Core Security Introduces New Flexible Pricing for Core Impact

Core Security Introduces New Flexible Pricing for Core Impact

Atlanta, GA – July 11, 2017 - Core Security, a leader in Vulnerability, Access Risk Management and Network Detection and Response, today introduced an expanded pricing model for its Core Impact solution based on Named Users. This enhancement gives organizations the most flexibility to purchase the market leading penetration testing tool based on their changing and dynamic business objectives.

The new Named User Pricing model enables users to leverage an unlimited number of IPs to test systems, and helps organizations better fit Core Impact within their operating or capital budgets. Now, organizations can expand the number of Red Team users and penetration testers who have access to Core Impact, to more effectively conduct penetration tests without restricting the number of IPs. New users receive all the features of Core Impact without any restrictions.

The market has been asking us for ways to expand their use of Core Impact, while staying within budget constraints of a pen test team. We listened to this market feedback, and are pleased to be able to now make Core Impact accessible to a wider range of teams and organizations, who are eager to use the market’s leading product for penetration testing. You no longer have to choose between performance and budget. With this new model, we have already seen an increase of enterprise adoption of Core Impact as we make it accessible to a larger portion of the market.

Core Impact is the most comprehensive solution for assessing and testing security vulnerabilities throughout an organization. Core Impact is the only solution that empowers Red Teams and penetration testers to replicate attacks that pivot across systems, devices, and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.  Core Impact gives organizations visibility into the effectiveness of their endpoint defenses and reveals where the most pressing risks exist across their network. This enables organizations to evaluate their ability to detect, prevent, and respond to real-world, multi-staged threats.