Inspired by Netflix’s Chaos Monkey project, Infection Monkey is a data center pentest tool designed to spin up infected virtual machines within random parts of the data center to test for potential blind spots in the overall network security chain and help teams bolster their data center security resilience.
Today we are releasing the Infection Monkey, our inhouse tool for testing a data center’s resiliency to perimeter breaches and internal server infection. The Infection Monkey is a new open source security testing tool that we’ve developed at GuardiCore to test the resiliency of modern data centers to attack. Being good sports, we are sharing it with the security community. Just pick a random machine, release the Infection Monkey and see where it ends up. Use our Monkey to test whether your security systems can detect, stop and contain real threats. The monkey is benign and does not pose any risk to your network.
In our Black Hat 2016 session we will show how using the Infection Monkey for in-house penetration testing can be of great value to security teams, explain why this tool is important and present some use cases on how to use the tool in real-world security testing scenarios.
Modern, Disruptive Testing Tool Now Available to Public Security Community
San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and threat detection, today made its Infection Monkey testing tool freely available to the public security community at large. Designed to test the resiliency of modern data centers against cyber attacks, the Infection Monkey was developed as an open source tool by GuardiCore’s research group, led by seasoned cyber security researcher Ofri Ziv.
Organizations have historically dealt with breach attempts by trying to block the hacker as fast as possible and only stopping to investigate after the fact. But now, the security community is starting to adopt a new approach: Letting attacks play out in controlled conditions to gain a deeper understanding of the threat. The method is being popularized mainly by emerging startups like Israel’s GuardiCore Ltd., which raised $20 million in funding this morning to fuel its efforts.
Today I am excited to share that we have secured a financing round (Series B) in the amount of $20M. The round was led by our existing investors, 83 North and Battery Ventures, who continue to give us valuable contributions in terms of the support and guidance we need at this stage in our company’s lifecycle. We are also very happy to welcome Cisco to the table at this financing round.
Cisco Investments Joins Existing Investors Battery Ventures and 83North to Back Next-Generation Security Platform
San Francisco, CA and Tel Aviv, Israel – GuardiCore, a leader in internal data center security and threat detection, today announced that the company has raised $20 million in Series B funding. The latest round is led by existing investors Battery Ventures and 83North (formerly Greylock IL) and joined by Cisco Investments, bringing the company’s total funding raised to date to $33 million.
The first week of July provides a great opportunity to celebrate.
At GuardiCore we like to celebrate, especially with new releases and product achievements. Several weeks ago we started deploying the latest version of our flagship product Centra, with first controlled upgrades taking place for our SaaS customers. The new Centra 2.0 release 16 is loaded with great and many enhancements, including important Reveal features. For those of you who were unable to review the upgrade or read the entire release notes, here’s a very short list:
We introduced major enhancements to Reveal to better handle large data center scale flow analysis and advanced queries (check this cool video here).
Reveal now includes numerous new filtering methods to allow you to quickly get to what matters most: Detect applications, find anomalies or make sure that only allowed connections are made between servers. Reveal data center process level flows can be filtered by applications, asset names, port numbers, ESX folders, inbound and outbound Internet connections, user-defined labels and more.