Cyber Security Consultant at a tech consulting company with self employed
Consultant
2020-12-22T03:10:02Z
Dec 22, 2020
We use the SaaS offering for the solution. There wasn't a primary reason we needed this tool. We saw the tool and realized that it was a value add and we decided to invest. We brought in the product and we did the POC first. We got to play around with it and our infrastructure and IT teams as well as our CISO and our CTO were very open to making amendable changes. This solution is a solid seven out of ten. The product has room for improvement, however, it's a solid product. I like it. The feedback it provides is pretty damn good. The way it breaks everything down makes a lot of sense to me. It just makes life a lot easier.
Breach and Attack Simulation (BAS) tools provide continuous and automated security validation by simulating advanced attack scenarios to identify and fix vulnerabilities. These tools help organizations strengthen their cybersecurity posture effectively.
Organizations use BAS solutions to assess their security controls by replicating potential attacks that could be used by cyber adversaries. This allows security teams to proactively manage and mitigate risks. BAS platforms often...
We use the SaaS offering for the solution. There wasn't a primary reason we needed this tool. We saw the tool and realized that it was a value add and we decided to invest. We brought in the product and we did the POC first. We got to play around with it and our infrastructure and IT teams as well as our CISO and our CTO were very open to making amendable changes. This solution is a solid seven out of ten. The product has room for improvement, however, it's a solid product. I like it. The feedback it provides is pretty damn good. The way it breaks everything down makes a lot of sense to me. It just makes life a lot easier.