Cyber Assessment Tool:

Determine your network risk

IronNet’s Cyber Assessment Tool (CAT) demonstrates what possible malicious activity may look like in your enterprise, so your team can know exactly where you stand and how to make necessary improvements.

Know where you stand

Whether or not you can see it, your network is likely under attack from automated malicious software, people trying to steal your confidential data, and people looking for a foothold to stage further attacks against other companies or individuals. These network attackers use a variety of methods to hide their malicious behavior from most security tools. The Cyber Assessment Tool allows you to test your detection capabilities against some of the most prominent recent threats. You can see the results of the simulations in real time and download a report including attack indicators. By searching for the given indicators in your security systems, you can determine which of the emulated attacks could pose a threat to your network in a real-world scenario.
IronNet-Cyber Assessment Tool-Desktop Dashboard Screen-Desktop View
IronNet-Cyber Assessment Tool-How it works-Pen and notepad icon

How it works

These tests are benign and do not pose any risk to your enterprise. The Cyber Assessment Tool loads in your browser just like a normal page, and performs a series of simulations using normal web requests that are designed to closely emulate malicious actions. The simulations cover an array of common attacks used to steal confidential information, deliver malware to unwitting users, and maintain control of compromised systems.
As the simulations are performed, our system verifies the behavior was successful, and presents the results in real time. We provide a report so that you can determine if any of the behavior was detected by your security systems. For each simulation, the report includes a detailed description, along with indicators of compromise, which can be used to take a fine-grained look into how your security tools reacted.

Using your results

As each simulation completes, an assessment of high or low risk is displayed. A high-risk result means the behavior was completed, indicating that an attacker would have been successful. A low-risk result means the behavior was not completed, but an attacker might be able to modify these methods in order to have the desired effect.

After running the test, a report  that may be used to assess your network’s current security posture is generated. The report will include a description of each test along with per-test indicators of compromise, which can be used to take a fine-grained look into how your own tools reacted to the network traffic generated by the tests.

  • See in real time as simulated attacks transit your network
  • Download the report to see detailed information about each test
  • Hunt for each simulated activity with your security tools
  • Contact us for an in-depth assessment of your security posture

Get started

Threats don’t wait and you shouldn’t either. With our browser-based Cyber Assessment Tool, you can determine your network risk today — right now. Ready to get started?