home_banner `

Content Icon

BAS Tools: 2019 Market Overview

December 2, 2019 | Ask-An-Expert Writeups | Penetration Testing and Red Teaming | By Dave Shackleford, IANS Faculty

Breach and attack simulation (BAS) tools are designed to help security teams assess the effectiveness of their programs for identifying and responding to attacks. In this report, IANS Faculty Dave Shackleford provides an overview of the space, including the pros and cons of some of the top vendors.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Avoid Common Bug Bounty Pitfalls

A poorly planned bug bounty can go sideways quickly. In this Ask-an-Expert written response, IANS Faculty Adrian Sanabria details some common pitfalls as well as some ways to avoid them.

Transition From Kill Chain to ATT&CK

Many organizations are migrating their programs from a focus on Lockheed Martin's Kill Chain to MITRE's ATT&CK framework. In this Ask-an-Expert written response, IANS Faculty Michael Pinch explains how the two approaches differ and offers tips for making the transition.

Get Started With Pen-Testing Golden Images

Few organizations regularly pen-test the golden images they use to build workstations and laptops, but they should. In this Ask-an-Expert written response, IANS Faculty Jake Williams explains the practice and offers tips for getting started.