Attack Graph Response to US-CERT Alert (AA22-174A): Malicious Cyber Actors Continue to Exploit Log4Shell in VMware Horizon Systems
AttackIQ is constantly delivering impactful results in bottom-line savings and efficiency to our customers and our key Preactive™ Security Exchange technology partners are critical to that success.
We are proud to count AttackIQ as a Microsoft Intelligent Security Association partner. We’re pleased to now be part of their PSE as both our companies continuously work on ways that joint customers can realize greater ongoing value from both our products.” Rob Lefferts
"We’re excited to be a part of AttackIQ’s PSE. It just makes a lot of sense, as it provides us with the opportunity to show customers how our products perform when tested continuously by an independent platform. That transparency enables us to remind customers just how serious we are about delivering a best in class solution for them. In our ongoing pursuit of excellence, partnering with the PSE has helped us identify specific, practical and constructive ways we can tune our products to help customers better deploy them for even higher efficacy via our custom partner assessment template. We’re seeing more and more value from the PSE the closer our field and engineering teams engage with them for training and enablement." May Mitchell
“Cisco values its partnership with AttackIQ and is delighted to be a part of AttackIQ's Preactive Security Exchange (PSE). As the leading neutral platform to enable seamless breach and attack simulation with comprehensive capability for continuous and targeted validation of security posture, AttackIQ allows Cisco to objectively showcase the many strengths of our security portfolio to customers.” Farzad Bakhtiar
Blackberry provides organizations with a platform to enable IoT, along with the software to secure their IoT devices, products, shared data and communications.
Cisco enables worldwide connections to the unconnected, offering services to create Internet Solutions providing information access anywhere, anytime.
Microsoft enables digital transformation in the era of an intelligent cloud. Its mission is to empower every person and organization on the planet to achieve more.
Illumio enables organizations to reach a future free of high-profile breaches by providing visibility, security segmentation, and control of all
Illusive Networks, a leader in deception-based cybersecurity solutions, empowers security teams to harden their networks and halt attack movement from
Built by security professionals for security professionals, LogRhythm equips organizations with the means to improve their security maturity and measure
Sentinel One is a pioneer in the field of autonomous security for endpoints, data centers, and cloud environments, helping organizations safeguard assets swiftly and simply.
Armed with 30 years of security expertise, Trend Micro strengthens resilience of governments, businesses, and customers with advanced security solutions and strategies.
Attivo Networks® provides organizations an active defense platform tailored for early detection, forensics, and automated incident response to in-network cyberattacks.
Awake Security combines artificial intelligence with human expertise, innovating ahead of complex threats as they arise with advanced solutions to answer them.
Barracuda strives to make the world a safer place by ensuring every business has access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use.
Serverless, highly scalable, and cost-effective multi-cloud data warehouse designed for business agility.
VMware Carbon Black is a global leader in transforming cloud-native endpoint protection, dedicated to keeping the world safe from cyberattacks with modern solutions.
Check Point leads with solutions protecting customers from 5th generation cyber-attacks, having an industry leading catch rate of malware, ransomware and advanced targeted threats.
ClamAV® is an open source (GPL) anti-virus engine used in a variety of situations including email scanning, web scanning, end point security, and more utilities.
Founded by elite intelligence professionals, Cybereason offers leading expertise in endpoint detection and response, next-generation antivirus, managed monitoring and IR services.
Cylance revolutionizes cybersecurity, offering products and services using artificial intelligence and machine learning to proactively prevent, rather than reactively detect the advanced threats and malware.
D3 Security Management Systems, Inc., a privately held company headquartered in Vancouver, British Columbia, is a developer of software for security, governance, risk management, and compliance functions of organizations.
Digitalware revolutionizes how organizations understand risk, both cyber and physical. Built by leading offensive security and data science experts, their algorithms ensure no risk is left undiscovered.
Leveraging the industry’s most advanced machine learning technology, Endgame enables security operators of any skill level to deliver full-force protection against ransomware.
Helping users worldwide enjoy safer technology with innovative, multilayered internet security solutions, their security solutions protect over 100 million computer users.
FireEye relentlessly protects their customers with innovative technology paired with the expertise from defending against front-line cyber attacks.
IBM is a leading cloud platform and cognitive solutions company, reinventing and developing new industry solutions for new real-world problems.
Kaspersky is ranked among the world’s top four vendors of security solutions for endpoint users, along with several services to protect against evolving threats.
McAfee is a global organization with decades of threat and vulnerability research, and a brand known the world over for innovation, collaboration and trust.
Micro Focus is a pure-play software company focused from the ground up on building, selling, and supporting software to put customers at the center of innovation.
Netgate is focused on delivering secure, affordable high-performance network connectivity that maintains both security and privacy.
Palo Alto Networks, a global cybersecurity leader, is shaping the cloud-centric future with technology transforming the way people and organizations operate.
Rapid7 delivers visibility, analytics, and automation through Insight Cloud to help security teams reduce vulnerabilities and monitor for malicious behavior.
The Securonix platform delivers positive security outcomes with zero infrastructure to manage. It provides analytics driven next-gen SIEM, UEBA, and security data lake capabilities as a cloud solution, without compromise.
As a worldwide leader in next-generation cybersecurity, Sophos protects organizations of all sizes in from today’s most advanced cyberthreats with cloud-native and AI solutions.
Splunk Inc. (NASDAQ: SPLK) helps organizations ask questions, get answers, and achieve business outcomes from their data paired with advanced machine learning.
Tanium offers the world’s largest enterprises and government organizations the unique power to secure, control, and manage millions of endpoints across the enterprise within seconds.
Webroot secures businesses and consumers worldwide with cloud and machine learning to reliably predict and protect against cyberattacks in real time.
PSE members are divided into three tiers based on their commitment to and level of engagement with AttackIQ.
AttackIQ pledges to operate the PSE with independence, discretion, and openness.
Information technology teams are routinely proactive. They design systems to be capable and reliable. They are also routinely reactive when systems fail. Yet it is not possible to avoid failure by design, and the impact of failure on the business is large, both because of the failures themselves and the time required to diagnose and repair them.
Between those two poles lies a better way: PreactiveTM systems. Preactive systems actively and continuously test for failure so that you can react to that failure before it creates a live business impact.
The concept is related to chaos engineering, in which software is deployed to attack production software systems to induce failures. Preactive systems add to that the capability for closed loop diagnostics and remediation. They emulate attacks, diagnose the failures that occur, and drive remediation of those failures.
These capabilities are quite applicable to cybersecurity. Cybersecurity teams proactively design and implement security controls to protect the enterprise. They are understandably quite reactive to active attacks. The problem? Active attacks are dangerous, and fixing a control after a live failure is too late. Preactive systems actively test security controls, diagnose their failures, and remediate their failures before they are exploited by a live attacker.
This is not limited to technical measures. The PreactiveTM Security Exchange (PSE) is a technology partner program which applies the same principles of active evaluation of effectiveness, diagnosis of gaps, and remediation to the vendor offerings of the participants, in service of our joint customers.
In short, PreactiveTM systems are proactive about preventable failure.
Are your security tools optimized for success? Tune in to our on-demand webinar to hear from industry experts about how to gain visibility into your security controls and ensure your program is not only effective but efficient.