Common use cases include several features. The POC is completed before any customer goes for procurement. Once the POC is done, customers appreciate features such as comprehensive attack surface coverage, real-world attack emulation, and risk-based prioritization and remediation. The comprehensive attack surface coverage includes Omni Attack Surface, External Attack Surface Management (EASM), and Internal Network Validation.
The real-world attack emulation includes safe-by-design exploitation that emulates actual attack techniques and procedures without disrupting business operations. It can perform post-exploitation steps to create a full attack chain. Another feature is agentless deployment, which requires no agents or pre-installations on the customer environment, allowing for quick deployment and validation.
The Mitre ATT&CK alignment aligns attack scenarios with the Mitre ATT&CK framework, providing a standardized understanding of adversary tactics.
The solution is primarily used in BFSI (banking and financial sectors), telecommunications companies, and several large government organizations.