spacer
Blog | Contact Us | Customer Portal  
info@coresecurity.com | +1.617.399.6980   spacer spacer spacer
  • 1
  • 2
  • 3
Do you know if your critical
assets are exposed?
We do.
Our security test and measurement solutions continuously identify and prove real-world
exposures to your most critical assets.
spacer     spacer
Introducing CORE INSIGHT Enterprise:
The First Continuous, Real-World
Security Testing Solution
- Precisely measure if critical assets are exposed to breaches.
- Reduce security data volume and identify exposures that matter.
- Verify security controls and threat readiness.
- Answer the question, "Are we more secure than yesterday?"
spacer     spacer
How does our penetration testing software
measure up according to SC Magazine?
"Power, flexibility, ease of use ...
this one has it all ... Core Impact
becomes our benchmark."
spacer     spacer

Welcome to Core Security Technologies

Core Security Technologies offers the first and only real-world approach to security testing and measurement. By replicating actual threats across the enterprise, our solutions reveal where and how attacks can access your most important information.

spacer    Get real visibility.    spacer    Get real validation.    spacer    Get real metrics.

spacer

  • Security Executives
  • Professional Security Testers
  • Small & Medium Businesses
spacer
Security Executives

Continuous, automated security testing with the CORE INSIGHT Enterprise solution:

spacer    Proactively identify real-world exposures in specific critical assets.

spacer    Delegate security assessments and improve staff efficiency.

spacer    Validate the effectiveness of security controls enterprise-wide.

spacer    Learn about CORE INSIGHT Enterprise

spacer
Professional Security Testers

Commercial-grade penetration testing with CORE IMPACT Pro software:

spacer    Pinpoint exploitable web applications, networks, endpoints, end users and
    WiFi.

spacer    Take control of real-world, user-guided attack and pivoting capabilities.

spacer    Prioritize vulnerabilities with no false positives.

spacer    Learn About CORE IMPACT Pro

spacer
Small and Medium Businesses

Our experts conduct penetration tests on your terms with IMPACT Professional Services:

spacer    Web application, network, endpoint, end user and WiFi testing services

spacer    Clear reports of proven exposures + remediation recommendations

spacer    Ad-hoc or scheduled engagements

spacer    Learn About Professional Services

Latest News       View all

Mar 29
Leading Industry Analyst Recommends Penetration Testing

Mar 23
Core Security Executive to Testify Before Senate Committee on Efforts to Secure Critical Infrastructure

Mar 17
Core Security Partners with Canadian Testing Specialists

Mar 10
Core Partners with NT Objectives to Deliver Integrated Security Test & Measurement and Web Application Scanning to Enterprises

Mar 04
Top Layer Selects Core Security’s CORE IMPACT Pro to Verify Network Intrusion Prevention System Protection

Mar 02
Core Security President and CEO Mark Hatton Spotlights Growing Market for Security Test & Measurement at the Montgomery Technology Conference

Feb 28
Core Security Receives Five-Star Product Review from SC Magazine for CORE IMPACT Pro v11

Feb 10
Core Security RSA Conference Week Activities Highlight Security Test & Measurement from the Front Lines to the Board Room

Feb 02
Presidential Advisory Commission on Cybersecurity Recommendations Point to Security Testing as a Key to Validating and Improving Cybersecurity

Jan 31
Core Security Technologies Discovers Vulnerability in Cisco WebEx Conferencing Applications

Advisories & Security Updates

  • Security Update: VLC Media Player AMV File Memory Corruption Exploit
  • Security Update: VLC Media Player NSV Memory Corruption Exploit
  • Advisory: VLC Vulnerabilities handling .AMV and .NSV files
  • Security Update: Adobe Flash Player SWF File Uninitialized Memory Exploit
  • Security Update: Microsoft NET Runtime Optimization Service Privilege Escalation Exploit
  • Security Update: Microsoft .NET Runtime Optimization Service Privilege Escalation Exploit
  • Security Update: Phoenix Project Manager wbtrv32 DLL Hijacking Exploit
  • Security Update: Blackmoon FTP Server PORT DoS
  • Security Update: Microsoft Windows Hyper-V VMBus Vulnerability DoS (MS10-102) Update
  • Security Update: Microsoft Windows Media Player DVR-MS Memory Corruption Exploit (MS11-015)
  • Security Update: CA ARCserve D2D Apache Axis2 Default Credentials Remote Code Execution Exploit
  • Advisory: ZOHO ManageEngine ADSelfService multiple vulnerabilities
  • Advisory: Cisco WebEx .atp and .wrf Overflow Vulnerabilities
  • Advisory: Symantec Intel Handler Service Remote DoS
  • Advisory: Multiple vulnerabilities in BugTracker.Net
  • Advisory: Landesk OS command injection
  • Advisory: Apple OS X ATSServer CFF CharStrings INDEX Sign Mismatch
  • Advisory: LibSMI smiGetNode Buffer Overflow When Long OID Is Given In Numerical Form
  • Advisory: MS OpenType CFF Parsing Vulnerability
  • Advisory: Microsoft Office HtmlDlgHelper class memory corruption
  • From our Blog       View all

    Apr 04
    Mirror Mirror on the Wall
    Mar 31
    Pick an Access Point, any Access Point: Assessing Man-in-the-Middle Threats Over WiFi
    Mar 30
    Why Limit Yourself When Penetration Testing?
    Mar 28
    Mobile Risk Management in the Age of 4G
    Mar 24
    Fun with SQL Injection Penetration Testing in CORE IMPACT Pro
    Mar 21
    Focusing on the Spirit of NIST’s Guidance for Continuous Monitoring
    Mar 18
    Stopping to Smell the Updates: CORE IMPACT Pro Exceeds 100 Updates YTD
    Mar 11
    Addressing the Inherent and Inherited Risks in Cloud Computing
    Mar 04
    Shrugging and Eye-Rolling Is Not a Cloud Security Verification Strategy
    Feb 23
    Behind the Curtain: A Journey into Reversing the Hyper-V VMBus Exploit (MS10-102)
    CORE ON CAMERA
    spacer
    CORE CUSTOMERS: View All
    gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.