Quantify the risk posed to your business by ransomware, verify your existing security controls, and identify remediation opportunities.
Riskatto does not contain the code to encrypt files. Our goal is to enumerate the magnitude of a potential event, not cause one.
Riskatto was created by seasoned security engineers with a reputation of integrity and open-source publications in the offensive security community.
Our code conducts multiple checks to ensure it's authorized to run. Users can cancel a scan at any time and all Riskatto agentless clients will exit.
Key the data collector to your environment.
Organizations often lack sufficient data to quantify the potential business impact of a ransomware event in their network. Business leaders need hard numbers to make more informed decisions to enhance their security posture.
Determine how ransomware could spread in your network and identify opportunities to remediate insufficient security controls. Dissect which user accounts, hosts and lateral movement vectors enabled compromise.
Identify how quickly ransomware would spread to understand how quickly your SOC would need to respond to prevent a critical incident.
Riskatto tracks the the files (including their paths and size) that ransomware could encrypt in your network. Riskatto v2.0 will identify the amount of encrytable/exfiltratable data that likely contains PII, which could trigger mandatory reporting requirements.
Track the user accounts, hosts and shares that were leveraged by the simulator to spread throughout your network. Take actions to limit accounts, hosts and shares with excess privileges and adjust permissions levels to adhere to the principle of least privilege.
Riskatto provides an estimated cost to remediate the ransomware event simulated in the scan. Our models take into account firm demographic information, mandatory reporting requirements, seasonality as well as the overall business impact generated by the simulation.
In the event you were opt to pay a ransom, how much would that cost in an actual cyber security incident? Riskatto combines industry data with the unique attack surface area mapped in your environment to model an estimated payout price in Bitcoin and USD.
We're constantly coming up with new ways to slice and dice the data Riskatto collects. We're also happy to work with our Yearly Plan clients to build custom data analytics models to target specific metrics important to your organization. Let us know what's important to you and if we can build it, we will!