The capabilities and know-how of the world’s best CISOs at your fingertips

Smart Posture Assessment

We believe in a methodical, holistic approach to cybersecurity. Finding existing vulnerabilities, in our view, just isn’t enough – we want to also prevent future ones. To do this we gather as much data as we can and use proprietary AI algorithms for a structured assessment, one deeply rooted in the NIST Cybersecurity Framework.

Unlike many security assessments, we won’t provide you with just a list of vulnerabilities which require your attention. Rather, we will assess how well your company can cope with each of the five pillars of NIST: identification, protection, detection, response, and recovery and translate these into security scores for specific threats, such as ransomware or website defacement.

Tailor-made policies

To bring order and structure into a company’s security practices, we create, on the fly, tailor-made security policies. Our policies are not just a set of static principles. They are tailored-made based on the internal and external intelligence we collected to ensure an optimal protection level.

Prioritized Remediation

Improving a company’s security posture is a continuous process. We want to ensure that no matter what part of the process you’re on, your efforts and investment always yield the best ROI. Towards this we use proprietary AI algorithms, modelled after the world’s best CISOs to  prioritize remediation tasks.

Rich Data Collection and Evidence Based Actions

While we’ve created state-of-the-art algorithms to power our assessment, policy and remediation modules, for high quality output, high-quality input is a must. For this reason, we have also invested in building a rich, comprehensive scanning infrastructure.

Super-Fast scan for quick gap analysis and introductory to new potential customers

An express-scan which uncovers critical vulnerabilities in externally visible IPs and URLs, ranging from email misconfigurations to unsafe use of encryption protocols.

Deep External scanning emulating an external attacker’s view

State-of-the-art external vulnerability assessment includes deep analysis of vulnerabilities and exploits for externally exposed assets. This includes:

N

External port vulnerability scan

N

Communication protocols analysis

N

Proper use of encryption protocols

N

Website communication security

N

Web application security

N

Email and DNS configuration check

N

Certificates and DNS configuration

Office 365 scan

We use Microsoft’s Graph API to retrieve your Microsoft 365 configuration and perform a security assessment including your Microsoft secure score for Outlook, Teams and more.

Internal scan

Our proprietary internal scanner is designed to get an understanding of a company’s policies, vulnerabilities, and misconfigurations. Our read-only scripts-based agent runs on-premise and retrieves:

N

Active Directory configuration

N

Active Directory Policy gaps

N

Endpoint configuration and security gaps

 

Our clients

Partner with us

Add AI-powered security management to your portfolio of services.

With Cynomi, you can give your customers the help and support they need. You can broaden and deepen your relationships with them and build a security practice for your firm. And because Cynomi is powered by AI it automates all regular security management tasks – allowing you to concentrate on supporting your customers.

Philip Walker

Seriously impressed and very happy I’ve partnered with Cynomi. This is exactly the platform that we’ve been waiting for at NSP!

 

Phillip Walker
CEO, Network Solutions Provider USA, Inc.

Philip Walker

Seriously impressed and very happy I’ve partnered with Cynomi. This is exactly the platform that we’ve been waiting for at NSP!

 

Phillip Walker
CEO, Network Solutions Provider USA, Inc.

Philip Walker

Seriously impressed and very happy I’ve partnered with Cynomi. This is exactly the platform that we’ve been waiting for at NSP!

 

Phillip Walker
CEO, Network Solutions Provider USA, Inc.