With CORE INSIGHT, customers gain real visibility into their security standing, real validation of their security controls, and real metrics to more effectively secure their organizations. The solution employs groundbreaking technology that proactively replicates the steps attackers would take to breach valuable information assets. Unlike other solutions, CORE INSIGHT Enterprise starts with customers identifying which systems and data they want most to protect. INSIGHT then automatically calculates paths of attack and then begins to exploit multiple layers of defense until the security of critical assets is either confirmed or breached. Assessment results are delivered via a dashboard and reports that present metrics regarding the efficacy of security controls in terms relevant to the business.
Source: Dark Reading