Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.

2008 West
DIAMOND SPONSOR:
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
PLATINUM SPONSORS:
Red Hat
The Opening of Virtualization
GOLD SPONSORS:
Appsense
User Environment Management – The Third Layer of the Desktop
Cordys
Cloud Computing for Business Agility
EMC
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Intel
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Sensedia
Return on Assests: Bringing Visibility to your SOA Strategy
Symantec
Managing Hybrid Endpoint Environments
VMWare
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
PLATINUM SPONSORS:
Appcelerator
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
GOLD SPONSORS:
ICEsoft
How Can AJAX Improve Homeland Security?
Isomorphic
Beyond Widgets: What a RIA Platform Should Offer
Oracle
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
SYS-CON.TV
Today's Top SOA Links


CORE Security Adds Password Cracking and Team Testing to Latest Version of CORE Impact Pro

CORE Security®, a leading provider of predictive security intelligence solutions, today announced the release of CORE Impact® Pro 2013, the latest version of its vulnerability assessment and penetration testing software, that allows organizations to proactively test IT infrastructure and identify exactly where and how an organization’s critical data can be breached.

CORE Impact Pro 2013 adds several new capabilities. These advanced capabilities include CloudCypher, an online service created and managed by CORE that works with Windows® hashed passwords discovered by Impact during testing and attempts to determine plaintext passwords for those hashes. These obtained passwords can then be used for additional security testing. Other highlights of the release include the ability to team multiple security testers together to interact in the same workspace against the same target environment across multiple copies of Impact. In addition to these new features, Impact 2013 is supported by the company’s extensive library of more than 2,800 commercial-grade exploits and other attack techniques.

In addition to CloudCypher, and Teaming, CORE Impact 2013 new capabilities include:

  • Network Remediation Validation
  • DNS Communication Channel
  • Agent Redeploy
  • Network IG & AP Module output
  • Reporting enhancements

CORE Impact 2013’s Network Remediation Validation Wizard is a quick retest option used for previously identified network risks that confirm the risks have been remediated appropriately and the vulnerability management cycle is closed. This feature allows a closed loop capability for the testing process. This new release of Impact has added the ability to communicate using the DNS protocol to agents deployed using a specific set of modules. As security around TCP and HTTP protocols has improved, hackers have looked at alternative data protocols to infiltrate, adding the DNS capability allows testers to use the DNS channel as well. Agent Redeploy is a new feature that allows Impact to quickly verify whether a previously discovered vulnerability has been remediated.

CORE Impact now displays rich progress information as the automated pen tests execute against target networks, allowing a user to track progress. Using this feature, Impact can now demonstrate in a user-friendly and graphical manner, exactly what is being executed in real-time. The last new addition for Impact 2013 is report selection for reporting on specific hosts needed, rather than having to run the report on all hosts within the workspace. Reports that support this capability include:

  • PCI Vulnerability Validation Report
  • Vulnerability Validation Report
  • Host Report
  • Host Based Activity Report
  • Vulnerability Report
  • Wellness Report

“CloudCypher was originally developed by our internal pen- testing team to allow them to manage passwords more easily as part of a testing engagement. Adding this pen testers’ tool, used for nearly ten years of testing by the team, to our next version of Impact brings huge value to our user community. This advanced capability that we’ll offer as a cloud service going forward is another example of the unique features that CORE, as a multi-discipline company, can bring to this market,” said Milan Shah, senior vice president of Products and Engineering at CORE Security. “The teaming, DNS communications capabilities, and reporting enhancements are features that our users suggested to us, and we’re pleased to be able to add these feature requests to our market-leading product.”

More about CORE Impact Pro:

CORE Impact® Pro is the most comprehensive software solution for assessing the real-world security of web applications, network systems, endpoint systems, email users, mobile devices, wireless networks, and network devices. Backed by CORE Security’s ongoing vulnerability research, Impact Pro allows users to take security testing to the next level by safely replicating a broad range of data breach threats. As a result, testers can identify exactly where and how your organization’s critical data can be breached. Learn more about CORE Impact Pro penetration testing software at www.coresecurity.com/Impact.

About CORE Security

CORE Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CORE Labs, the company’s innovative security research center. For more information, visit www.coresecurity.com.

CORE Security, CORE Impact, CORE Impact Professional, CORE Secured, and CORE Labs are registered trademarks and/ or trademarks of CORE SDI, Inc. in the United States and/or other countries. All other products and services are trademarks of their respective owners.

About Business Wire
Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Web 2.0 Latest News
There's an impulse to roll one's eyes and think of legacy applications as problematic, almost by definition. They're old, and they may run on hardware that's slower or more difficult to maintain. But in many instances, that's too simplistic an assessment. Would you respond the same way...
Today's world is a completely different place than it was in the past. Even compared to just 20 years ago, everything about the way the world runs has been totally altered. This is in large part thanks to the widespread usage of the Internet as well as other advancements in technology....
While marketing automation by itself is extremely powerful and is mostly based in the cloud, the effectiveness of such strategies can be enhanced by leveraging the benefits that cloud computing offers. Not too long ago, marketers had to inevitably choose between two options - keep mark...
The help desk forms the backbone of IT operations for many federal, state and local government agencies. In fact, the cross-functional nature of its operation means the help desk directly impacts productivity and is an essential part of what enables an agency to meet its stakeholder ne...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021




SYS-CON Featured Whitepapers
ADS BY GOOGLE