Beyond Security
Encyclopedia
Beyond Security is a developer of IT security products that specializes in vulnerability assessment (VA) and vulnerability management (VM) products. The company is best known for its information security portal SecuriTeam
SecuriTeam
SecuriTeam is a free and independent computer security portal, covering both security news and the most recent threats, with a database dating back to 1998...

, and its research and discovery of various security holes in products and applications and research in the fields of botnet
Botnet
A botnet is a collection of compromised computers connected to the Internet. Termed "bots," they are generally used for malicious purposes. When a computer becomes compromised, it becomes a part of a botnet...

s.

Beyond Security's R&D
Research and development
The phrase research and development , according to the Organization for Economic Co-operation and Development, refers to "creative work undertaken on a systematic basis in order to increase the stock of knowledge, including knowledge of man, culture and society, and the use of this stock of...

 center is based in Netanya
Netanya
Netanya is a city in the Northern Centre District of Israel, and is the capital of the surrounding Sharon plain. It is located north of Tel Aviv, and south of Haifa between the 'Poleg' stream and Wingate Institute in the south and the 'Avichail' stream in the north.Its of beaches have made the...

, Israel
Israel
The State of Israel is a parliamentary republic located in the Middle East, along the eastern shore of the Mediterranean Sea...

 and its US headquarters are in Cupertino, California
Cupertino, California
Cupertino is an affluent suburban city in Santa Clara County, California in the U.S., directly west of San Jose on the western edge of the Santa Clara Valley with portions extending into the foothills of the Santa Cruz Mountains. The population was 58,302 at the time of the 2010 census. Forbes...

. The company was founded in 1999 by Aviram Jenik (now CEO) and Noam Rathaus (now CTO). Beyond Security has a total of 30 employees worldwide.

Product lines:
Appliance based Vulnerability Assessment and Management Tools (AVDS - Automated Vulnerability Detection System) with centralized Management and reporting engine. The VA/VM system is also available as a non central managed which can be used for smaller company units and/or Consultants that want to serve customers on different places without offering managed services.

Automated 2nd generation Fuzzing Tool with around 150 protocol testing tools covering network based protocols an Web Applications. The Fuzzing Tool very flexible due to auto recognition module for proprietary protocols. The tool has an easy to use GUI and comes with Windows and Linux flavour. Installation of the tool needs around 5 minutes and then is ready to operate. It consists of a Testing Client (which includes all protocol modules - f.e. BGP, BVLC (BACnet transport), DHCP, Diameter, DNP3 (SCADA), DNS, FTP, GTPv1 (GTP-U), HTTP/1.0, HTTP/1.1, HTTPS, IMAP, ISUP (SIP-I, SIP-T), ISAKMP (IKE), LDAP, LLC, M3UA (MTP3), MGCP (Megaco, H.248), Modbus (SCADA), NNTP, NTP, OSPF, POP3, Radius, RSH, RTP, RTSP, SDP, SIP, SNMP (v1, v2 and v3 with/without MD5, SHA and DES), SMTP, STUN, SYSLOG, SSH, TFTP, Teredo, Telnet, TPKT (RFC 1006), etc.) and a monitoring application that monitors the tested system.

Beyond Security has recently been involved in investigating cyberattacks on Estonia and provided assistance to the local CERT office.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK