Use case: Simulate attacks on network assets
You can use a simulation to test your network for vulnerabilities from various sources.
You can use attack simulations to audit device configurations in your network.
Simulations provide the following key features:
- Simulations display the theoretical path permutations an attack can take against your network.
- Simulations display how attacks can propagate through your network devices to spread to other assets.
- Simulations allow monitoring to detect new exposure sites.