Facebook Tracking
Background image

Do you know your Risk Exposure?

It all starts with focusing on your core exposures and how to minimize the potential for breach or the damage when it occurs. This requires a different approach to managing your security program.




Cybersecurity today is an I.T. issue, an operational issue, an executive issue and ultimately a business risk issue. In today’s environment security and I.T. teams are building defensive strategies through an offensive mindset.


Uniquely, we continuously exercise the full breadth and depth of your entire security program. We go on the offense to identify security control failures before the attacker does to continuously exercise the breadth and depth of your entire security program. Our platform creates controlled adversarial behavior relevant to your environment and simultaneously measures and validates your detection and prevention capabilities.


Now you can measure the efficacy of your security program. We provide knowledge of the highest probability risk exposures and the gaps in your cyber defense. Empowered by data, you can make the best decisions to minimize the cyber risk to your business.



AttackIQ is purpose built to fit into your existing infrastructure. The deployment options, which allow you to run AttackIQ’s management console on-premises, virtual private cloud, or managed multi-tenant cloud  give you the flexibility to make the deployment decision that best fits your IT requirements and capacity.


Deployment options for AttackIQ management console:

• Managed multi-tenant cloud

• Private multi-tenant cloud

• Private multi-tenant on-premises native device or virtualized instance


Deployment options for AttackIQ agent:

• Native, virtual or cloud

• Support for multiple operating systems (e.g. Windows, Mac, Linux, etc)

• Production or Lab environments







WindowsUbuntuDebianMintRed HatCentOSApple



Our extensive scenario library enables you to actively exercise your production security controls against advesarial behavior.

Validating your detection and prevention controls requires you to test against advesarial indicators to determine if you can deny the adversary the use of those indicators when they are attacking you. Not all indicators are created equal, though, and some of them are far more valuable than others. 

  • Focused on advesarial TTPs (Tactics, Techniques in Procedures) (See Pyramid of Pain)
  • Turn-key, easy to run assessment templates that are run in a “do-no-harm”, multi-phase/multi-vectored fashion
  • Run on-demand, scheduled or triggered via API
  • Open platform Development SDK allows extending existing scenarios and development of customized scenarios.


In any given security breach or incident, it’s relatively rare that you can point to a single point of failure.  The reason for this is as defenders you don’t get to choose the path an attacker takes. For the attacker, the path to an end is chosen because it is available. There are a multitude of potential paths and security controls protecting those paths and it's crucial that each are measured and validated both independantly and from a perspective of regression analysis. 

  • Integrates into a multitude of security controls both directly and at the point of aggegation (e.g. SIEMs)

  • Provides Pipeline validation of controls to aggregation controls

  • Validates SIEM, SOAR, endpoint, network, cloud, identify and data as well as validating the processes and people involved.

  • Includes a comprehensive development SDK to extend existing integrations and build more customized integrations.


The importance of effective reporting for organizations cannot be understated, but today there often a huge communications gap between a company’s IT security team and the business. Effective IT security goes far beyond compliance, and execs need to know that. They need to grasp metrics for specific security controls that today protect specific company assets as well as a clear understanding of exposure to the business.


Effective repoting can assist in:

  • Staying Informed
  • Speedy Remediation
  • Organizational Communication

To communicate current security efficacy and exposure to the business, AttackIQ’s platform has a multitude of executive and technical reports. These reports help you target and prioritize the areas of greatest risk exposure to your business. In addition, the AttackIQ platform can be configured to automatically send notifications to IT and security workflows, providing mitigations and actionable intelligence as to how to minimize the risk exposure.


The digital world is becoming more interconnected which makes APIs increasingly important. They are the connecting link between applications, systems, databases and devices. It is both an essential building block for supporting overall business strategy and a critical enabler of digital transformation. 

AttackIQ’s API First approach allows you to:

  • Integrate the platform into your existing IT infrastrastructure
  • Communicate with the platform in a manor that suits your workflow.
  • Achieve greatest efficiency and productivity through team collaboration


In addition to our API, AttackIQ provides a development SDK allowing you to develop custom scenarios, integrations and assessment templates.


MITRE introduced ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) in 2013 as a way to describe and categorize adversarial behaviors based on real-world observations. ATT&CK is a structured list of known attacker behaviors that have been compiled into tactics and techniques and expressed in a handful of matrices as well as via STIX/TAXII. Since this list is a fairly comprehensive representation of behaviors attackers employ when compromising networks, it is useful for a variety of offensive and defensive measurements, representations, and other mechanisms.

Testing the tactics and techniques in ATT&CK against your environment is the best way to:

  • Test security controls and their efficacy
  • Ensure coverage against different tactics and techniques
  • Understand gaps in visibility or protection
  • Validate the configuration of tools and systems
  • Demonstrate where different actors would be successful or would be caught in the environment
  • Avoid guesses and assumptions with controls by knowing exactly what is detected or mitigated and what is not

To best operationalize the framework in your environment, AttackIQ has developed scenarios implementing each of the tactics and techniques within the ATT&CK framework so that you can exercise your controls and map your coverage of capabilities. Each tactic represents a stage within a post-breach scenario of an attack, allowing you to understand your exposure and prioritize your resources effectively to fix any misconfigurations and fill the gaps.


AttackIQ is defining the emerging space of continuous security validation. Community is a big part of the differentiated value that we bring to the industry, crowdsourced by the global security collective and trusted circles of security professionals communicating and sharing expertise. Cybercriminals share ideas, resources, tools, and tactics to leverage their combined experience for their own collective gain. In a fast-changing world, we believe that security defenders should have the capacity to pool their resources to keep pace.

Our community provides:

  • Technical platform support
  • Development assistance of API usage, scenarios, integrations and assessment template creation
  • Articles and blogs on attacker behavior and security control capabilities and configurations 
  • Opt-in resources to share content, ideas, problems and solutions related to attacker TTPs and defensive strategies 

The goal of community is to provide collective intellgence and minimize overall business risk.



“You may pass an audit with flying colors, but does that mean you have a solid security strategy in place, or that you simply didn’t have the right skills auditing you? Being able to validate cybersecurity effectiveness — determining if the security tools are deployed and configured properly, that the controls safeguarding critical assets are effective, that your team reacts and responds like you expect — is a significant challenge facing all organizations.”   

- Brian Neely / American Systems


Cybersecurity attacks are not going to stop, By exercising your security controls against adversarial behavior and patterns, you uncover gaps and gain visibility into your I.T. risk exposure which drives up to understanding your total business risk exposure. Knowledge of your business exposure can then be communicated to the business both qualitatively and quantitatively, driving a data-driven approach to your security program in prioritizing what investments will maximize results and ultimately minimize business risk.