System Overview

Storm Analyzer provides a 360-degree view of the organization attack map through the generation of a complete attack graph that covers all the critical paths through which an organization can be exploited. Then the Storm Analyzer relies on reinforcement learning to prioritize these critical paths.

Storm Analyzer facilitates comprehensive network security analysis by conducting complete internal infrastructure scanning combined with critical path analysis. Using inputs such as asset topology and vulnerability data, These inputs provide essential information about the network's assets, vulnerabilities, connections, and configurations, enabling Storm Analyzer to assess security posture effectively.

The asset topology serves as the foundation of the analysis, offering insights into the network's layout, asset properties, protocols, and interconnections. Users detail individual assets and their relationships, providing a clear understanding of the network landscape. Moreover, scanning for vulnerabilities, including weaknesses and misconfigurations, helps identify potential attack paths and assess the network's security readiness.

Storm Analyzer considers communication pathways and dependencies to evaluate the impact of vulnerabilities on the entire network. Additionally, asset configurations, such as firewall rules and access control policies, influence the security stance and inform the probability of successful attacks. Storm Analyzer creates these inputs to identify risks, vulnerabilities, and attack paths, empowering users to strengthen network security proactively.

Storm Analyzer Deliverables

Storm Analyzer provide users with the following:

Assets Analysis

Storm Analyzer performs a detailed analysis of all assets within the network. It identifies and lists each device, system, and application, providing detailed information about their configurations, connections, and roles within the network. This helps users understand the nature of their network infrastructure and ensures that no critical assets are ignored.

Vulnerabilities Analysis

Storm Analyzer conducts a full vulnerabilities analysis to detect security weaknesses in the network. It scans vulnerabilities, misconfigurations, and entry points that attackers could exploit. By identifying these vulnerabilities, users can prioritize their remediations and strengthen their network security.

Critical Paths Analysis

Storm Analyzer uses advanced algorithms to analyze the network's attack graph and identify critical paths that attackers might take to exploit vulnerabilities. These paths are ranked based on their potential impact, helping users understand which vulnerabilities will cause the greatest risk and should be addressed first to prevent security breaches.

Critical Assets Analysis

Storm Analyzer highlights critical assets within the network, it takes into consideration the vulnerabilities on the assets , critical paths passing through these assets and criticality of the assets to the business. This analysis helps in prioritizing security measures for assets.

Attack Scenarios and Remediation

Storm Analyzer provide potential complete attack scenarios to predict how attackers might target the network. It provides detailed insights into these scenarios and offers remediation strategies to deal with the identified threats. Users can use this information to proactively address security gaps and improve their network's resilience against cyber attacks.

Storm Analyzer workflow

Last updated