Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

3/4/2019
09:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

HyperQube Virtualized Network Promises 90% Savings on Cyber Efforts

New approach aims to disrupt enterprise network security, development & scaling for both small and large organizations.

Washington, D.C., March 4, 2019 – Over the weekend HyperQube announced the launch of its service offerings at the Northern Virginia Security Conference BSides NOVA.

HyperQube offers enterprises, small businesses and academic institutions the ability to quickly and easily build an exact copy of any IT infrastructure. These virtualized test environments can be built in minutes and easily modified, re-used and shared. By providing a “cyber range as a service,” HyperQube enables technologists the ability to look to the future and explore infrastructures in a risk-free environment.

“HyperQube recognized the growing need for a scalable and reusable virtualized environment to test network boundaries,” said HyperQube founder and CEO Craig Stevenson. “It’s exciting to see our partners explore the limits of all that our software can provide from superior security hygiene to speedy network-wide update deployment.”

With more than a decade of corporate cybersecurity research, development and curriculum building experience, Stevenson was intimately familiar with the shortcomings of virtual machine software and the headache of making even simple changes to a virtual environment. HyperQube technology vastly improves upon traditional solutions in key areas:

·       Reduces labor associated with managing virtual machine software by 90%;

·       Eliminates the need for expensive hardware;

·       Builds test environments in minutes, not weeks;

·       Bridges any environment to the physical infrastructure to integrate devices which can’t be virtualized

HyperQube partners with Cisco for testing and deployment needs across the enterprise and Forrester to provide virtual infrastructures for the company’s build out of Zero Trust deployment demonstrations. HyperQube also hosted an international Capture The Flag (CTF) hackathon competition with participants including Massachusetts Institute of Technology, Oxford University, and Harvard University.

The company, a graduate of the Mach37 cybersecurity accelerator, joins a budding trend of DC area home-grown, high potential startups. Learn more at www.hyperqube.io.

About HyperQube
HyperQube technology enables enterprises to quickly and easily build an exact copy of any IT infrastructure. HyperQube virtualized test environments can be built in minutes and just as easily modified, re-used and shared. Learn more at www.hyperqube.io

###

Contact Information:
Kelly Miller
[email protected]
(202) 750-7513

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
A Realistic Threat Model for the Masses
Lysa Myers, Security Researcher, ESET,  10/9/2019
USB Drive Security Still Lags
Dark Reading Staff 10/9/2019
Virginia a Hot Spot For Cybersecurity Jobs
Jai Vijayan, Contributing Writer,  10/9/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17612
PUBLISHED: 2019-10-15
An issue was discovered in 74CMS v5.2.8. There is a SQL Injection generated by the _list method in the Common/Controller/BackendController.class.php file via the index.php?m=Admin&c=Ad&a=category sort parameter.
CVE-2019-17613
PUBLISHED: 2019-10-15
qibosoft 7 allows remote code execution because do/jf.php makes eval calls. The attacker can use the Point Introduction Management feature to supply PHP code to be evaluated. Alternatively, the attacker can access admin/index.php?lfj=jfadmin&action=addjf via CSRF, as demonstrated by a payload in...
CVE-2019-17395
PUBLISHED: 2019-10-15
In the Rapid Gator application 0.7.1 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.
CVE-2019-17602
PUBLISHED: 2019-10-15
An issue was discovered in Zoho ManageEngine OpManager before 12.4 build 124089. The OPMDeviceDetailsServlet servlet is prone to SQL injection. Depending on the configuration, this vulnerability could be exploited unauthenticated or authenticated.
CVE-2019-17394
PUBLISHED: 2019-10-15
In the Seesaw Parent and Family application 6.2.5 for Android, the username and password are stored in the log during authentication, and may be available to attackers via logcat.