The process of defending something of value has looked the same for much of human history. We figure out how the adversary is likely to attack; the tactics that will be used against us. We then seek to understand where we are vulnerable to such tactics and how best to take action to close such gaps.
So in a sense, the roots of modern cybersecurity stretch back beyond Sun Tzu and our earliest military strategists.
Not all cybersecurity approaches have the same fidelity to these time-tested strategies, however. For many years, cybersecurity tools and security postures became overly reactive, relying on security by obscurity and a “plugging holes in a leaking dam” approach to detection and patching.
In a world where complexity and the volume of new threats are increasing at a dizzying rate — and organizational silos and poor integrations are common — that approach is an invitation to eventual disaster.
XM Cyber represents something else: A new approach that uses the attacker’s perspective to find and remediate critical attack paths across on-premise and multi-cloud networks.
A More Powerful Approach for Safeguarding Your Crown Jewel Assets
For the first time, XM Cyber’s automated technology allows us to answer the four most critical cybersecurity questions on a continuous basis:
- How can I be attacked?
- Are my critical assets at risk?
- What can I do to fix this?
- Have we closed the risk?
How does it do this? XM Cyber is a SAS-based cyber-attack path management platform. We provide a continuous and safe cyber-attack simulation capability aligned to how an adversary will try and attack an organization.
We convert this into a visual representation of the available attack paths, then break this down into the attack methods that can be used, crucially highlighting the critical assets at risk. This visibility is integrated with the SOC. We provide a prioritized set of actions on how best to protect the most critical assets and a security posture score — so the executives can see exactly how well the critical assets are protected.
Our Product Philosophy
XM Cyber applies the principle of assuming breach — a very safe bet in today’s cyber threat landscape. We run continuous and safe attack simulations from breach points. We focus on crown jewels and constantly ask “how can an attacker compromise our clients’ critical assets?”
To do this, we identify the choke points — the individual systems that many attack paths traverse through. If you can remove the choke points, you dramatically reduce risk. From our analysis of attacks, and with our background in offensive security, we understand that this is a critical part of protecting the crown jewels.
Our approach helps optimize multiple security processes. We deploy a lightweight sensor across all servers and endpoints that collects all technical characteristics that an attacker can use. This is sent back to our SAS platform where we continuously run the attack simulations showing exactly how an attacker can compromise the critical assets.
Why is Continuous Visibility So Essential?
We all know that even the best processes fail. We also know that organizations have extremely complex processes that are susceptible to human error and are very dynamic. The attacker has the strategic advantage and can wait for the right moment to arrive.
This is why it is critical that the adversarial view is understood on a continuous basis so that as the environment changes, we understand what new opportunities the attackers have to compromise systems. Testing security controls alone isn’t enough. We need to understand how all of these ingredients work together to allow exploitable attack vectors to appear — and then close them down before the critical assets have been compromised.
The Benefits of Deploying XM Cyber
XM Cyber battleground
The value of deploying XM Cyber technology is clear:
- You receive 100% awareness of all possible attack paths.
- You can identify your most critical exposures: Misconfigurations, risky users, software vulnerabilities, and pinpoint business risk aligned to adversaries.
- XM Cyber allows greater human resource efficiency by improving multiple operational processes with attack telemetry data and enhancing internal red and blue team exercises with automation.
- Our technology also improves business resilience. You can mitigate business disruption risks and accelerate key business objectives while doing so securely. Our technology plays a crucial role in de-risking digital transformation initiatives, along with facilitating mergers and acquisitions and divestments securely.
In total, XM Cyber offers organizations a powerful value proposition — one that builds upon a classic approach to defense by using the attacker’s perspective against him, allowing you to find and remediate critical attack paths across on-premise and multi-cloud networks.
In today’s world of heightened complexity and runaway risk, no other solution comes close to offering the same peace of mind.
XM Cyber at a Glance
XM Cyber is the global leader in cyberattack path management. The XM Cyber platform enables companies to rapidly respond to cyber risks affecting their business-sensitive systems by continuously finding new exposures, including exploitable vulnerabilities and credentials, misconfigurations, and user activities.
XM Cyber constantly simulates and prioritizes the attack paths putting mission-critical systems at risk, providing context-sensitive remediation options. XM Cyber helps to eliminate 99% of the risk by allowing IT and Security Operations to focus on the 1% of the exposures before they get exploited to breach the organization’s “crown jewels” – its critical assets. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in North America, Europe, and Israel.
Understand why XM Cyber your No. 1 choice is to identify the top risk to your critical assets.
Mike Heredia is VP EMEA & APAC, XM Cyber