PIKERED

A new Cybersecurity player: The integration of skills in the fields of Cybersecurity, Artificial Intelligence and Software development has proved to be the perfect solution to explore new paths, starting R&D activities aimed at the creation of advanced and innovative solutions and services.
Our staff is composed of experienced professionals in various IT fields, such as System Integration, Software development and Ethical Hacking. By employing Artificial Intelligence and Machine Learning we undertook an internal R&D path, seeking the development of highly innovative solutions and services. We have a strong problem-solving attitude to increase the effectiveness of solutions and operational processes.

Year of establishment:

2020

Number of employees:

UP TO 2 EMPLOYEES

Annual turnover:

Under 250.000 Euro

Reference year of turnover:

2020

Export turnover:

0

Activities:

Computer programming, consultancy and related activities

Computer programming activities

Computer consultancy and computer facilities management activities

Other information technology and computer service activities nec


ZAIUX Evo - Breach & Attack Simulation: Our project ZAIUX® evolves in ZAIUX® Evo: a Full Cloud solution, designed for MSSPs, that automates Command and Control (C2) attack activities, generating false positive-free reports featuring Remediation Plans.

PIKERED: The offensive method that revolutionizes Cybersecurity

Company:

PIKERED SRL

Address:

VIA BORGONUOVO 9

City:

MILANO (MI)

Zip Code:

20121

Social media:

No business proposals uploaded

ZAIUX® Evo provides to IT infrastructures a sophisticated service of Breach and Attack Simulation (BAS) which, employing Artificial Intelligence to allocate resources through mathematical optimization, executes automatized ethical hacking processes, concretely testing security holes in the target network.
Unlike an Internal Penetration Test, which limits itself to executing techniques within the network, our BAS emulates a real intrusion. That means that the whole defense chain is validated against a targeted attack coming from the outside, which brings out all vulnerabilities both in Privilege Escalation prevention within the domain and in data exfiltration protection.
How does our software for BAS work?
ZAIUX® Evo makes it possible, for the first time, to perform a complete and realistic simulation of an intrusion in a MS Active Directory environment with an intelligent solution, exploiting a regularly updated range of the most modern and advanced hacking techniques, run in stealth mode to emulate a human approach. Automation is managed by the DPZR™ engine that includes Machine Learning algorithms specially developed by our team of experts to emulate human intelligence, breaking down the time barrier of manual execution.

Through Artificial Intelligence the adaptive algorithms, which we developed, shape the system’s response according to the attack surfaces emerging from the scans, all in a fully automated way.

ZAIUX® Evo is an intelligent Full Cloud platform which generates, for each assessment, an isolate sandbox, associated with an initialization package which can be directly executed from any endpoint of the target network, without installing any agent.