Anticipate your attackers

EXPLOIT CHANCE

Warns & Acts Before EDRs
Legit Users threat detection
Secure-by-Design

 

PRICING: 1 € per user per month!

Minimum license (Dedicated Server) is 500 users

If you have less than 500 users please ask for a quote

FREE TRIALS and contact: admin@pentest.es

Pluggable AI

Endpoint and cloud computing taking profit of best in class Artificial Intelligence capabilities to boost detection rate

Trust by Risk

User & Endpoint Risk automatically modifies ZTNA in Real Time and defines access controls dynamically

Secure-by-Design RC

No Excuses: Passwordless, Formal Security (seL4), Rust, OCaml, Military Grade auth

Improve the global risk aware posture

MONITOR AND STOP RISKY BEHAVIOR

ExploitChance allows you to be aware of what is going on with your users (browsing, downloads, shares, ...)

It also allows you warn or stop users when they expose the company with risky behavior.

EC integrates with any cloud FWaaS or any EDR as it can detect risky user actions and reconfigure Zero Trust and other security software.

Protect Privacy

TOTAL PRIVACY COMPLIANCE

The ExploitChance solution will never compromise user's or corporate privacy. By design. Is not we tell you we will not misuse your data it is simply that our architecture makes this impossible.

The back end environment DO NOT receives any sensible or private information, just generic telemetry data.

All the work dealing with sensible information (if any) is handled exclusively at the end point (agent), all the personal data processing is done locally at the users device.






















EXAMPLE OF HARDENING TELEMETRY

DEFENDER (SWIPE TO SEE MORE...)

APPLICATION GUARD (SWIPE TO SEE MORE...)

DEVICE GUARD (SWIPE TO SEE MORE...)

EXPLOIT GUARD

Beyond privacy standards

Forget about data leaks, no sensible data is stored on the cloud.

Scalable Solution

Just 1 euro per user/month with dedicated servers.

100% mobile ready

Let administrator enjoy the confort and speed of mobile management so both SoC and on site admins can sync for faster crisis reaction


Main screen and Commands

Easy to use mobile interface




Mobile app to fit new work reality

Give your security teams real time control with a mobile app

Reduce the incident response time with an ultra secure, remote control of the monitored devices just in case you need to take actions.

So, the app allow admins not only to receive real time alerts, it also allows admins to take urgent actions directly on the affected devices without having to depend on SoC operators.

In a new work reality with increasing remote workers (this include security administrtors) it make sense to provide some degree of mobile security administration capability.

Still, all critical operations are protected by strict security controls that avoid that any mobile admin device can be used as an entry point to the company.


Agent interaction and Zero Trust

Agent Interaction and Zero Trust

Extensive Information about Weaknesses

Agents will monitor and check OS security, apps and user behavior to build a full list of potential entry points.

                            
[

@OS_INFO: 
                            
<OS_INFO>

...

  Raw TCP connection: YES
  Raw UDP connection: YES
  Protocols tested positive: HTTP, HTTPS, DNS, NTP
  Privileged users on the system: yes
  (...)
  
...

</OS_INFO>

]

            
                 
[

@APPS_INFO: 
                            
<APPS_INFO>

...

  Detected active web browsers: Chrome, Opera
  Detected inactive web browsers: EDGE
  Detected inactive email native apps: Outlook
  Apps connecting to the Internet (sorted by use): Chrome, Opera  
  (...)
  
...

</APPS_INFO>

]


								                                                    

                           
                           
                            
[

@USER_BEHAVIOR: 
                            
<USER_BEHAVIOR>

...

  User not powering off (suspending) the last 12 days.
  User typing an average of 6k strokes per day. 
  Unlocked screen with no activity detected DAYLY. Average time: 43 min.
  Webcam is: locked.
  Microphone is: locked.  
  (...)
  
...

</USER_BEHAVIOR>

]


                            
                            
[

@APPS_USE: 
                            
<APPS>

...

  Detected active web browsers: Chrome, Opera
  Detected inactive web browsers: EDGE
  Detected inactive email native apps: Outlook
  Apps connecting to the Internet (sorted by use): Chrome, Opera  
  (...)
  
...

</APPS_USE>

]

Security

Is it secure?

EXPLOIT CHANCE can work seamless and securely in any environment. It has been designed with a "human errors proofness" in mind. No matter the experience of the system administrator, EXPLOIT CHANCE will take care of security from the very beginning, in every single aspect, not letting room for errors. Security should be easy.

MFA, 4 EYES, ETC

Critical operations are enforced by MILITARY GRADE AUTH mechanisms

FORMAL SECURITY

Critical modules are built on top of seL4® a microkernel formally verifiied

SECURITY by DESIGN

Our design posture is always to assume the worst case scenario

RUST

Our software is built with Rust, a language designed to be memory safe

You can trust us.