Automated Penetration Testing and Threat Detection

Automated Penetration Testing
Feeling secure because you pen test twice a year? For sure it is, or rather was, a great way to spend your security budget until the emergence of Continuous Automated Penetration Testing solutions.

Why settle for human based testing once or twice a year or testing of specific locations on a round robin basis when it is now possible to use the latest technology to pen test the whole environment as often as you wish.

Remediated your environment based on the report provided by your pen testers, then you really should retest to check the desired results have been achieved. But that costs money and can you afford it. That is no longer a decision you must make.

69% of attacks that resulted in a data breach came from either organised crime or state affiliated groups.

Only 5% of known vulnerabilities where exploited in 2017!


We have the ONLY automated penetration testing tool available today

  •   It is not a vulnerability management tool.
  •   It is not a ‘simulator’
  •   It does not rely on human pen testers

In simple terms treat the tool like an army of 100 human pen testers, give it an IP address range, and unleash it.

In the first instance the network is scanned and vulnerabilities are mapped. Then based on this information automated and/or customisable analysis is performed to identify the areas most at risk, essentially behaving exactly like a human pen tester. Then in the same way a human pen tester will try to run exploits and attacks to seek further control and gain access to more critical information; our automated solutions will do exactly the same.
  • Choose Black box, Grey Box, White Box or Goal Orientated attack scenarios
  • Our solutions simulate millions of attacks and never stop.
  • Our solutions reduce the time your security specialists spend assessing the severity of the risk by prioritising the key remediations 

Free Proof of Value is available. It can be deployed in minutes and run for just 2 days. In most cases actionable intelligence is achieved in less than 20 mins.

Continuous Attacker Detection and Threat Hunting
Another of our automated solutions using AI and machine learning to make sure cyber attackers can attack but they can’t hide.
You think you’ve got the perimeter all sown up and locked down. Sadly the bad guys just do not sleep and they only need to get lucky once.

The fastest growing cyber threat today is attacks that start inside your network, whether that be carelessness, negligence or genuine malicious insiders. No amount of perimeter security can stop malicious behaviour from within.

The important metric is to identify and neutralise the threat as fast as possible. Our solutions analyse network traffic and logs and using AI and machine learning to identify abnormal behaviour then report those that are the most likely to cause harm to the network.

Download our Attacker Behaviour report, and/or request more information and a demo

Free proof of value is available.


IT consulting, services and supply. 35 years experience in IT including running IT department, procurement, marketing and technical sales. Our core philosophy is one of honesty and integrity. We only have engineers, no wide boys and everyone is focussed on doing the right thing for the customer.


  Amalfi Technology Consulting Ltd
25 Watchetts Drive, Camberley. GU15 2PQ

  0333 577 8600


© 2019 Amalfi Technology Consulting Ltd | Company Registration No: 09104609