Cyber Security Consultant at a tech consulting company with self employed
Consultant
2020-12-22T03:10:02Z
Dec 22, 2020
We use the SaaS offering for the solution. There wasn't a primary reason we needed this tool. We saw the tool and realized that it was a value add and we decided to invest. We brought in the product and we did the POC first. We got to play around with it and our infrastructure and IT teams as well as our CISO and our CTO were very open to making amendable changes. This solution is a solid seven out of ten. The product has room for improvement, however, it's a solid product. I like it. The feedback it provides is pretty damn good. The way it breaks everything down makes a lot of sense to me. It just makes life a lot easier.
Breach and Attack Simulation (BAS) software solutions are designed to help you identify and address vulnerabilities within your security posture. By simulating cyber-attacks in a controlled environment, BAS tools allow continuous assessment and validation of your security controls, ensuring they are operating effectively against evolving threats.
BAS software provides an automated and consistent method to simulate real-world attack scenarios in your network. These solutions enable continuous...
We use the SaaS offering for the solution. There wasn't a primary reason we needed this tool. We saw the tool and realized that it was a value add and we decided to invest. We brought in the product and we did the POC first. We got to play around with it and our infrastructure and IT teams as well as our CISO and our CTO were very open to making amendable changes. This solution is a solid seven out of ten. The product has room for improvement, however, it's a solid product. I like it. The feedback it provides is pretty damn good. The way it breaks everything down makes a lot of sense to me. It just makes life a lot easier.