impossible without measuring Security Operations. Picus developed Agile SecOps methodology to help enterprises to beat the threats systematically and in a timely manner; to not get lost fire fighting and to be resilient continuously.

Moreover, this methodology can be adapted easily in seconds using Picus Product:

  • Assess: Picus’ patent-pending assessment methodology simulates real-world threats in production networks with no interruption to assets.
  • Measure: Interactive dashboards presents the overall picture with objective metrics and list the gaps revealed.
  • Remediate: For gaps revealed during assessments, Picus provides vendor specific remediation signatures and creates a prioritization list.

Assess

Risk-Free Assessments

Picus provides risk-free assessment of your security defenses by simulating real-world attacks. Picus virtual peers mimic both the attacker and the victim systems to fool security defenses in your production network.

 

 
Real-World Threats in Hours after Disclosure

Picus Security Labs track emerging threats in the wild and develop simulation techniques for enterprise-relevant ones. Picus Threat Database contains real-world cyber attacks, including exploits, malwares, web application attacks and data exfiltration techniques.

Picus Security Labs feed latest threats to Picus Threat Database within hours. This way, Picus helps you to validate your security controls in rush times like WannaCry, Petya, DragonFly disclosures.

No technology dependency!

Hackers do not care about the security technologies you are using, neither does Picus. Either it is a Proxy, Transparent system or an Endpoint technology, Picus supports all underlying security technologies.

No security vendor or version dependency!

Picus assessments are independent of security vendors and their versions. You do not need to be concerned about supported versions or vendor lists, or about blind spots due to unsupported versions or vendors. Simply enable Picus assessments and see the full picture of your gaps.

Works in Production Environment

Tests in lab environments cannot address your real-world problems. Picus is deployed in your production networks and attack simulations enable you to understand which real-world threats are your production networks are prone to. As it works in production environment, Picus reveals not only the security control gaps but also performance and stability problems of your security technologies.

Continuous 7/24

Picus assessments are neither “point in time” or scheduled. You simply enable Picus and start continuous testing of your control products. Smart algorithms, with no touch, will prioritize the attacks to identify configuration and stability problems.

Works in most complex environments

It doesn’t matter if you have a single security technology or a security stack composed of several technologies. Picus black-box testing approach is independent from underlying security topology. This will enable you to reveal the effectiveness of a single system, or security posture provided by your security stack.


Measure

Measure

Picus Remediations are like having an actionable to-do list which enables you to increase your security level. Proposed actions are customized for your existing infrastructure. The easy-to-apply signatures are ready for your use. Picus also ships with open source remediation know-how which can be consumed by your security technologies.

Detailed/Categorized reporting

Picus can report your gaps categorized by kill-chain phase, threat categories, operating systems, and applications. Control your security defense from every angle.

Reveal Your Security Control Gaps

Picus reveals the gaps in your security control products after simulating real-world attacks. With Picus reports, easily monitor the performance of your security defense.

Real-Time Metrics

Picus measurement is real-time! Spot your deficiencies in seconds, take actions immediately

Picus Score

Picus Score is a powerful and objective metric to summarize organization’s security posture, that is fed by automated assessment results in real-time.

Track and Get Alarms

Picus continuously assess security controls revealing stability and reliability problems of the security devices. Sudden drops in Security Score mean you are at risks. The reason will be an IPS is under maintenance, a power supply failure in WAF or recent configuration change in Proxy. Picus sends alarms for the situations where your security risk increases.

Manage Your Security Posture

Hands-on control for executive management with detailed reports. CISO’s love our reports.

  • Track security team performance.
  • Monitor security SLA’s of your service engagements.
  • Utilize security investment by measuring the effectiveness of security systems.
  • Plan your next investment by prioritizing your vulnerabilities in defense systems
  • Picus also provides the visibility over your network security controls required by most major compliance and regulatory bodies like BASEL II, ISO 27001 and PCI-Data.

Remediate

Remediate

Picus Remediations are like having an actionable to-do list which enables you to increase your security level. Proposed actions are customized for your existing infrastructure. The easy-to-apply signatures are ready for your use. Picus also ships with open source remediation know-how which can be consumed by your security technologies.

Prioritize and solve them all

For each attack in the Picus Database, there is a remediation applicable to your existing security control. Remediations are prioritized according to either severity of the threats or the impact of the remediation to assets.

Maximize the ROI of your security technologies

We all know that most of the time security technologies are not configured to prevent emerging threats. Although, they have many signatures, selecting proper signatures and rules is time consuming and missed in other tasks. This decreases the ROI of your security technologies heavily. With Picus, your team will be weaponized with actionable remediations. Within days, Picus Remediations will improve ROI of your security technologies.

Validated remediation

Picus Blue Team identify matching remediation signatures for each vendor. It is not simply reference matching based on CVE! Detailed quality assurance process assures the impact when you apply the remediation.

Know Your Next Step Towards Security

Picus Remediations are like having an actionable to-do list which enables you to increase your security level. Proposed actions are customized for your existing infrastructure. The easy-to-apply signatures are ready for your use. Picus also ships with open source remediation know-how which can be consumed by your security technologies.


Easy installation, reports in hours

Picus ships as a software solution that’s as easy as point and click to install. Its flexible architecture supports both the Picus-hosted assessment for Internet vector testing and the on-site installation for internal and cross-zone vector testing. Picus exists as a virtual appliance or as a software to run on physical or virtual Linux platforms.

Deployment Options

Picus Manager and Peers has different installation alternatives. If you prefer to use cloud, Picus DevOps team can handle operational tasks related to maintenance. You can also choose to install Picus Manager and Picus Peers on your network and control every detail.

picus.security.solutions.2017.datasheet