Use case: Simulate attacks on network assets

You can use a simulation to test your network for vulnerabilities from various sources.

You can use attack simulations to audit device configurations in your network.

Simulations provide the following key features:
  • Simulations display the theoretical path permutations an attack can take against your network.
  • Simulations display how attacks can propagate through your network devices to spread to other assets.
  • Simulations allow monitoring to detect new exposure sites.