Cyber Bi, Whats Included?
Whats Included
VULNERABILITY SCAN
PORT SCAN
IOT SCANNER
CYBER AUDIT
ACCESS SCAN
PATCH SCAN
“Give yourself a complete Cyber Audit, Everyday”
Quick Overview
Frequently Asked Questions
Is this an internal or an external pen test ?
Its a bit of both we will be to report on your vulnerabilities on the external and internal parts of your network to simulate what a pen test does if it was run from outside your network and from within your network.
Will this create lots of false positives
Naturally false positives is a part of working with Cyber Security however Cyber Bi is a daily cross section of analytics which will net together all of your alerts into a digestible board pack.
Does this require a lot of compute power to run ?
Not at all, this is fairly light weight technology and runs in the background, its more of a Cyber Audit than a heavyweight real time Cyber Security platform, this process will emulate what an Human Pen test does but instead deliver you a dashboard daily of all the Cyber Issues you should be tracking.
Is this for the IT Team or C level
Both, we appeal to the C Level Executives because we are able to provide a Dashboard and Cyber Report to any external parties that are interested in your Cyber Security, but we also are very useful for IT Departments as we can show all the areas of Cyber that needs addressing which creates useful business cases for IT to sell to the business why upgrades / config changes need to be prioritised.
Will you share any of my data ?
No! Simply not at all, and not ever! No third parties have access to any of the data, whatsoever.
Does it matter what country I'm in ?
In most countries of the world, having the owners permission of the network is suitable enough to conduct a penetration test. However, please do check with us separately if you are particularly worried, and we will research this on your behalf.
Can I used this to Certify my business ?
This short answer is yes. The Cyber Bi Report replicates the type of vulnerability assessments used by Internal & External penetration tests. The report can be used to prove cyber governance.