Overview
What is Bishop Fox?
Bishop Fox is a technology company headquartered in Tempe, Arizona, offering offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments.
Recent Reviews
Leaving a review helps other professionals like you evaluate Penetration Testing Tools
Be the first one in your network to review Bishop Fox, and make your voice heard!
Get StartedPricing
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
9 people also want pricing
Alternatives Pricing
Product Demos
RickMote Controller - Hijacking TVs via Google Chromecast - 14July2014
YouTube
Product Details
- About
- Tech Details
What is Bishop Fox?
Bishop Fox offers Cosmos (formerly CAST), a security software solution that proactively defends dynamic attack surfaces by combining advanced technology, automation, and expert-driven testing. Cosmos is purpose-built to identify, validate, and enable remediation of dangerous exposures before attackers even know they exist.
Attack Surface Management & Threat Identification
Continuously Discover Dynamic Assets.
Cosmos captures the entire external attack surface, discovering not only known targets but also those that are often out-of-scope for traditional technologies.
Automatically Map the Entire Attack Surface — Even as It Changes.
Cosmos continuously learns about the user's perimeter, drawing upon public information and Bishop Fox's own intelligence-gathering methods to generate an up-to-date map of the user's changing attack surface.
See the Perimeter From an Attacker’s Perspective.
Cosmos attack surface management platform employs a domain-centric approach to asset discovery and attack surface mapping – aligned with how customers, partners, and attackers target and interact with public facing assets.
Stay on Top of Emerging Threats.
We continuously develop new exposure analyzers that identify issues being actively exploited, newly released CVEs, and traditionally less-severe vulnerabilities that are often stepping stones for sophisticated attacks.
Focus on the Five Ways Attackers Break In.
Cosmos uncovers common ways adversaries gain initial access to environments — insecure apps, misconfigurations, missing patches, bad passwords, and sensitive information disclosure.
Automatically Identify Potential Exposures.
Cosmos leverages collected intelligence and an automated exposure reconnaissance engine to identify anomalies, abnormalities, and attack surface changes that could indicate an environment is exposed to potential compromise.
Bishop Fox Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |