CIO Influence
CIO Influence News Cloud Security

Cymptom Now Eliminates High-risk Attack Paths In Azure Cloud Networks As The First Always-on Visibility Platform Securing Environments

Cymptom Now Eliminates High-risk Attack Paths In Azure Cloud Networks As The First Always-on Visibility Platform Securing Environments

Cymptom, the preemptive cyber defense company, announced that its always-on risk visibility platform now covers the Microsoft Azure Cloud in addition to on-premises networks. A first in the industry, security teams benefit from visibility into their critical attack paths that traverse between on-premises and cloud-based networks, enabling them to mitigate and preempt urgent risk from one dashboard.

Furthermore, Cymptom’s agentless platform maps all attack paths throughout a hybrid environment to the MITRE ATT&CKโ„ข framework of TTPs (tactics, techniques & procedures) adding adversary context for prioritized scoring and benchmarking.

Recommendedย ITechย News: Frontegg Goes Passwordless To Lead By Example On User Management

“We are thrilled to bring full network visibility for urgent mitigation of high-risk attack paths throughout the data center and the Microsoft Azure environment on a continuously-running basis without deploying agents to enterprise security teams. Our innovative data collection and analysis technology enables cyber executives to understand where they need to invest with bench-marking tools, and to benefit from radically increased productivity and efficiency of its security teams,” saidย Itamar Mizrahi, CEO and Co-founder, Cymptom.

“Putting it simply, Cymptom provides cyber experts with a truly comprehensive, preemptive, and simple approach to strengthen their defense throughout their hybrid environment,” added Mizrahi.

“The need for risk visibility has been a challenge to the market for some time yet has become more concerning with cloud adoption and remote working. Cymptom is making a significant contribution with its visibility of viable attack paths starting in one environment and moving to the other. Adding scoring of attack paths with adversarial context mapped to MITRE ATT&CK framework is an excellent way to visualize and prioritize urgent risk throughout an enterprise hybrid environment,” said the Head of Information Security at a US-based Investment Firm.

Recommendedย ITechย News: Komutel Komlog Helps Customers Easily and Reliably Capture Voice and Data Interactions

Related posts

Sakuu Achieves New Battery Benchmark of 800 Wh/L Energy for Wide Industry Applications

OneStream Customers Seeing Great Value From Embedded Auto AI and ML Capabilities

Fujitsu Teams Up With The Telecom Infra Project To Deliver Open RAN-Compliant 5G Radios

CIO Influence News Desk

Leave a Comment