Scroll down for the full case in PDF ⬇️
About Critical Software
Critical Software is an international technology company specializing in the development of software solutions to support critical and reliable systems in diverse sectors such as space, aviation, energy, defense, finance, e-commerce, medical devices, and transportation.
It’s a huge software development company with more than 1000 employees, and they needed the reassurance that their assets were safe.
Industry: Information Technology, Aerospace & Defense
Headquarters: Coimbra, Portugal
Employees: +1000
Protected Attack Surface: 25 assets
Mitigated Impactful Risks: 4
They were dealing with zero-tolerance scenarios
As mentioned, they work in critical industries, like defense and aerospace. The assets they work with have zero tolerance for malicious hacking and breaches. Here, a single attack could spell disaster.
And that's why annual pentests were not enough. They were looking for a tool to automate security tests and that would look for new vulnerabilities continuously and alert them on the spot.
Having a continuous pentesting
To meet their air-tight security requirements, Critical Software implemented our Artificial Hackers. And it has been a game-changer.
1. Firstly, it runs 24/7, testing any new code deployments and eliminating the need to wait for the
annual penetration test.
2. Secondly, all vulnerabilities are automatically prioritized and reported with detailed mitigation guidelines, saving them significant time as they can quickly identify what needs patching.
Lastly, the rate of false positives from our Artificial Hackers is less than 1% thanks to our Proof of Vulnerability technology. This minimizes the time spent investigating non-existent vulnerabilities.
In short, it gave them peace of mind while keeping their workflow pretty much the same as it was before.
Keeping the most critical assets safe
With Machine Ethical Hacking they can reassure their clients in high-risk industries that the vulnerabilities affecting their assets are adequately managed, thanks to 24/7 monitoring and instant notification of new vulnerabilities.
And if any new potential security risks come up they can respond to them swiftly.
Download the full case study here | PDF