Threat Intelligence Launches Evolve
August 02, 2018

Threat Intelligence announced the global launch of Evolve, a new cloud-based all-in-one security automation platform.

Evolve delivers three pillars of comprehensive security automation across a unified platform – automated penetration testing, automated security infrastructure orchestration and automated incident response.

With Evolve, businesses and individuals can enhance current security skills and capabilities; streamline security operations and maximize existing security budgets, ensuring a better ROI. The innovative security automation platform is also revolutionising the consumption of security services with the choice of a subscription or on-demand usage-based business model.

“Evolve is an innovative security automation platform for businesses and individuals based anywhere in the world,” said Ty Miller, Managing Director of Threat Intelligence. “It is designed to address the current gap in automated security offerings. By integrating an automated approach to penetration testing, security infrastructure orchestration and incident response we are able to deliver the broadest automated security platform offering in the market today.”

He continued: “Evolve also has a unique capability to orchestrate whole environments on the fly, making it easier to respond to rapidly evolving security needs. Our goal is to make automating security requirements easy.”

The Evolve security automation platform has been launched to meet an increased demand for a rapid response to increasing security visibility and capabilities in a more efficient operational and cost-effective manner. It meets these needs via its highly transparent platform capable of dissolving threats across one interface.

Evolve Platform

- Greater on-demand coverage - Execute on-demand automated penetration testing to identify key attack vectors and security flaws faster than ever before. Location-Agnostic Penetration Testing now allows penetration testing environments to be orchestrated in the cloud or across security zones. Evolve delivers better quality penetration testing and repeatable real-time verification of risks. Organizations can minimize the time it takes to detect critical risks and security weaknesses. This is achieved through Automated Reconnaissance, Automated Infrastructure Penetration Testing and Automated DevOps Application Security Testing.

-Immediate proactive protection - Evolve Security Automation makes it easy for organizations and security teams to orchestrate a wide range of security infrastructure components and automate the integration of Cyber Threat Intelligence feeds in for immediate proactive protection. Using the Evolve “Location-Agnostic Orchestration” capabilities, these security infrastructure components can be orchestrated within the Evolve Cloud or across any security zone in your organisation or third-party cloud provider.

-Transformational incident response – Evolve enables automatic evidence collection, analysis and response to security incidents to ensure that threats are dissolved, and breaches are contained. Responses are customized for each organizations’ needs.

“Evolve was developed to directly respond to evolving global threats and the challenges of limited security budgets, skills and resources. We acknowledge many organizations would love to be able to better proactively respond to security challenges, rather than constantly managing security issues. Evolve lets them do this and can scale up or down to meet their needs at different times,” concluded Miller.

Evolve is commercially available now.

The Latest

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

July 24, 2018

What top considerations must companies make to ensure – or at least help improve – Agile at scale? The following are key techniques and practices to help accelerate Agile delivery rollouts and scale Agile and DevOps in the Enterprise ...

Share this