Monday, February 17, 2025
HomeUncategorizedSecurity Risk Advisors Announces Launch of VECTR Enterprise Edition

Security Risk Advisors Announces Launch of VECTR Enterprise Edition

Published on

SIEM as a Service

Follow Us on Google News

Security Risk Advisors (SRA) announces the launch of VECTR Enterprise Edition, a premium version of its widely-used VECTR platform for purple teams and adversary management program reporting and benchmarking. VECTR Enterprise is designed to support organizations that want to mature and communicate the success of their purple team exercises with benchmarking and executive reporting features.

“We’re excited to release VECTR Enterprise to help CISOs and their teams clearly tell the story of their adversary detection program strengths, needs, and changes over time. VECTR Enterprise brings new visuals and integrated benchmark insights to help the CISO communicate a critical and complex topic to senior stakeholders” said Security Risk Advisors CEO, Tim Wainwright.

VECTR Enterprise Edition will introduce several premium features including:

  • Benchmark Results: This feature provides context for test results and posture with industry peers. VECTR Enterprise integrates Security Risk Advisors’ Threat Resilience Benchmarks and data directly into the platform.
  • Compare Results: Users can compare their results across different environments and over time to understand how and why their threat resilience may change.
  • Premium Testing Content: The platform provides access to testing “Indexes” for AWS, Azure, AI, Ransomware, Linux, Mac, Kubernetes, and more.
  • Premium Automated Content: Enterprise Edition includes thoughtfully curated automated content based on emerging attacker threat intelligence. This approach balances automation with the need for realistic and “attacker authentic assessments.”
  • SaaS by SRA: VECTR Enterprise is delivered as a SaaS service by Security Risk Advisors, including Single Sign-On (SSO), Attribute-Based Access Control (ABAC), upgrades and maintenance. This allows user teams to focus on testing, reporting, and remediation without additional burden on system administrators.

About VECTR

VECTR™ is developed and maintained by Security Risk Advisors. It is designed to guide, track, and report metrics and industry benchmarks from purple team exercises/adversary simulations. VECTR™ helps organizations improve their security posture by identifying gaps in attacker visibility and testing the effectiveness of their security controls.

For more information about VECTR™ Enterprise Edition, please visit https://vectr.io.

About Security Risk Advisors

Security Risk Advisors offers Purple Teams, Cloud Security, Penetration Testing, Cyber-Physical Systems Security and 24x7x365 Cybersecurity Operations. Based in Philadelphia, SRA operates across the USA, Ireland and Australia. Learn more at https://sra.io.

Contact
Marketing Manager
Douglas Webster
Security Risk Advisors
news@sra.io
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Ransomware Gangs Encrypt Systems 17 Hours After Initial Infection

Ransomware gangs are accelerating their operations, with the average time-to-ransom (TTR), the period between...

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

PostgreSQL Vulnerability Allows Hackers To Execute Arbitrary SQL Functions

A critical vulnerability identified as CVE-2024-7348 has been discovered in PostgreSQL, enabling attackers to...

4 Leading Methods of Increasing Business Efficiency 

The more efficient your core business operations, the more motivated and productive your employees...

New RAT Malware SneakyChef & SugarGhost Attack Windows Systems

Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef....