Artificial Intelligence: FireCompass Launches AI-Powered Red Teaming Platform To Counter Hackers
Red teaming is a full-fledged attack simulation designed to assess a company’s defense against real-life hackers.
FireCompass Technologies, a Bangalore headquartered technology company, launched today its new artificial intelligence-powered Continuous Automated Red Teaming (CART) platform named FireCompass.
FireCompass is a SaaS platform that ethically and securely simulates a situation where thousands of hackers are trying to breach an organization’s defenses.
It’s a fire drill that shows up any lacuna in the preparedness of an organization for a security emergency.
How it works
FireCompass has revolutionized conventional red teaming procedures through the use of AI and a SaaS platform.
It is a platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM).
From the Firecompass website:
FireCompass continuously indexes and monitors the deep, dark, and surface webs using nation-state grade reconnaissance techniques. The platform automatically discovers an organization’s digital attack surface and launches multi-stage safe attacks. By mimicking a real attacker, it helps identify breach and attack paths that otherwise escape detection by conventional tools.
The platform can do this continuously without the need for software, hardware, or manual supervision.
The company claims that red teaming or scans that once took weeks and months can now be completed in just hours, or days, by FireCompass.
“Organizations typically conduct security testing only a few times a year on a partial list of online assets, excluding shadow IT unknown to security teams,” said Bikash Barai, Co-Founder of FireCompass. “At FireCompass, our vision is to make Continuous Automated Red Teaming (CART) available to all so that organizations can discover and test all their assets at all times – just like real attackers do.”
The platform is capable of:
- Continuous Automated Red Teaming (CART)
- Continuous safe attacks to test the effectiveness of security investments and discover security blind spots.
- Attack Surface Management (ASM) & Shadow IT Discovery
- Identification of orphaned domains/subdomains, risky IPs, exposed database/cloud buckets, code leaks, leaked credentials, exposed test/pre-production systems, and Shadow IT risks.
- Ransomware Attack Surface Monitoring
- Internet scans to discover risky assets that can be exploited by malware and ransomware.
Latest Alternative Investment News
The Brunel Pension Partnership has picked Ownership Capital, RBC Global Asset Management, and Nordea Asset Management to manage its new Sustainable Equities Fund of around £1.2 billion ($1.55 billion). Brunel…
CrowdProperty, a leading crowdfunder/lender to the U.K. SME property sector, has lent over £100 million to development professionals. The funding had a beneficial impact on the UK economy because it…
Ripple Labs, the San Francisco-based technology company that facilitates cross-border payments through the use of its blockchain solutions via RippleNet, will invest an undisclosed amount in Money Tap. Money Tap…
Earlier this year, Apple (NASDAQ: AAPL) acquired Vilynx, a Barcelona-based startup that uses AI and computer vision technology to analyze a video’s visual, audio, and text elements. Reportedly, the iPhone…