Tech & Society

Trickest Launches Community Edition of Security Workflow Orchestration Platform

To address a pressing challenge in cybersecurity, a pioneering solution has emerged with the launch of the SaaS Security Workflow Orchestration Community Edition (CE) of a leading enterprise security automation platform. Trickest’s launch aims to break down barriers and democratize access to advanced cybersecurity tools. In doing so, it brings next-generation security orchestration capabilities within reach of a broader audience, spanning academia, security researchers, educators and bug bounty hunters.

The platform also assists in gathering and analyzing information about potential cyber threats, automating Open Source Intelligence (OSINT) gathering, supporting automated purple and red team operations, and facilitating continuous scanning for vulnerabilities (like outdated software, weak credentials, and misconfigurations). 

On Trickest, security professionals can build, manage, orchestrate, and run various customized workflows and integrations for Vulnerability Scanning, Attack Surface Monitoring, Secret/Content Discovery, Threat Hunting, and Automated Penetration Testing.

At the same time, Trickest is delighted to welcome Ben Sadeghipour, aka NahamSec, as an advisor. “Joining the Trickest team as an advisor offers me a unique opportunity to contribute to cutting-edge security solutions while expanding my own expertise in offensive security,” said Ben Sadeghipour.

Nenad Zaric, the CEO of Trickest, expressed his enthusiasm: “We are thrilled to have Ben on board. Coupled with today’s launch of our Community Edition, this collaboration is a significant step towards enhancing our platform’s capabilities and embodies our commitment to empowering the cybersecurity community with powerful tools for automation and orchestration. With Ben’s involvement, we are well-positioned to deliver even more innovative security solutions to our customers and partners.”

Trickest Offensive Security Orchestration platform offers the following key capabilities:

Integrations with more than 300 Top-tier Community Open-Sourced Security Tools to develop a diverse set of methodologies and workflows. 

A library of more than 80 Offensive Security Workflow Templates that users can quickly deploy to perform various security scans. Users can copy and edit these templates to tailor them to specific requirements or unique use cases.

Low-Code Visual Framework for building custom workflows, with drag-and-drop and user-friendly editing of the tools and scripts. 

Scripting integrations in Bash and Python, as well as command-line interface (CLI) capabilities, for advanced customization and automation

Hyper-scalable managed infrastructure, designed to handle large-scale operations, covering millions of targets, mapping organizations’ entire attack surface 

Community edition users can connect their own self-hosted machines, allowing workflow execution on private infrastructure.

Team TechPanda

Recent Posts

From big screen to stream: How animation studios are adapting to OTT-first releases

When I first entered the world of animation, the dream was always to see our…

22 hours ago

Outbound & inbound: Indian tie ups with US & Belgium, Taiwan, Israel & Japan businesses expand in India

The Tech Panda takes a look at how Indian companies are partnering with business hubs…

2 days ago

Quantum leap or quantum sleep? Why the future of superfast computing is still loading…

Is quantum computing truly just five years away from real-world applications or will we be…

7 days ago

How India’s own cloud can empower MSMEs, EdTech & Health Tech with safer data ecosystems

How India’s own cloud can empower MSMEs, EdTech & Health Tech with safer data ecosystems…

1 week ago

New tech on the block: Blockchain, cybersecurity, ecommerce, cryptocurrency, data management, no code, cloud & workplace tools

The Tech Panda takes a look at recent tech launches. Blockchain: A platform is designed…

1 week ago

Your AI is now mine: A subtle but alarming new contest between cyber attackers & defenders

AI might be assisting today’s cyber defenders to accelerate and improve threat detection, but the…

1 week ago