Identifying and resolving security issues is what the Red Team Edition is all about. For in house security teams, as vulnerabilities are mitigated you will see the attack profile decrease as your infrastructure becomes more secure over time. For consulting firms, you can show your customers the value that is provided by your team. For both, you can track how long a specific issue has gone unfixed and track the progress of individual systems, services, or applications.
Share your Red Team Edition data with subcontractors that you collaborate with on an assessment/penetration test or incident response engagement on a project by project basis. You can restrict who can see what and revoke access at any time. You can make private comments with just your team members and also be able utilize the collective wisdom of the community.
Generate professionally formated or fully customized reports instantly in a variety of formats including MS Word, Excel, etc. To protect your Intellectual Property, generated reports are always stored encrypted.
Share your data with others, collaborate with a team on assessments and have a centralized artifact and vulnerability status repository, and tap into group and community knowledge. Managers can keep track of a team's progress remotely.
Say you are testing an organization (be it your own or your customer's) that has multiple groups who have different areas of responsibility. You can easily create reports tailored to each individual group, so that one group can't see another group's issues.
If you have a file too big to send as an email attachment, or if the file contains sensitive informaition that you do not want to send via email, feel free to use the External File Transfer service. This service enables the secure transfer of files over SSL. Once the file is downloaded, it is deleted. Send and recieve files securely.
You instantly have a version tracking repository for your own custom finding writeups. Your custom writeups are your Intellectual Property. You can restrict access to who can see and edit the writeups if there is a mixed environment made up of your own trusted staff and less trusted third party contractors. Write once, secure many!!
The Red Team Edition of the ThreatConsole can import data from a wide variety of security tools. The vulnerability data can be edited and customized finding descriptions and solutions can automatically be applied to generated reports. A "fast interface" enables team members to mark issues as false positive, or quickly modify an identified issue.