FORGOT YOUR DETAILS?

Core Security

Core Security provides the industry's first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and ultimately eliminate security threats. With Core Security, enterprises and security professionals focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.

Core Security helps more than 1,000 customers worldwide identify the most vulnerable areas of their IT environments in order to improve their remediation efforts and better secure their business. The company's patented, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from CoreLabs research and Core Security Consulting Services.

E-SPIN and Core Security

E-SPIN have actively in promoting Core Security full range of products and technologies as part of the company

Vulnerability Management and Penetration Testing solution portfolio. E-SPIN is active in provide consulting, suppply, training, and maintaining Core Security products for the enterprise, government and military customers (or distribute and resell as part of the compete package) on the region E-SPIN do business. The enterprise range from telecommunications, corporate, government agencies to IT Security Share Service Outsourcing (SSO) service providers on vulnerability management, penetration testing, cyber security/cyber warfare for unified Vulnerability Management, Penetration Testing and Exploitation Management.

Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may required for your operation or project needs.

Threat and Vulnerability Management Product Overview

Core Security provides a comprehensive set of vulnerability management solutions that help by simulating and validating what an adversary would do to reach your most critical business assets.

Core Impact - Penetration Testing

Core Impact is the most comprehensive solution for assessing and testing security vulnerabilities throughout your organization.

Core Vulnerability Insight - Vulnerability Management

Core Vulnerability Insight consolidates and prioritizes vulnerability management initiatives enterprise-wide by consolidating multiple vulnerability scans across vendors, while matching known exploits and simulating attacks.

Core Impact

Core Impact provides vulnerability assessment and penetration security testing throughout your organization.

Core Impact is the most comprehensive solution for assessing and testing security vulnerabilities throughout your organization. Core Impact is the only solution that empowers you to replicate attacks that pivot across systems, devices, and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

Core Impact gives you visibility into the effectiveness of your endpoint defenses and reveals where your most pressing risks exist across your network. This enables you to evaluate your organization’s ability to detect, prevent, and respond to real-world, multi-staged threats.
Core Impact's new Named User Pricing model enables users to leverage an unlimited number of IPs to test and helps organizations fit Core Impact within their budgets. Now, organizations can expand the number of Penetration and Red Team users who have access to Core Impact, to more effectively conduct penetration tests without restricting the number of IPs.
Key Features:

  • Multi-vector Testing Capabilities Across Network, Web, and Mobile
    • Empowers replicated attacks across all systems, reveals the exploited vulnerability, and allow you to remediate the risk immediately.
  • Test more common Vulnerability Exploits than the Competition
    • Through pen-testing capabilities you are able to test all workstations for various vulnerabilitites, in addition to gauging the effectiveness of anti-virus, HIPS, and other perimeter defenses.
  • Ensure Vulnerabilities were Remediated
    • Evaluate your security posture using the same techniques employed by today's cyber-criminals.
  • Controlled Commercial-grade Exploits using a Simple Interface
    • Endpoint systems tested with commercial-grade client-side exploits in a controlled manner using a simple interface.
    • Through network testing, this solution gathers network information and performs attacks to test the system's ability to identify and remediate.

Core Vulnerability Insight

Consolidates and prioritizes vulnerability management initiatives, while matching known exploits and simulating attacks.

Core Vulnerability Insight (formerly Core Insight) unifies, regulates, and prioritizes vulnerability management initiatives enterprise-wide. Consolidating multiple vulnerability scans across vendors, while matching known exploits and simulating attacks, enables you to focus on the most vulnerable points of your network.

With greater scalability and advanced attack path analytics, Core Insight helps you to accurately identify the vulnerabilities that pose the greatest threat to critical business assets, regardless of the size and complexity of your IT landscape. Once critical vulnerabilities are prioritized, you can move quickly to remediate the threat in your systems.
Key Features:

Consolidate and Prioritize Vulnerabilities

Single occurrence asset stores for fast data import, analytics, and queries with pre-defined connectors to popular vulnerability assessment solutions.

Model Threat Scenarios Using Configurable Risk Criteria

Demonstrate how attackers can chain vulnerabilities across vectors to move through your environment and consider all possible exploits, including “in-the-wild,” private, theoretical, wormified, virus, and malware.

Identify and Eliminate Attack Paths to Critical Assets 

Reveal specific assets and exposed resources while validating systems and devices that may lead to critical business assets.

Leverage Flexible Reporting Options

Customize with templates and share granular filtering, grouping, and configuration of large amounts of data that measure the effectiveness of remediation efforts, compare, and track results over time.
Core Security Core DAG Product Overview by E-SPIN
Core Data Access Governance (DAG) provides an automated, scalable, interoperable platform to govern unstructured data. Interoperability with IAM, HR systems, and other applications facilitates automated work flows to secure sensitive data, apply a consistent permissions model and enforce least-privileged access control. Benefits: Permissions Reporting and Remediation Core DAG makes it easy to see who has
Tagged under: , ,
Visiwave Traffic Product Overview by E-SPIN
Core Role Designer brings an innovative, new approach to designing roles that enabling best in class role-based access control for your organization. Our visualization-first approach allows role creators to make intelligent decisions about which entitlements should be included in a role, and which users should be assigned to this role. Core Role Designer’s visualization shows
McAfee Web Security Product Overview by E-SPIN

Core Impact Pro 2016 R1.2

E-SPIN pleased to announce Core Security official release of Core Impact Pro 2016 R1.2. More than 46 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team has been working on several privilege escalations, a number of remote
This video is about E-SPIN Core Access Insight Product Overview For those who can not join us for the full day Training session, please see the summary and highlight clip for the event. For further information, please contact us or visit to our website on http://www.e-spincorp.com
This video is about E-SPIN Core Access Assurance Suite Product Overview For those who can not join us for the full day Training session, please see the summary and highlight clip for the event. For further information, please contact us or visit to our website on http://www.e-spincorp.com
This video is about E-SPIN Core PAM (Privileged Access Management) Product Overview For those who can not join us for the Training session, please see the summary and highlight clip for the event. For further information, please contact us or visit to our website on http://www.e-spincorp.com
This video is about Core Security Core Insight Product Overview by E-SPIN For those who can not join us for the session, please see the summary and highlight clip for the event. E-SPIN recently run a Core Security Core Insight what’s new session cover what new for new user and existing users. For further information, please
This video is about Core Security Core Insight Technical Overview by E-SPIN For those who can not join us for the session, please see the summary and highlight clip for the event. E-SPIN recently run a Core Security Core Insight what’s new session cover what new for new user and existing users. For further information, please
TOP