Penetration Testing Services Cloud Pentesting Penetration Network Pentesting Application Pentesting Web Application Pentesting Social Engineering January 7, 2025 On this page BreachLock Introduces New Unified Platform A unified solution and shared data model providing improved operational efficiency, greater transparency, and the flexibility to optimize security testing effectiveness. Enterprises are inundated with vulnerability findings often prioritized solely by Common Vulnerability System Scores (CVSS). The need for contextual asset enrichment and various attack paths are sorely needed to aid in the acceleration of vulnerability investigations and proper remediation. Security practitioners no longer find it viable to view security testing assessments as tick-box activities and a list of isolated threats and the need for a consolidate solution has never been greater. One Platform, Endless Possibilities BreachLock now offers a solution in a single consolidated platform affording enterprises the opportunity to reduce overhead associated with siloed solutions and mundane or poorly prioritized findings. The BreachLock Unified Platform consolidates security solutions and test findings, harnessing a common data model to identify and validate threats, map attack paths, and achieve seamless visibility across your entire attack surface.– all in one place. BreachLock breaks down silos and connects solutions to deliver a unified view of your security landscape for comprehensive asset visibility. By leveraging the power of integration, BreachLock consolidates PTaaS, Attack Surface Management, continuous pentesting and automated scanning, as well as red teaming capabilities in one data model for endless clarity and reporting. Overview of BreachLock Unified Platform Dashboard: Overview By leveraging the power of integration, the BreachLock Unified Platform showcases a full portfolio of solution capabilities and features in one data model for endless clarity and reporting. Upon logging into the platform Dashboard, users unlock unparalleled operational efficiency, gain crystal clear transparency, maximize the impact of security testing, and confidently measure ROI – all with a comprehensive, centralized view of an enterprise’s security investments and outcomes. The Dashboard provides an overview and pictorial representation of the user’s scope for easy consumption for security teams, as well as CISOs and executives in the enterprise. This Dashboard represents an enterprise’s Asset Management and Discovery process that identifies IT assets in real-time and the potential security risks and vulnerabilities that affect each one. Dashboard: Overview of Attack Surface & Vulnerabilities This includes: Total Assets – A count of exposed assets discovered in the Domain Discovery scan within the enterprises. Vulnerabilities – A total number of discovered vulnerabilities associated with the target assets for which the pentest or automated pentest have been executed. Overall Risk – A distribution of vulnerabilities classified by risk that BreachLock experts have assessed and identified. Credential Breach – This overview represents the count of exposed users and passwords that were found on the Dark Web resulting from Data Breach scans. These exposures can be used by a threat actor to perform unauthorized activities again an enterprise. Recent Vulnerabilities – The actual vulnerabilities discovered, type of vulnerability associated with an asset or assets, its impact, and respective risk score. Detailed Description – This includes vulnerability name, assets impacted, CVSS Score and Vector, detailed vulnerability description and assets impacted. An evidentiary Proof of Concept (PoC) is included, correlating with the remediation recommendation. Users can click on any of the vulnerabilities to see further detail and contextual data. Dashboard: Vulnerability Context & Details To dig deeper, users can click on each individual vulnerability to view contextual data regarding the vulnerability itself, where it originated, its severity and CVSS Score and CVSS Vector. So, it’s just not providing a line item rather it is part of a rolled-up view for better consumption of how many assets are affected with those specific vulnerabilities. The Vulnerability Details will include: Name of vulnerability Risk severity CVSS Score and CVSS Vector – BreachLock supports CVSS 3 and 4 A detailed description of the vulnerability Expert recommendation for remediation and ramifications if action is not taken Assets impacted Newly discovered or rediscovery vulnerability Proof of Concept or evidence that the vulnerability exists Each asset is labeled whether it identified for the first time labeled as “New Discovered” or it can be labeled “Rediscovered”. If the vulnerability is discovered for the first time, our experts will inform the user that it is a newly discovered vulnerability and should pop up on their radar as newly identified. A newly discovered vulnerability can be discovered multiple times because every time it represents another asset. Rediscovered conveys that the vulnerability has not been mitigated properly yet and remains within discovery. In addition, and most importantly, details will include evidence of the vulnerability with an automatic POC. The POC is proof that the vulnerability exists, where it was found, and is evidence that the vulnerability is not a false positive but actually a risk to the organization. In addition to the Dashboard overview, the BreachLock Unified Platform includes the following consolidated features across the product portfolio: Attack Surface Discovery & Management: External (EASM) and Internal (supported by PTaaS) – includes asset discovery, scan status, attack path mapping & validation, run a scan live or scheduled, scheduling a scan, add asset, and export discovery. Attack Surface Analytics: A highly detailed and intuitive visual representation of assets identified through the Asset Discovery process. It transforms raw asset data into visual intelligence, making it easier for security practitioners to analyze, understand, and respond to risks. Data Breach: The Data Breach feature within EASM closely correlates with the Asset Discovery feature. In the Data Breach view, users will see the user exposure within the selected domain on the Dark Web. Continuous Security Testing: Automated Pentesting (APT) Scans, Scan Status, and Scan Scheduling: Users have a complete pentest automation hub and overview of all scans at all times. These assets were either identified during Asset Discovery, whether auto discovered or manually added, or a combination of these and added into inventory. APT Scans Run a Scan Live or Scheduled Add Asset Scan Status, Details, & Digital Footprint Asset Details & Vulnerability Contextual Data Running a Rescan Scan Schedule ASM – Vulnerabilities: A rolled-up view of all vulnerabilities discovered through the attack surface discovery process – includes vulnerability dashboard, vulnerability details, including POC, and automated rescans. PTaaS: A rolled-up view of all manual pentests (Black, Gray, White Box) whether requested, in progress or completed – includes pentest dashboard, request new pentest, and a rolled up view of all vulnerabilities, details, and POC. Reporting: Generate a Report for PTaaS, ASM, APT-Web, APT-API, APT–External Network – includes select assets to generate a customized report for only the assets you select and review and download report. Asset Inventory: A rolled up cumulative view of all assets discovered whether auto or manually discovered, active or inactive. Assets: Filtered by domain, subdomain, IP, URL (endpoint) Mobile, Cloud, IoT, Other Ability to Deactivate Asset Add Asset Create Asset Groups Settings & Subscription Details: Organization Details: Users have the ability to view subscription and credit consumption Virtual Appliance Mapped & Tested: Includes Hyper-V and OVA or custom User Management Integrations: Slack, Jira Cloud, ServiceNow, Azure DevOps, GitHub Notifications: All System and Email Notifications for scan failures or other By consolidating assets, vulnerabilities, and test findings in one unified platform, organizations eliminate the inefficiencies of switching between multiple tools and systems centralizing automated workflows across all solutions and accelerating the remediation and reporting processes. With findings all in one place, the BreachLock Unified Platform unifies analytics and shares insights across DevSecOps teams enabling faster decision-making based on real threats and their potential impact. With high fidelity data, users can better understand vulnerable assets and why they may be business critical. Demo Watch all demos of The BreachLock Unified Platform here. Author Ann Chesbrough Vice President of Product Marketing, BreachLock Industry recognitions we have earned Tell us about your requirements and we will respond within 24 hours. Fill out the form below to let us know your requirements. We will contact you to determine if BreachLock is right for your business or organization.