Get Ahead of Attackers With Covail’s Offensive Security Program

Covail’s approach to cybersecurity relies on an “offense-informed defense” driven model. Members of the offensive security team will perform threat-simulation assessments, emulating the tools, tactics, and procedures (TTPs) of today’s relevant threat actors to help prepare your incident response program to deal with real-world cyber attacks. Testing is highly collaborative, with our engineers working alongside your security team in an effort to decrease the mean time to detect (MTTD) of these attacks. Together, we create high-fidelity detections and observations during goal-oriented, adversarial emulation exercises, avoiding complacency and a false sense of security.

Key Features and Benefits of Covail’s Offensive Security Testing

Threat-intelligence-driven approach that emulates real-world threat actors
Collaborative team engagements to evaluate incident response and control efficacy
Ability to rapidly test security controls for new technology and application deployments
Practical, vendor-agnostic remediation advice and recommendations

Covail’s Offensive Security Program Delivers:

  • Shared insights and best practices on managing cyber threats—from detection through recovery—reducing your time to respond to threats as they arise and increasing the efficiency of your resources.

  • Access to subject-matter experts and data-centric tools that address your security challenges, when you need them, scaling and imparting agility to your team.

Covail’s Offensive Testing Maturity Model

Covail ensures the maturity and efficacy of any offensive testing program through:

  • Vulnerability Scan:

    In this engagement model, we help run a tool like Nessus, which primarily tests your vulnerability management efficacy and results in a detailed report.

  • Penetration (“Pen”) Test:

    This is a tightly scoped engagement model where an external party will attempt to gain an unauthorized level of access. Per scope, the attackers may originate from the internet or from within the enterprise. Defenders in your staff may or may not be aware of the engagement. The engagement primarily tests your vulnerability management, basic access controls (authentication/authorization, network segmentation), and detection capabilities that are delivered in a detailed report.

  • Purple Team Engagement:

    An engagement model that combines the offensive activities of a penetration test with specific defensive awareness, coaching, and improvement. The objective of the engagement is to create real improvement in your detection and response capabilities during the engagement, not just culminate in a report. The engagement primarily tests your detection and response capabilities that are delivered in a detailed report.

  • Long-Term Lightly Scoped Adversarial Emulation:

    This engagement model is designed to closely emulate the activities of an attacker and test your defensive capabilities when faced with real-world threats that are not tightly scoped and do not materialize on a set schedule. The engagement primarily tests client detection and response capabilities that are delivered in a detailed report describing prevention, detection, and response efficacy against specific threat tactics.

Is Joining a Security Community for You?

Schedule a demo to see why Covail’s ISAO is one of the most trusted peer networks for sharing cybersecurity threat information.

Covail’s Offensive Security Service Offerings

  • Web Application Penetration Testing:

    Deep dive web application security assessment based on OWASP Framework. Includes both dynamic and manual testing as well as static code analysis.

  • External Adversarial Emulation:

    Perimeter-based, goal-oriented penetration test against your organization’s public-facing systems, both on-prem and in the cloud.

  • Internal Adversarial Emulation:

    Goal-oriented internal penetration test with targeted, actionable reporting mapped to the MITRE ATT&CK® framework.

  • Physical Penetration Testing:

    Test your organization’s physical security posture, including the staff, procedures, and controls that support it. Answer the question of whether a determined attacker can gain unauthorized access to your facility via a physical vector, to conduct a cyber attack.

  • Social Engineering & Phishing Assessments:

    Don’t stop at testing whether or not your employees will “click the link”—learn what happens once they do and whether your controls are working as expected. Did your Incident Response team receive an alert? Are your playbooks effective?

  • Themed Adversarial Simulation Response (TASR, Red Team Engagement):

    Covail’s version of the “low & slow,” long-term red team exercise. A broadly scoped themed-based assessment to help improve your mean time to detect real-world cyber attacks. Combining physical, social, and cyber threat vectors with themes, such as insider-threat, assumed-breach, and many more.

  • Purple Team Collaborative Exercises:

    Expand your threat-hunting capabilities by pairing your blue team with Covail’s red team engineers to build functional, effective detections of real-world attacks.

Columbus Collaboratory is now Covail™

1375 Perry Street
Columbus, OH 43201
(614) 591-0440

Trustworthy, Intelligent Operations. Accelerated.

© Copyright 2020 Covail. All Rights Reserved.