HORNE Cyber announced Threat Runner, a revolutionary security product that, for the first time, safely emulates an authentic malware infection on your organization's network, exposing vulnerabilities in need of remediation without encrypting files and sensitive data. Cybersecurity engineers with Threat Runner have succeeded in reverse engineering malware from the ground up, accurately emulating threats while de-weaponizing them. This means security testing can be done against real threats, instead of hypothetical, providing a true picture of where an organization's security stands.
"There is no better way to know your own cybersecurity threshold than witnessing how your network will react to real world threats," said Dr. Wesley McGrew, Director of Cyber Operations at HORNE Cyber. "We believe Threat Runner is a revolutionary advancement for IT and cybersecurity professionals. It delivers easy access for organizations of any size to take an offense-oriented approach to cyber resilience and strengthen their overall security postures."
Threat Runner initially launches with the option to test six of the most damaging malwares ever seen, including:
Importantly, this is only a start for Threat Runner. Its developers will be continually updating the product with the latest malware and ransomware variants that are impacting businesses worldwide.
"Our goal is to help organizations of any size be proactive in preparing for the worst malware that exists, and we will achieve that by emulating the latest threats quickly and by making our product easily affordable and accessible," said Kendall Blaylock, Director of Cyber Intelligence at HORNE Cyber.
Threat Runner starts at an inexpensive price point of $750 for four runs of a threat variant of your choice. Price packages go up with the number of variants and threat runs. Custom packages are available for larger companies who want regular access to all variants and unlimited test runs.
Threat Runner is also easy to use, as simple as downloading directly from the Threat Runner website and running the program.
Once Threat Runner has completed its work, organizations will receive an interactive report with detailed findings and recommended steps for remediation. This report includes a list of compromised nodes and a network tree to visually show how far the emulated malware spread across your network?all of which gives you a valuable understanding of exactly where your organization's vulnerabilities lie.
For more information on Threat Runner and how you can run it, visit ThreatRunner.com.
About HORNE Cyber
HORNE Cyber provides offense-oriented cybersecurity services for clients in the areas of digital forensics and incident response, advanced penetration testing, strategic advisory, ERP services, regulatory compliance and IT assurance. HORNE Cyber is a wholly owned subsidiary of HORNE LLP, an accounting and advisory firm. Our Threat Runner product is managed out of Nashville, Tennessee, and supported by offices across the mid-Atlantic and Southeast. HORNE Cyber is committed to not only being the best cybersecurity partner for businesses and organizations of all sizes, but to aiding the world as much as it can by innovating with products like Threat Runner that will help the greater good and shore up cyber defenses for anyone who downloads the software.
For more information visit HORNECyber.com.
These press releases may also interest you