RidgeBot 4.2.1 Datasheet Final-3
RidgeBot 4.2.1 Datasheet Final-3
RidgeBot 4.2.1 Datasheet Final-3
Enterprise Security
Validation
HyperAutomation
RidgeBot ®
Intelligent Security Validation Robots to deliver
Automated Penetration Testing and Adversary Cyber Emulation
Automated
Dynamic
Scaling
Engineered
for Enterprise
Environments
Prioritized
Remediation
Alerts
Harmless
Exploits Visibility
of Attack
Vectors
Challenges
Today’s organizations are facing cyber security challenges attack methods every month, often using tools to launch
from multiple angles. Security teams not only need to attacks automatically. In response to cyber security
validate IT infrastructure has no exploitable vulnerabilities threats, most organizations utilize security testing (a.k.a.
which may be leveraged by a hacker or a ransomware to penetration testing) for their computer systems, websites,
compromise the mission critical data, but also need to applications and networks, try to find risk exposures
verify the expensivee cyber defense solutions deployed before a hacker does. While security teams’ internal pen
can work as expected to detect and mitigate the most testing expertise are limited and expensive, can’t afford to
current attack techniques used by advanced persistent do continuous security validation. Many organizations are
threats (APTs) and other malicious entities. looking for an automated penetration testing system to
Cyberattacks are increasingly sophisticated and forever address this challenge in a more manageable and
on the rise, hackers are developing new exploits and cost-effective manner.
2
• Vulnerability Management
Assets Management
RidgeBot® assets management provides a centralized repository to manage enterprise IT assets for security valida-
tion, including assets’ IP addresses, hostnames, OS versions, service open ports, active applications with app
versions, as well as website domain names, DNS resolution and web server versions.
Response Knowledge
Output
Data
Request Feedback
Threat Attack Event Vulnerability 3rd Party POC Exploit Fingerprint Privilege Escalation Ransomware Attack DNS Global URL
Intelligence 2B 100M 108K Vulnerability 12K 6000 Rule 3500 Vulnerability 1000 Techniques Database Database
RidgeBot ® Deployments
On-Premise Deployment Cloud Deployment
For enterprise environment—deploy RidgeBot® on the For Cloud and SMB customers—deploy RidgeBot® in the
customer’s premise, provides the lower Risk of Infosec Cloud (AWS EC2, Microsoft Azure and Google Cloud), have
Data Leakage better flexibility while minimize the initial CapEx investment
High-Value Assets
Web/App
Server
Use the Compromised
Machine as a Pivot DB
DB
DB DB Server
Windows
RidgeBot Botlet Server
Bigdata
Reference Platforms Dell PowerEdge R340 Rack Server Dell PowerEdge R540 Rack Server
• I • Dual
Concurrent Bots 16 32
Supported Hypervisors and Cloud Platforms • VMware Workstation 15 Pro or higher • QEMU KVM 7.2
• VMware Fusion 11 Pro or higher • Amazon AWS EC2
• VMware ESXi 6.5 or higher • Microsoft Azure
• Microsoft Windows/Hyper-V 2019 or higher • Google Cloud Platform
Automation Assistance
• Object recognition: Through this function can continue to run without any manual task, provides an automatic response to
module, RidgeBot® automatically identify intervention and achieve the automated interactive scenarios during the attack, so
information such as asset types, data process of security validation tasks. that the automated process of security
content types, record classification validation can be done.
• Sandbox simulation: Using the sandbox
Identifiers and then feed them to relevant • Embedded Fuzzing Engine: Generating
technology, RidgeBot® simulates a variety
modules, so that the entire attack process dynamic payloads for vulnerability detection
of operating environments in the validation
and exploitation
• Turing confrontation: By using Turing • Decision brain: RidgeBot® is built in with decision or a more effective path to
confrontation technology, RidgeBot® can many types of artificial intelligence penetrate the target system.
recognize character validation code and decision-making algorithms to provide • Vector engine: The vector engine creates
simulate manual operations through a smart optimal decisions such as selection and attack vectors and non-linear stitching
sandbox to bypass the manual operation ranking when executions are going down to which enable RidgeBot® to produce more
inspection required by the system, so that branch attack paths. efficient attack with high successful rate
the system can perform an automatic • Expert system: RidgeBot’s is embed-ded toward the targeted system.
