Key differences

What makes us different?

Qasaba is not a typical DIY tool that requires even more attention from your team. We provide results.

Unlimited assets

We put no limit on the number of the discovered and analyzed assets. All the data related to your organization is stored and can be browsed to see how your infrastructure has been changing over time.

On-demand scanning

We provide you with full control over the executed tasks, scheduling and depth of scans. You can group assets into several workspaces and choose which of them, and when, will be analyzed.

Realistic approach

Qasaba originates from the need for software capable of mapping and analyzing large infrastructures in short time during the attack simulations and Red Teaming operations.

Proprietary technology

Our software is being developed in-house and is based on real-life experience gathered over the years of research. Qasaba is not based on open-source projects.

Outsourcing

We provide support and the peace of mind

If you are willing to give us the chance of taking care of your public infrastructure safety, we are ready to do that.

Onboarding

First, we need to understand your organization:
We meet to understand your expectations and threat model.
Next we perform a reconnaissance the way a real threat actor would do.
The data is then fed into our platform and we start the first automated analysis.
As the result, you receive an initial report that already provides a real value.
We are now ready to make you an offer based on the understanding of your infrastructure.

Process

We can start! Here is briefly how the process looks like:
During the discovery phase we use a number of techniques to identify assets.
The assets are then analyzed for potential problems.
A comprehensive report that highlights identified issues is delivered to you.
At the end of each cycle we meet to discuss the findings and possible solutions.