Overview of RidgeBot® ACE: Precision Adversary Emulation for Cyber Defense
Emulate the adversary’s techniques
IT security controls are mechanisms used to prevent, detect and mitigate cyber threats and attacks. RidgeBot® ACE delivers advanced adversary emulation by mimicking the likely attack paths and techniques, generating continuous assessment data to help identify security control failures, resolve structural weaknesses and enable security control optimization. Aligned with the MITRE ATT&CK framework, RidgeBot® ACE maps its assessment test scripts to MITRE ATT&CK tactics and techniques, ensuring precise automated adversary emulation. This approach enhances visibility into potential attack vectors and improves communication of security control measurements.
ACE Attack Simulation Scenarios
Endpoint Security
RidgeBot® Botlet performs adversary emulation to simulate malicious software or download malware signatures, validating target endpoint security controls.
Data Exfiltration
RidgeBot® Botlet simulates the unauthorized data movement from your server such as personal data, financial, confidential, software source code and more to test adversary emulation effectiveness.
Active Directory Information Recon
RidgeBot® Botlet simulates an attacker to gather useful resources in Windows Active Directory for elevated privilege, persist, and plundering information.
Measuring Security Control’s Effectiveness with RidgeBot® ACE
Assessment Means: Botlet
Botlet is a software agent that enables adversary emulation, simulating real-world cyber-attacks without harm to your IT environment.
Assessment Test Script
A group of scripted behaviors carried out by Botlet to simulate a specific cyber-attack or to validate the security controls.
Key Measurement: Block Rate
The ratio of blocked scripts vs all assessment scripts executed during a RidgeBot® ACE testing.
Download a Sample RidgeBot® ACE Test Report
Measuring Data Exfiltration Effectiveness with RidgeBot ACE
Validate Security Control Effectiveness
- Overall Block Rate Trend
- Block Rate per Target
- Result Overview per Threat Group
- Result Overview per MITRE ATT&CK Tactic
- Result Overview per MITRE ATT&CK Technique
ACE Risk Assessment result with higher block rate indicates better security controls in your IT environment via adversary emulation.
Four ways to learn about RidgeBot®
Helpful Resources


Please complete the form to download the OWASP report.