execution of security inspection which with an expert system. During the execution
improves the efficiency of security of the security validation, it can always
testing. reference “expert experience” for a better
Risk Analysis
• Topology portrait: Automatically gener- • Proactive situational awareness: • Real time attack action visibility:
ate a topology map from the information Proactively poke the targeted system from Provide real time visibility to every single
collected during the attack, label the risks multiple perspectives to form a multidi- step of the attack, from discovery,
identified in each part of the topology, mensional analysis view and the real-time scanning to exploit attempts for security
and assist administrators in risk analysis graphic models; provide administrators a team to further analyze.
and evaluation. global view of the security landscape.
Vulnerability Mining
• Weakness discovering: Identify possible • Vulnerability scanning: Access and test results are checked to determine whether
weak links on the attack surface and the target system by using packet there are vulnerabilities that can be
check for vulnerabilities based on the generated by an automatic tool and the exploited.
intelligent decision system such as the payload provided by the attack compo-
expert models and RidgeBot brains. nent, vector engine etc., and the returned
Vulnerability Exploitation
Vulnerability Validation
• Risk validation: Validate whether the screenshots, shell terminal, file manager, • Risk Assessment: Provide real-time risk
vulnerability is exploitable in user’s real database name or database table name etc. assessment for IT assets being tested,
environment by using proof-of-concept • Kill-Chain Visualization: Visualize the full including health score rating and vulnerability
payload generated by RidgeBot knowledge attack path with attack sequence informa- details & risk analysis
base and auto-exploitation engine. Proof of a tion, including target machine information, • Patch validation test: Retest after patch is
successful exploitation is provided for attack surface exposure, vulnerability installed to verify whether the vulnerability
validated risks, includes privilege obtained, discovered and vulnerability exploited. has been fixed.
• RidgeBot Botlet supports both 32-bit and • Assessment test scripts are mapped to and Techniques
64-bit Windows and Linux platforms Threat Groups and MITRE ATT&CK
Task Management
• Task scheduling: Support 1) Run Now, 2) ly task cycle • Stealth control: 4-tier penetration
Run Once, 3) Weekly (Daily) 4) Monthly task • Support scheduled pause for penetration testing flow control to control the traffic
scheduling testing tasks to minimize business volume being sent to the target
disruption during a penetration testing machines and minimize the impact to
• Support multiple runs within a weekly/month-
test targets
Asset Management
• A centralized repository to manage security application versions, as well as domain • Configure integration connectors
validation testing’s host and web targets, names and DNS resolutions
active applications/services, OS and • Botlet installation and status
• Professional Report: Provide professional • OWASP Top-10 Compliance Reports. • System Integration: Support RESTful
security validation test reports with detailed Support 2017 and 2021 versions of API and CEF-compliant syslog
asset information, vulnerability and risk data, OWASP Top-10 definition. Dedicated messages, easy to integrate with
assessment test results, mitigation OWASP Top-10 report templates for web 3rd-party security management
suggestions, and historical trend penetration testing tasks platform.
• Multi-language Reports: Support English, • MSSP Co-branding Reports: Support • Support Token-based authentication
Spanish, Italian and Korean reports. The report customization, and allow a MSSP for API communication
customer can select a preferred language (Managed Security Service Provider) user • DevSecOps Integration: Support Jira
before generating the reports to add its company logo on testing reports Software and GitLab for issue tracking
System Administration
• Support online and offline software updates • Support local management console for or virtual private cloud (VPC) access
• Support user role-base access control for system administration and service recovery • Support two-factor authentication (2FA)
security validation tasks and reports • Support OpenVPN for enterprise Intranet for web user login
@RidgeSecurityAI
Ridge Security Technology Inc.
www.ridgesecurity.ai www.linkedin.com/company/ridge-security
© 2023 All Rights Reserved Ridge Security Technology Inc. Ridge Security, the Ridge Security logo,
and RidgeBot are trademarks of Ridge Security Technology Inc.