Akimbo Core began working in 2019, to address the weaknesses in the traditional approach to security testing.
With companies relying on approaches that lead to a long mean-time-to-detection and that don’t take the whole organisational context into account — We wanted to do something different.
That’s why we take a platform-first approach to security and continuous security testing.
Continuous Security Testing
Many organisation’s utilise penetration testing to find, and remediate, security vulnerabilities within their internet facing systems. Traditional cybersecurity approaches such as penetration testing are often conducted annually, but that is not in-line with the way that systems and applications are developed. Regular changes and updates can introduce risks faster than those methods can detect.
Modern organisations are constantly at risk from cybercriminals. Keeping everything up-to-date and locked down is a fundamental part of cybersecurity - but issues may be missed and risk may unintentionally be introduced to your systems. To ensure that these problems can be found and fixed quickly, it's critical that your security stance is constantly tested.
We use penetration testing techniques to continuously assess your external risk profile, alerting you to changes on your attack surface or the threat landscape.
Akimbo Core offers “Always-on” Security Testing. This is a modern approach to cybersecurity that offers the benefits of penetration testing but is more effective and constantly active. We apply human intelligence to the complex parts and develop application-specific automation for the repetitive tasks.
This allows us to test far more frequently, more much efficiently and effectively when compared to traditional penetration testing.
We provide information about your security stance through an online platform, available 24/7, that allows you to view the security testing that's taking place, see your organisation's current level of risk, and gain assistance in remediating discovered security issues.
State of the Union
A dashboard shows the current security stance of your organisation, including outstanding issues as well as the on-going security testing work conducted.
Attack Surface Monitoring
New systems are highlighted within the dashboard to ensure they're not missed from the testing scope.
High risk issues cause vulnerability alerts so you don't miss critical vulnerabilities or weaknesses. These can be configured to your desired threshold.
Continuous Asset Monitoring
Many organisations focus their attention on perimeter security, however with the potential for targeted phishing attackers, insider threats, and a remote workforce – the idea of relying on a strong perimeter is outdated.
Organisations need to make sure that their assets are protected from attack from all angles, including when staff are working remotely, or from home.
There is more to cyber defence than strong perimeters, we track your assets to ensure they are hardened against attacks.
Our asset monitoring systems continuously monitor your systems to ensure they are hardened against attack. Tracking their vendor support, and offers actionable guidance to mitigate the risk of known vulnerabilities and to prevent exploitation.
All of your organisational assets are tracked within our dashboard allowing you to monitor their status and remediation over time.
Best Practice or Compliance
Whether you’re looking to track and harden your assets for best practices, or compliance reasons, our system can monitor your systems against the security requirements of your choice.
Each asset has a health bar that shows you how close it is to your compliance goal.
A continuous view of the risk exposure of your organisation, with configurable alerts for new issues as soon as they are discovered. Our platform gives full control of your testing activities too.
With a fluctuating risk profile, it can be very difficult to understand the current level of danger your organisation faces. Plus, many traditional security testing services have a significant delay between issue discovery and reporting – with reports often not arriving until many days after the end of the engagement.
Additionally, many security testing services still deliver reports in an unmanageable format – such as PDFs over email.
If you want a PDF copy of your report, we’ll send you one. However, our portal-first approach to security reporting gives you a continuously updated view into your organisations security.
Regardless of the type of security assessment requested, we continuously update your view of your organisation’s risk via our web platform.
You can view vulnerabilities as soon as they are confirmed. You can communicate directly with the testing team, such as to request additional information or to request a retest of a remediated issue. You can view a high-level report of the state of your systems, ideal for management meetings – or you can drill down into the technical detail needed to remediate a complex issue.
With new security issues being found constantly, it’s difficult to keep track of them all – or get any other work done if you even try.
That’s why we’ve set our platform up with configurable notifications, so that you can tell us what “critical” means to your business, and we’ll make sure to alert you to those issues, without overloading you with more minor details.
There’s no “I” in team, and so we’ve developed our platform to work well with teams of any size.
You can assign vulnerabilities to specific staff for remediation, you can message team members to discuss issues, and you can securely share issue details with those in your organisation that need to know.
Granular access control allows you to share just the information you need with the people that need to see it. With group permissions simplifying the whole thing.
For example, you could give the management team an overview dashboard, your tech team all of the details needed to fix things, and your auditors read-only access to track compliance activities.
Some vulnerabilities are easy to fix, perhaps just a quick configuration change or a software update to install. Sadly, software vendors don’t always get it right and sometimes vulnerability remediation can be painful.
To simplify the process of hardening your systems we have a knowledge base of common hardening actions and articles covering the “how, what and why” of system hardening. From talking about modern approaches to password security, to the depths of group policy options.
All to make keeping your systems secure, simple.