Search
Homepage Rankings and Research Companies CRNtv Events WOTC Jobs Tech Provider Zone

WATCH: XM Cyber Fights Hackers With An Automated Red Team

‘If you want to understand your risk, you have to be able to simulate it very accurately,’ says XM Cyber’s VP of Product Adi Ashkenazy.

Automation and artificial intelligence: two technologies that are key in cybersecurity today. Just ask XM Cyber, one of the latest cybersecurity startups to hit the market.

“One of the things we kept asking ourselves is: How come it’s still relatively easy to hack into a supposedly defended enterprise?” said XM Cyber’s VP of Product Adi Ashkenazy.

Ashkenazy and his team, veterans of the Israeli intelligence community, launched the industry’s first automated advanced persistent threat (APT) solution in March. It targets hackers, who mimic legitimate users, by acting as a red team -- traditionally done by an in-house team of professionals. The platform automates the process by finding the paths used by APT hackers in a continuous manner. It will then provide recommendations on how to react.

“If you want to understand your risk, you have to be able to simulate it very accurately,” said Ashkenazy. The main differentiator for XM Cyber is its ability to understand if an attack is targeting an organization’s critical assets, added Ashkenazy. Perhaps, that’s why the solution is turning heads: winning Frost & Sullivan’s Technology Innovation Award and Cyber Defense Magazine’s Infosec Startup of the Year.

As seen at Black Hat USA 2018, automation has become a valued technology for security companies, which are challenged by a talent shortage and a constantly evolving threat landscape. The Global Information Security Workforce Study from the Center for Cyber Safety and Education, predicts a shortfall of 1.8 million cybersecurity workers by 2022.

[Related: Black Hat 2018: 12 Executives On The Most Overhyped Cybersecurity Trends Today]

Artificial intelligence is another hot new weapon and one XM Cyber also relies upon. The machine learning algorithms locate the most advanced vulnerabilities on the network and decide what path an attacker would take.

XM Cyber discusses the benefits of its platform in the above video.

Back to Top

Video

 

sponsored resources