Overview

Core Security provides the industry's first comprehensive attack intelligence platform.

The Core Security Attack Intelligence Platform helps you Think Like an Attacker™ by simulating and validating what an adversary would do to reach your most critical business assets.

With Core Security, enterprises and security professionals can focus on the most likely threats to their critical business assets by modeling, simulating and testing what an actual attacker would do. Core Security helps more than 1,000 customers worldwide identify the most vulnerable areas of their IT environments to improve the effectiveness of remediation efforts and ultimately secure the business. Our patented, proven, award-winning enterprise products and solutions are backed by more than 15 years of applied expertise from CoreLabs research and Core Security Consulting Services.

Contracts

SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


Federal Contracts

ITES-SW

Vendor(s): CoN Certified Term: March 2015-March 2020


State & Local Contracts

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

VITA Contract

Term: through March 30, 2017


Events

Archived Events

Resources

CORE Impact Pro is the only solution that empowers you to replicate multi-staged attacks that pivot across systems, devices, and applications, revealing how chains of exploitable vulnerabilities open paths to your organization’s mission-critical systems and data.

Since 1996, Core Security® Consulting Services has enabled clients to stay ahead of data breach threats. We help you view your IT security from an attacker’s viewpoint, leveraging real-world techniques to both identify exposures and assess their implications on the business. Our clients inclu...

In many organizations, there is simply no effective way to consolidate and prioritize vulnerabilities. Most vulnerability management programs are sufficient for identifying potential vulnerabilities, but in doing so actually create a new, bigger problem – too much data.

Core InsightTM helps you Think Like an Attacker – to proactively address security threats based on real attacks a hacker would use, rather than taking a pure vulnerability or event-driven approach. Core Insight shows you exactly how an attacker views your defenses. Attackers determine their op...