Sign in
Your Saved List Partners Sell in AWS Marketplace Amazon Web Services Home Help


By: R9B Latest Version: ORKOS

This version has been removed and is no longer available to new customers.

Product Overview

Threat actors thrive on weak and mis-configured credentials. While organizations are aware of the issue, enforcing appropriate password policies, credential usage and segmentation is a never-ending battle. Finding the time and resources to properly train average users and IT departments, multiplied by the challenges of cloud, shadow IT, mergers and acquisitions, and disregarded policies set the stage for embarrassing breaches.

ORKOS works by addressing two significant vulnerabilities.

First, the tool quantifies the risk associated with individual credentials. Identifying weak credentials vulnerable to password guessing, cracking, reuse or that may have already been stolen, exposes the root cause of the vast majority of breaches.

Second, ORKOS predicts how threat actors will move laterally through a system based on the actual configuration. Few organizations can keep up with rapidly evolving networks. Rarely does the actual network architecture map to the planned configuration. ORKOS allows leaders to see the actual risk.

ORKOS is the one-stop solution for quickly and confidentially determining where weak credentials exist on the network, and how front-line systems might be accidentally exposing your organization to the possibility of a major breach.





Operating System

Linux/Unix, Ubuntu 16.04

Delivery Methods

  • Amazon Machine Image

Pricing Information

Usage Information

Support Information

Customer Reviews