TMCNet:  Core Security Releases New Version of Core Impact Pro [Manufacturing Close - Up]

[January 21, 2013]

Core Security Releases New Version of Core Impact Pro [Manufacturing Close - Up]

(Manufacturing Close - Up Via Acquire Media NewsEdge) Core Security, a provider of predictive security intelligence solutions, announced the release of Core Impact Pro 2013, the latest version of its vulnerability assessment and penetration testing software, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization's critical data can be breached.

According to a release, Core Impact Pro 2013 adds several new capabilities. These capabilities include CloudCypher, an online service created and managed by Core that works with Windows hashed passwords discovered by Impact during testing and attempts to determine plaintext passwords for those hashes. These obtained passwords can then be used for additional security testing. Other highlights of the release include the ability to team multiple security testers together to interact in the same workspace against the same target environment across multiple copies of Impact. In addition to these new features, Impact 2013 is supported by the company's library of more than 2,800 commercial-grade exploits and other attack techniques.

As described by the company, the features include: -Network Remediation Validation -DNS Communication Channel -Agent Redeploy -Network IG & AP Module output -Reporting enhancements Core Impact 2013's Network Remediation Validation Wizard is a retest option used for previously identified network risks that confirm the risks have been remediated appropriately and the vulnerability management cycle is closed. This feature allows a closed loop capability for the testing process. This new release of Impact has added the ability to communicate using the DNS protocol to agents deployed using a specific set of modules. As security around TCP and HTTP protocols has improved, hackers have looked at alternative data protocols to infiltrate, adding the DNS capability allows testers to use the DNS channel as well. Agent Redeploy is a new feature that allows Impact to verify whether a previously discovered vulnerability has been remediated.

Core Impact now displays rich progress information as the automated pen tests execute against target networks, allowing a user to track progress. Using this feature, Impact can now demonstrate in a user-friendly and graphical manner, exactly what is being executed in real-time. The last new addition for Impact 2013 is report selection for reporting on specific hosts needed, rather than having to run the report on all hosts within the workspace. Reports that support this capability include: -PCI Vulnerability Validation Report -Vulnerability Validation Report -Host Report -Host Based Activity Report -Vulnerability Report -Wellness Report "CloudCypher was originally developed by our internal pen- testing team to allow them to manage passwords more easily as part of a testing engagement. Adding this pen testers' tool, used for nearly ten years of testing by the team, to our next version of Impact brings huge value to our user community. This advanced capability that we'll offer as a cloud service going forward is another example of the unique features that Core, as a multi- discipline company, can bring to this market," said Milan Shah, senior vice president of Products and Engineering at Core Security. "The teaming, DNS communications capabilities, and reporting enhancements are features that our users suggested to us, and we're pleased to be able to add these feature requests to our market- leading product." Core Impact Pro is a software solution for assessing the real- world security of web applications, network systems, endpoint systems, email users, mobile devices, wireless networks, and network devices. Backed by Core Security's ongoing vulnerability research, Impact Pro allows users to take security testing to the next level by safely replicating a broad range of data breach threats. As a result, testers can identify exactly where and how your organization's critical data can be breached.

Complete details: ((Comments on this story may be sent to (c) 2013 ProQuest Information and Learning Company; All Rights Reserved.

[ Back To NFVZone's Homepage ]