BreachControlTM calculates the business risk for every asset across the enterprise, using likelihood of breach and the business impact of such a potential compromise. This calculation takes into account vulnerabilities, external threats, existing compensating controls, and business criticality based on your internal environment –  to create an effective risk model. As a result, vulnerabilities identified across 100+ attack vectors – for all of the enterprise IT assets – are prioritized based on business risk, allowing security teams to focus on mitigating the most significant issues first.

With BreachControl, security teams can also track the enterprise risk posture as it changes with projects, get insights on the effectiveness of mitigation efforts over time, and identify where improvements can be made.

Watch Video

Business Risk Assessment

Understand the complete cyber-risk posture for your enterprise, based on business criticality including:

  • Overall breach risk, breach likelihood, and business impact of a breach
  • Prioritized risk insights based on business context

Risk Dashboard and Visualization

Interactive, real-time risk dashboard for rich visualization:

  • Clickable, drill-down views ranging from the overall enterprise environment down to individual assets, categorized by perimeter vs. core, asset type, and geo location
  • Visual segmentation allows viewing the risk by attack vector, asset type, and business criticality

Coverage Across 100+ Attack Vectors

Identification of vulnerabilities and risk across a broad set of 100+ attack vectors like:

  • Unpatched software, phishing, web, & ransomware
  • Misuse of trust relationships, missing & poor encryption
  • Misconfigurations and many more

Integrated Threat Intelligence

Integrated threat intelligence provides visibility into your exposure to ongoing threats by integrating several external threat feeds:

  • List of assets susceptible to threats like WannaCry, SambaCry, Poodle, Broadpwn, etc.
  • Information on threat mention sources like Dark Web, Pastebin posts, media, and research articles

IOC Prioritization

BreachControl ingests indicators of compromise (IOC) data from SIEM tools and applies deep context to:

  • Reduce the required actions from the SIEM output to a consumable amount to increase SOC efficiency
  • Scale security operations and improve cyber-resilience

Breach Path Modeling

Breach path propagation analysis identifies your enterprise’s likely breach scenarios:

  • BreachControl identifies possible breach paths by highlighting the initial attack point and subsequent lateral movement within the network to reach critical assets and data
  • Information on likely breach scenarios allows you to address potential issues in a timely manner

Security Control Effectiveness

Understand existing security control effectiveness and cyber-resilience:

  • View deployed security controls and assess their effectiveness to mitigate potential breaches and locate gaps
  • Model potential improvements in risk mitigation from deploying incremental security controls

Broad Internal and External Data Sources

Ingest real-time data from multiple internal and external sources and analyze it to produce a complete risk picture. Sources include:

  • Data from Balbix sensors
  • Enterprise log sources (e.g. DHCP), CMDB, Active Directory, and enterprise data lakes
  • Cloud logs
  • Global threat feeds

Ease of Deployment

Visibility into your enterprise risk within 48 hours:

  • Sensors plug into your environment in hours and automatically create an enterprise-wide risk heat map
  • Easy and efficient connections to your enterprise data sources allow for seamless data integration