As part of our commitment to bring relevant information to the market, we invited Rodrigo Costa, Keysight’s Latin America Enterprise Sales Expert, to come chat about a few of his companies’ solutions.  

Specifically for this article, we decided to pose questions and hear his recommendations around security prevention solutions. 

Why are investments in a variety of tools such as network access controllers, firewalls, IPS, IDS, etc. not always effective? 

Your question is very interesting. In a recent survey, it was identified that on average, organizations can have up to 75 security tools, which exponentially increases the complexity of a security strategy, and becomes an enormous challenge for SecOps personnel to keep their solutions continuously efficiently tuned.  

What are your views on the issue of strengthening IT/OT Defenses? 

It is definitely a topic that should be part of a company’s strategic decisions. 

Cybercrime is estimated to become a $10 trillion/year problem by 2025. Also, the cost of breaches to businesses is increasing by 10% year over year. 

To face such threats and strengthen their defenses, we believe that companies need to: 

  • Constantly ensure that all the investment already made in security solutions is maximized. 
  • Identify gaps before investing in new solutions. 

Focusing on Prevention, how does a BAS solution help? 

BAS (Breach Attack Simulation) concept was designed to prevent problems through proactive action. That’s why we use the motto “hack yourself before outsiders do!”.  

Keysight delivers a BAS solution called Threat Simulator. It is extremely associated with Keysight’s DNA, a company with a long history as a supplier of testing and measurement equipment.  

The Threat Simulator solution verifies if the users’ NGFW’s, EDR’s, etc. are effectively configured by putting them through simulation with real threats. It doesn’t only point out issues – it recommends adjustments and therefore maximizes the investment the users have already made. 

Tell me the difference between BAS and Pentest. Don’t they accomplish the same thing? 

Both have their value and should be part of a good cyber defense strategy.  

Pentest services are contracted periodically, once or twice a year with the inherent objective of attacking specific targets, be it a specific application or service. It provides recommendations of corrections at the application level, operating systems or infrastructure.  

BAS proposal is to complement this with a system that can assess the efficiency of the security layers daily – non-stop! It continuously validates the efficiency of solutions such as NGFW, IPS/IDS, WAFs, EDRs, Proxy, DLPs, automating this process, quickly adjusting points of failure. 

Using real time automated simulation and resulting recommendations, it assists in reducing the attack surface of productive environments to prevent threats from reaching its final target, which can be a service or application. 

It is a system designed to be implemented in a production environment, without affecting the security, performance, or availability of the environment. 

Finally, we see Threat Simulator addressing the enormous issue of shortage of security professionals. The solution automation and inherent intelligence frees up resources allowing the area professionals to dedicating more time to proactive work.  

Do you need more information? Click here and contact BAMMTECH’s team of specialists right now or write to