Need cloud computing? Get started now

Infection Monkey graphic blue background

How Resilient Is Your Network to Advanced Threats?

Unleash the Infection Monkey in your network and discover security flaws in no time.

Key benefits

See the network from the attacker’s point of view

Get a visual map of your network as seen from the attacker'’s eyes with a breakdown of the machines the Monkey managed to breach.

Automated breach and attack simulation analysis

Simply infect a random machine with the Infection Monkey and automatically discover your security risks. Test for different scenarios — credential theft, compromised machines, and other security flaws.

Get actionable recommendations — per machine

The Infection Monkey assessment produces a detailed report with remediation tips specific to each machine breached in your network.

Infection Monkey Attack Simulation feature graphic

Features

• Overview of immediate security threats and potential issues

• A map of your network with a breakdown of breached machines

• Open services uncovered to reduce attack surface

• Per-machine mitigation, e.g., segmentation, password configuration

Supported platforms

aws
Docker
Azure
Windows Server
Penguin

Use cases

Deploy the Infection Monkey

To match the pace of change in dynamic environments, you need a readily available tool that automates your security testing. By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.

Application updates

Run the Infection Monkey after every update to an application in your environment. This allows you to ensure you did not leave any windows open for attackers and to validate security controls.

Continuous security validation

Using the Infection Monkey continuously, and between normally scheduled pen tests, helps ensure your security controls are in place, configured properly, and able to detect and block a real-world attack.

Learn more about the Infection Monkey

Infection Monkey report graphic
Ransomware

Validate your defenses

Evaluate if your tools accurately detect ransomware and see just how far it can spread.

Infection Monkey - A new approach graphic

A new approach to security assessments

The Infection Monkey operates in much the same way a real attacker would — starting from a random location in the network and propagating from there, while looking for all possible paths of exploitation.

Download the Infection Monkey

To download the Infection Monkey, please submit the form at right. We will provide you with the files and an installation guide.