AttackIQ focuses on the provision of breach and attack simulation products utilized for security control validation. The company emulates the tactics, techniques, and procedures of adversaries in line with the MITRE ATT&CK framework. Additionally, it offers insights into the performance of security systems through data-driven analysis and presents guidance for mitigation. The firm has designed a variety of products such as Enterprise, Ready!, and Flex to cater to diverse security testing needs. It provides assistance to organizations that are new to security testing and those who prefer a managed service or require help in conducting their own tests.
Do You Manage Peer Insights at AttackIQ?
Access Vendor Portal to update and manage your profile.
1. Deep integration with Microsoft security stacks, such as Defender, allows for precise validation of our existing security controls. 2. Extensive API support makes it easy to trigger assessments, manage agents, and extract results using custom PowerShell scripts. 3. The simulation library is constantly updated with the latest threat actor behaviors and MITRE ATT&CK TTPs.
Ease of navigation and intuitive UI. Customizable test scenarios. Agent to agent test scenarios to test zone boundary controls (requires network validation module).
The product is very closely aligned to the research of the Centre of Threat Informed Defence meaning a lot of the latest innovations in the product which is great. It also has a fantastic training academy which really aids in getting the best from the product. The depth of the content and the newly released AI features have been great.
1. The sheer volume of data generated during extensive simulation runs can be overwhelming to parse without custom filtering. 2. Initial deployment of the simulation agents accross aheavily segmented network requires careful proxy and firewall configuration. 3. Generating large historical trend analysis reports within the web interface can sometimes be resource-intensive.
Does not have an on-prem proxy host to manage agents. All agents must egress directly. It would be much nicer to have an aggregation host to control this egress. Their technology integration has some room for improvement. Getting event fields mapped properly to get high fidelity correlation is a challenge. We are still struggling with some of our field mapping in integrations.
The management of the health of agents could be better as its hard to keep track of when assets have issues. Additionally, we do find that some of the content is more USA threat focussed.