Secudit is looking for participants to experiment with the alpha version of our distributed vulnerability assessment (DVA) service. The service provides ongoing measures of your specific vulnerability to current cyber-threats that have been recently successful elsewhere.
Timely recommendations to modify and adapt your defenses allow you to make minimal adjustments quickly that protect your enterprise 'just enough' from a clear and present danger.
Secudit alerts executives, department managers, and IT staff to cyber-security vulnerabilities and recommends remedial actions. Unlike a SIEM, Secudit is not part of the operational incident response system. Rather than supporting real-time responses to specific security incidents, Secudit supports the continuous improvement of an enterprise’s incident response preparedness by exposing evidence-based weaknesses in the current incident response plan, policies and deployment.
Participation is 'low touch': You need only supply us with local group profiles (LAN configurations, endpoints, applications, and deployed protections). After that, you only touch the actionable outputs: Timely recommendations for incremental improvements in your IT deployments, use policies, and cybersecurity practices.
All Secudit services are supplemental. We neither integrate with nor substitute for any of your existing IT and cybersecurity systems.
Secudit combines user behavior monitoring, penetration testing, and cyber-threat intelligence to provide an enterprise with an ongoing assessment of enterprise IT cyber-security vulnerability. The Secudit dashboard provides a readily available diagnostic of the overall cyber-health of the enterprise. As new vulnerabilities emerge, enterprise security professionals are alerted. With broad and detailed visibility, Secudit allows security teams to investigate and remediate emerging IT vulnerabilities before they become liabilities (or worse).
Organized views of component vulnerabilities - an organized presentation of the individual components of IT vulnerability; and
Correlated views of patterns of vulnerability evolution - cross-correlation of component indicators to discern and present patterns of emerging vulnerability that might otherwise be hidden.
26th International Virus Bulletin Conference, Denver USA, 2016
24th Annual EICAR Conference, Nuremberg, Germany, 2016