Thursday, February 20, 2025
HomeUncategorizedSecurity Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Published on

SIEM as a Service

Follow Us on Google News

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking. VECTR Enterprise is designed to support organizations that want to mature and communicate the success of their purple team exercises with benchmarking and executive reporting features.

“We’re excited to release VECTR Enterprise to help CISOs and their teams clearly tell the story of their adversary detection program strengths, needs, and changes over time. VECTR Enterprise brings new visuals and integrated benchmark insights to help the CISO communicate a critical and complex topic to senior stakeholders” said Security Risk Advisors CEO, Tim Wainwright.

VECTR Enterprise Edition will introduce several premium features including:

  • Benchmark Results: This feature provides context for test results and posture with industry peers. VECTR Enterprise integrates Security Risk Advisors’ Threat Resilience Benchmarks and data directly into the platform.
  • Compare Results: Users can compare their results across different environments and over time to understand how and why their threat resilience may change.
  • Premium Testing Content: The platform provides access to testing “Indexes” for AWS, Azure, AI, Ransomware, Linux, Mac, Kubernetes, and more.
  • Premium Automated Content: Enterprise Edition includes thoughtfully curated automated content based on emerging attacker threat intelligence. This approach balances automation with the need for realistic and “attacker authentic assessments.”
  • SaaS by SRA: VECTR Enterprise is delivered as a SaaS service by Security Risk Advisors, including Single Sign-On (SSO), Attribute-Based Access Control (ABAC), upgrades and maintenance. This allows user teams to focus on testing, reporting, and remediation without additional burden on system administrators.

About VECTR

VECTR™ is developed and maintained by Security Risk Advisors. It is designed to guide, track, and report metrics and industry benchmarks from purple team exercises/adversary simulations. VECTR™ helps organizations improve their security posture by identifying gaps in attacker visibility and testing the effectiveness of their security controls.

For more information about VECTR™ Enterprise Edition, please visit https://vectr.io.

About Security Risk Advisors

Security Risk Advisors offers Purple Teams, Cloud Security, Penetration Testing, Cyber-Physical Systems Security and 24x7x365 Cybersecurity Operations. Based in Philadelphia, SRA operates across the USA, Ireland and Australia. Learn more at https://sra.io.

Contact
Marketing Manager
Douglas Webster
Security Risk Advisors
news@sra.io
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

PoC Exploit Released for Ivanti EPM Vulnerabilities

A recent investigation into Ivanti Endpoint Manager (EPM) has uncovered four critical vulnerabilities that...

Ransomware Trends 2025 – What’s new

As of February 2025, ransomware remains a formidable cyber threat, evolving in complexity and...

Hackers Delivering Malware Bundled with Fake Job Interview Challenges

ESET researchers have uncovered a series of malicious activities orchestrated by a North Korea-aligned...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef....