Core Security

Core Security provides the industry's first comprehensive attack intelligence platform offering advanced analytics to prioritize, validate and ultimately eliminate security threats. With Core Security, enterprises and security professionals focus on the most likely threats to their business by modeling, simulating and testing the actions of an actual attacker.

Core Security helps more than 1,000 customers worldwide identify the most vulnerable areas of their IT environments in order to improve their remediation efforts and better secure their business. The company's patented, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from CoreLabs research and Core Security Consulting Services.

E-SPIN and Core Security

E-SPIN has actively promoted Core Security's full range of products and technologies as part of the company Vulnerability Management and Penetration Testing solution portfolio, since 2015 as being a regional partner. Despite Core Security changing a few rounds of ownership, E-SPIN continues to commit in providing consulting, supply, training, and maintaining Core Security products for the enterprise, government and military customers (or distribute and resell as part of the complete package) on the region E-SPIN do business. The enterprise range from telecommunications, corporate, government agencies to IT Security Share Service Outsourcing (SSO) service providers on vulnerability management, penetration testing, cyber security/cyber warfare for unified Vulnerability Management, Penetration Testing and Exploitation Management.

Please feel free to contact E-SPIN for your inquiry and requirement, so we can assist you on the exact requirement in the packaged solutions that you may require for your operation or project needs.

Core Impact

Core Impact provides vulnerability assessment and penetration security testing throughout your organization.

Core Impact is the most comprehensive solution for assessing and testing security vulnerabilities throughout your organization. Core Impact is the only solution that empowers you to replicate attacks that pivot across systems, devices, and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

Core Impact gives you visibility into the effectiveness of your endpoint defenses and reveals where your most pressing risks exist across your network. This enables you to evaluate your organization’s ability to detect, prevent, and respond to real-world, multi-staged threats.
Core Impact's new Named User Pricing model enables users to leverage an unlimited number of IPs to test and helps organizations fit Core Impact within their budgets. Now, organizations can expand the number of Penetration and Red Team users who have access to Core Impact, to more effectively conduct penetration tests without restricting the number of IPs.

Key Features:

  • Multi-vector Testing Capabilities Across Network, Web, and Mobile
    • Empowers replicated attacks across all systems, reveals the exploited vulnerability, and allow you to remediate the risk immediately.
  • Test more common Vulnerability Exploits than the Competition
    • Through pen-testing capabilities you are able to test all workstations for various vulnerabilitites, in addition to gauging the effectiveness of anti-virus, HIPS, and other perimeter defenses.
  • Ensure Vulnerabilities were Remediated
    • Evaluate your security posture using the same techniques employed by today's cyber-criminals.
  • Controlled Commercial-grade Exploits using a Simple Interface
    • Endpoint systems tested with commercial-grade client-side exploits in a controlled manner using a simple interface.
    • Through network testing, this solution gathers network information and performs attacks to test the system's ability to identify and remediate.

Cobalt Strike

Software for Adversary Simulations and Red Team Operations

Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of an advanced adversary in a network. While penetration tests focus on unpatched vulnerabilities and misconfigurations, these assessments benefit security operations and incident response.

Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network. Malleable C2 lets you change your network indicators to look like different malware each time. These tools complement Cobalt Strike's solid social engineering process, its robust collaboration capability, and unique reports designed to aid blue team training.

Core Impact Latest Release and Update

Core Impact Latest Release and Update post is specially dedicated to this Core Security powerful Penetration Testing software, Core Impact which are designed to ease security team in conducting advanced penetration. Please read in reverse order, if you interest from the old to latest manner as the latest release note and build always increment update
What is Core Impact? Core Impact is a penetration testing software that empower the security team to safely identify and exploit security weaknesses. It applies the same techniques as today’s threat actors or adversaries to efficiently test your IT infrastructure. With Core impact, organisations are able to discover, test, and report through a few simple

Cobalt Strike product overview

Cobalt Strike is an operating system for Adversary Simulations and Red Team Operations. Adversary Simulations and Red Team Operations are security appraisal that clone the tactics and capability of an advanced adversary in a network. In the same moment, penetration tests focus on un-patched vulnerabilities and mis configurations, these assessments benefit security operations and incident
E-SPIN and Acunetix
KUALA LUMPUR, MALAYSIA (May 29, 2020)—E-SPIN Group of Companies, an enterprise cybersecurity, infrastructure, and application security management services company, headquartered in Singapore, Kuala Lumpur, and Hong Kong, today entered into a partnership with Core Security, a HelpSystems Company. The partnership allows E-SPIN to offer Core Security Identity, Cyber Threat, and Pen Testing solutions to customers
Tagged under:
Acunetix latest update with ShellShock (CVE-2014-6271 vulnerability) detection support
Core Data Access Governance (DAG) provides an automated, scalable, interoperable platform to govern unstructured data. Interoperability with IAM, HR systems, and other applications facilitates automated work flows to secure sensitive data, apply a consistent permissions model and enforce least-privileged access control. Benefits: Permissions Reporting and Remediation Core DAG makes it easy to see who has
Tagged under:
Visiwave Traffic Product Overview by E-SPIN
Core Role Designer brings an innovative, new approach to designing roles that enabling best in class role-based access control for your organization. Our visualization-first approach allows role creators to make intelligent decisions about which entitlements should be included in a role, and which users should be assigned to this role. Core Role Designer’s visualization shows
Tagged under:
Web Application Security Assessment (WASA) as a Service Product Overview by E-SPIN

Core Impact Pro 2016 R1.2

E-SPIN pleased to announce Core Security official release of Core Impact Pro 2016 R1.2. More than 46 updates have been added thus far, and are available through the regular update channel for all Core Impact customers who have upgraded to the latest version. The team has been working on several privilege escalations, a number of remote
E-SPIN Core Access Insight Product Overview
Latest update: 2020-Apr-23 Helpsystems (the firm acquired Core Security) CJ Wong, Security Advisor APAC & Japan, confirmed that the product Access Insight is end of life (EOL). Below is serve as the product archive information. Please use it carefully. Core Access Insight (formerly Access Insight) helps resolve immediate threats with prognostic analytics applied to the
Tagged under: