CIO Influence
CIO Influence News Cloud Security

Cymptom Now Eliminates High-risk Attack Paths In Azure Cloud Networks As The First Always-on Visibility Platform Securing Environments

Cymptom Now Eliminates High-risk Attack Paths In Azure Cloud Networks As The First Always-on Visibility Platform Securing Environments

Cymptom, the preemptive cyber defense company, announced that its always-on risk visibility platform now covers the Microsoft Azure Cloud in addition to on-premises networks. A first in the industry, security teams benefit from visibility into their critical attack paths that traverse between on-premises and cloud-based networks, enabling them to mitigate and preempt u***** risk from one dashboard.

Furthermore, Cymptom’s agentless platform maps all attack paths throughout a hybrid environment to the MITRE ATT&CKâ„¢ framework of TTPs (tactics, techniques & procedures) adding adversary context for prioritized scoring and benchmarking.

Recommended ITech News: Frontegg Goes Passwordless To Lead By Example On User Management

“We are thrilled to bring full network visibility for u***** mitigation of high-risk attack paths throughout the data center and the Microsoft Azure environment on a continuously-running basis without deploying agents to enterprise security teams. Our innovative data collection and analysis technology enables cyber executives to understand where they need to invest with bench-marking tools, and to benefit from radically increased productivity and efficiency of its security teams,” said Itamar Mizrahi, CEO and Co-founder, Cymptom.

“Putting it simply, Cymptom provides cyber experts with a truly comprehensive, preemptive, and simple approach to strengthen their defense throughout their hybrid environment,” added Mizrahi.

“The need for risk visibility has been a challenge to the market for some time yet has become more concerning with cloud adoption and remote working. Cymptom is making a significant contribution with its visibility of viable attack paths starting in one environment and moving to the other. Adding scoring of attack paths with adversarial context mapped to MITRE ATT&CK framework is an excellent way to visualize and prioritize u***** risk throughout an enterprise hybrid environment,” said the Head of Information Security at a US-based Investment Firm.

Recommended ITech News: Komutel Komlog Helps Customers Easily and Reliably Capture Voice and Data Interactions

Related posts

NortonLifeLock Completes Merger with Avast

CIO Influence News Desk

Zeeve Expands Cloud Stack with Google Cloud Integration

CIO Influence News Desk

Paige Announces Collaboration with Microsoft to Build the World’s Largest Image-Based AI Model to Fight Cancer

Business Wire

Leave a Comment