BitDam Offers Free Breach and Attack Simulation (BAS) Service for Email

Share Article

BitDam’s free email-centric BAS service empowers organizations to gain insight into their security vulnerability to email cyberattacks with just a couple of clicks

News Image
At BitDam, we’re constantly looking for new ways to provide offerings that help organizations and individuals stay secure. Our new email-centric BAS service is another step in the direction of total cyber security,” BitDam CEO, Liron Barak.

BitDam, provider of cybersecurity solutions that protect enterprise communications from advanced threats hidden in files and links, today announced that it is offering a free online email-centric Breach and Attack simulation (BAS) service, designed to help organizations assess how vulnerable they are to email cyberattacks. With BitDam email-centric BAS, users gain visibility into their current level of email protection, the types of cyberattacks to which they are vulnerable and the type of threats from which they are protected.

BitDam’s email-centric BAS service simulates a cyberattack in order to test a network's cyber defenses. It enables organizations to assess security effectiveness, within a few hours, by mimicking hacker breach methods to ensure security controls are working as expected. The ability to assess security continuously and automatically in real production environments, eliminates guesswork, incorporates business risk context, and provides actionable results.

Leveraging its patented technology, BitDam blocks malware of any type from penetrating organizations. For its email-centric BAS service, the company leverages its experience in protecting customers to create a broad data set of attacks. This profile is comprised of a host of different attack techniques seen in the wild that have previously bypassed leading security solutions, as well as living samples of recent attacks that BitDam detected in its customer base.

“BitDam is launching email-centric BAS service following the worldwide success our online PenTest, a tool for organizations and individuals to quickly check if their email is protected from a few specific threats,” said Liron Barak, CEO of BitDam. “Once the security gap has been recognized, users can take action to remediate and close the gap with our Advanced Threat Protection service. As a company, our first obligation is to do whatever we can to mitigate a cyberattack. We’re constantly looking for new ways to provide offerings that help organizations and individuals stay secure. Our new email-centric BAS service is another step in the direction of total cyber security.”

The BitDam email-centric BAS service may be found here.

About BitDam

Showing x10 detection rates compared to the industry standard, BitDam cyber security blocks advanced content-borne attacks across all enterprise communication channels. Protecting email (Office 365, G-Suite, MS Exchange), cloud storage (OneDrive, G-Drive, Dropbox, Box etc.) and IM (Slack, Teams, Skype and more) BitDam empowers organizations to collaborate safely. Our cloud-based solution proactively detects attacks, pre-delivery, preventing hardware and logical exploits, ransomware, spear-phishing and Zero-Day attacks contained in files and URLs.

While current cybersecurity solutions are based on knowledge of previous attacks, limiting their ability to detect unknown threats, BitDam’s unique attack-agnostic technology enables it to provide remarkably higher protection. BitDam learns the normal code-level executions of business applications such as MS-Word and Acrobat Reader. Based on this whitelist, BitDam determines whether a given file or weblink is malicious or not, regardless of the specific malware it may contain.

Recognized by Frost & Sullivan for its technology leadership, and utilized by hundreds of thousands of end-users, BitDam’s Advanced Threat Protection is deployed by leading organizations in Europe and the US, with a proven record of detecting threats that other security solutions fail to uncover.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Visit website