Beyond Security, Inc.
File:Beyond-logo.png | |
Private | |
ISIN | 🆔 |
Industry | Information Security |
Founded 📆 | 1999 |
Founder 👔 | |
Headquarters 🏙️ | Cupertino, California |
Area served 🗺️ | |
Key people | Co-founder and CEO: Aviram Jenik; Co-founder and CTO: Noam Rathaus |
Products 📟 | Automated Vulnerability Detection System (AVDS), beSTORM software and protocol fuzzer |
Revenue🤑 | Privately held |
Members | |
Number of employees | 50 |
🌐 Website | http://www.beyondsecurity.com/ |
📇 Address | |
📞 telephone | |
Beyond Security is a developer of IT security products that specializes in vulnerability assessment (VA) and vulnerability management (VM) products. The company is best known for its information security portal SecuriTeam, and its research and discovery of various security holes in products and applications[1][2] and research in the fields of botnets.[3][4]
Beyond Security's R&D center is based in Netanya, Israel and its US headquarters are in Cupertino, California. The company was founded in 1999 by Aviram Jenik (now CEO) and Noam Rathaus (now CTO). Beyond Security has a total of 50 employees worldwide.
Product lines: Appliance based Vulnerability Assessment and Management Tools (AVDS - Automated Vulnerability Detection System) with centralized Management and reporting engine. The VA/VM system is also available as a non central managed which can be used for smaller company units and/or Consultants that want to serve customers on different places without offering managed services.
Automated 2nd generation Fuzzing Tool with around 150 protocol testing tools covering network based protocols an Web Applications. The Fuzzing Tool is very flexible due to an auto recognition module for proprietary protocols. The tool has an easy to use GUI and comes with Windows and Linux flavour. Installation of the tool needs around 5 minutes and then is ready to operate. It consists of a Testing Client (which includes all protocol modules - f.e. BGP, BVLC (BACnet transport), DHCP, Diameter, DNP3 (SCADA), DNS, FTP, GTPv1 (GTP-U), HTTP/1.0, HTTP/1.1, HTTPS, IMAP, ISUP (SIP-I, SIP-T), ISAKMP (IKE), LDAP, LLC, M3UA (MTP3), MGCP (Megaco, H.248), Modbus (SCADA), NNTP, NTP, OSPF, POP3, Radius, RSH, RTP, RTSP, SDP, SIP, SNMP (v1, v2 and v3 with/without MD5, SHA and DES), SMTP, STUN, SYSLOG, SSH, TFTP, Teredo, Telnet, TPKT (RFC 1006), etc.) and a monitoring application that monitors the tested system.
Beyond Security has recently been involved in investigating cyberattacks on Estonia and provided assistance to the local CERT office.[5][6]
References[edit]
- ↑ "Two security flaws discovered in Firefox." ZDNet 2002.
- ↑ "Critical Path oversight exposes NSI email." CNET News 1999.
- ↑ "Is the Botnet Battle Already Lost?." eWeek 2006.
- ↑ "Attack of the Zombie Computers Is Growing Threat." The New York Times 2007.
- ↑ "War Fears Turn to Cyberspace in Estonia." TimesDaily 2007.
- ↑ "Could the U.S. repel a cyberattack?. USA Today 2007"
External links[edit]
- Beyond Security — Official website
- SecuriTeam - Information Security Portal
- Drastic News - Beyond Security Launches Smallest Appliance in Vulnerability Assessment and Pen Testing
- prWeb - Smallest Appliance in Vulnerability Assessment and Pen Testing
- Security Week - In Focus With Beyond Security Co-Founder Aviram Jenik
- PCI Security Standards - Approved Scanning Vendors
- SANS.ORG - Critical Security Controls
- Common Vulnerabilities and Exposures - Organizations Participating
- Bloomberg Snapshot - Company Overview of Beyond Security Ltd.
- Fed Results - IT Solutions for Federal, State and Local Governments
- IBM Knowledge Center - Adding a Beyond Security AVDS vulnerability scanner
- Skybox Security Survey - Report: 2015 Enterprise Vulnerability Management Trends
- Gartner Report - MarketScope for Vulnerability Assessment
This article "Beyond Security" is from Wikipedia. The list of its authors can be seen in its historical. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.