Authored by: PlexTrac Author Posted on: May 19, 2020 PlexTrac Teams Up With SCYTHE to Streamline Security Posture Management May 20th, 2020 Boise, ID – The PlexTrac team is pleased to announce an integration with SCYTHE—one that is live on the platform right now! The SCYTHE platform provides an advanced attack emulation platform and helps enterprises continuously assess their risk posture and exposure. With this new integration, data on attack emulation activities obtained using SCYTHE can be easily imported into the PlexTrac platform and aggregated with other risk identification sources to provide a holistic information security risk register. This integration also facilitates easy construction and execution of true purple team engagements while also supporting collaborative remediation and analytics on progress. Interested in learning more about the partnership? Register to attend the “SCYTHE & PlexTrac Present: Dealin’ with the Data” webinar on Wednesday, June 3rd. Manage Data in One Integrated View – A Closer Look at the Integration SCYTHE results are instantly imported into PlexTrac providing a rich graphical interface to review and enrich the data. Each team member can rapidly access the level of detail they need—all the way down to the raw SCYTHE data. Blue teams can collaborate on remediation approaches and track remediation efforts at the individual asset level, facilitating the mitigation through detective or preventive controls. Managers can assign severities, provide guidance, and assign work to technicians in a single platform. With PlexTrac’s analytics, SCYTHE data is integrated with results from all other sources to identify risk in the organization’s environment, such as scans, pentests, audits and assessments. Below you can see screenshots of SCYTHE data in the PlexTrac platform: A List of Findings from SCYTHE in PlexTrac: The Preview Modal for a SCYTHE Finding: View of Retained Raw Data Continually Assess Risk Posture with SCYTHE SCYTHE is disrupting the traditional approach to information security by taking cyber security assessments to the next level. The SCYTHE platform provides an advanced attack emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. Customers can validate the true risk exposure of their business and employees and the performance of enterprise security teams and existing security solutions. Move Toward a Purple Teaming Paradigm with PlexTrac PlexTrac, Inc. is a fast-growing cybersecurity company driven by a mission to improve the security posture of organizations and security teams of all sizes. The PlexTrac solution is a software platform focused on streamlining the reporting and remediation of cybersecurity risks and aiding efficient collaboration within security teams. Supporting organizations using a purple teaming paradigm, PlexTrac serves as the central communication hub to aggregate all of the components of an organization’s cybersecurity program. PlexTrac Author At PlexTrac, we bring together insights from a diverse range of voices. Our blog features contributions from industry experts, ethical hackers, CTOs, influencers, and PlexTrac team members—all sharing valuable perspectives on cybersecurity, pentesting, and risk management.
PlexTrac Named in the Gartner® Magic Quadrant™ for Exposure Assessment Platforms Today I’m excited to share that PlexTrac has been named as a Niche Player in the latest Gartner Magic Quadrant for Exposure Assessment Platforms (EAP). I couldn’t be prouder of our team for this recognition. I wanted to share why this is important for PlexTrac and our customers, as well as why we believe this... READ ARTICLE
Friends Friday Recap: How AI Is Reshaping Offensive Security And Why Humans Still Matter The latest PlexTrac Friends Friday podcast episode brought together host Dan DeCloss, PlexTrac’s founder and CEO, and returning guest Rey Bango, a seasoned penetration tester and educator from a Fortune 100 telecommunication company. Dan and Rey revisited a topic from their last podcast episode, over 18 months ago, on how artificial intelligence is reshaping offensive... READ ARTICLE
The Great Exposure Management Shift: From Point-in-Time Scans to Continuous Resilience For years, security teams have relied on point-in-time scans and assessments to gauge their organization’s security posture. The results from these efforts, like quarterly vulnerability scans, annual pentests, and compliance audits, have served as the backbone of most vulnerability management programs. But the landscape has changed. Today, assets spin up and disappear in hours, new... READ ARTICLE