Adversary Cyber Emulation With RidgeBot®

Measure Security Control’s Effectiveness

Request a Demo
Experience a live demo and learn more about RidgeBot®.

Overview of RidgeBot® ACE: Precision Adversary Emulation for Cyber Defense

Emulate the adversary’s techniques

IT security controls are mechanisms used to prevent, detect and mitigate cyber threats and attacks. RidgeBot® ACE delivers advanced adversary emulation by mimicking the likely attack paths and techniques, generating continuous assessment data to help identify security control failures, resolve structural weaknesses and enable security control optimization. Aligned with the MITRE ATT&CK framework, RidgeBot® ACE maps its assessment test scripts to MITRE ATT&CK tactics and techniques, ensuring precise automated adversary emulation. This approach enhances visibility into potential attack vectors and improves communication of security control measurements.

ACE Attack Simulation Scenarios

Endpoint Security

RidgeBot® Botlet performs adversary emulation to simulate malicious software or download malware signatures, validating target endpoint security controls.

Data Exfiltration

RidgeBot® Botlet simulates the unauthorized data movement from your server such as personal data, financial, confidential, software source code and more to test adversary emulation effectiveness.

Active Directory Information Recon

RidgeBot® Botlet simulates an attacker to gather useful resources in Windows Active Directory for elevated privilege, persist, and plundering information.

Measuring Security Control’s Effectiveness with RidgeBot® ACE

Assessment Means: Botlet

Botlet is a software agent that enables adversary emulation, simulating real-world cyber-attacks without harm to your IT environment.

Assessment Test Script

A group of scripted behaviors carried out by Botlet to simulate a specific cyber-attack or to validate the security controls.

Key Measurement: Block Rate

The ratio of blocked scripts vs all assessment scripts executed during a RidgeBot® ACE testing.

Download a Sample RidgeBot® ACE Test Report

Measuring Data Exfiltration Effectiveness with RidgeBot ACE

RidgeBot® ACE provides descriptions and mitigation suggestions for un-blocked assessment tests, enhancing automated adversary emulation.

Validate Security Control Effectiveness

  • Overall Block Rate Trend
  • Block Rate per Target
  • Result Overview per Threat Group
  • Result Overview per MITRE ATT&CK Tactic
  • Result Overview per MITRE ATT&CK Technique

ACE Risk Assessment result with higher block rate indicates better security controls in your IT environment via adversary emulation.

Four ways to learn about RidgeBot®

Helpful Resources

View a sample RidgeBot business risk-based security report.