The rigorous inspection carried out makes it possible to detect all security issues with no false positives and no false negatives, and to check if the issues have been properly repaired before the system goes into production. Through human creativity and precision, combined with the speed of the automatic, Drills finds deep and zero-day vulnerabilities during software development.

Key Benefits

Key Features

Selection of Security Requirements

You are able to decide which security requirements will be tested during each ethical hacking assignment: PCI, HIPAA, OWASP, NIST, GDPR. You will know the exact severity of each hacking project (for inspected and uninspected profiled requirements).

Vulnerabilities Management Platform

Findings are reported in Integrates, Fluid Attacks' platform that allows control of the vulnerability testing and remediation processes. You can use it to access general information about each finding, check its remediation status, classify it according to age, visualize real-time system statistics and progress, as well as other functionalities.

Remediation

Multiple finding validation cycles are performed. You can check if any findings have been successfully closed as many times as you require. In order to perform a remediation validation, you must define the treatment used and then proceed to request a finding validation.

Health Check

All versions of existing code should be attacked up to the subscription start point, in addition to the monthly test limit. A health check is scheduled at the beginning of the subscription in order to catch up with the development team. Then, the continuous hacking advances simultaneously with the development.

Critical Information Extraction

Whenever findings indicate the need to obtain information, the extraction is done to maximize finding impacts without compromising sensitive information.

 

 

Young hacker smiling

Do you want to know more about Drills?

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy