Legitimate use of Cytomate
Cytomate is a powerful tool, a dishonest customer could use it to harm its competitors. Cytomate has taken different precautions in different modules to avoid illegitimate use. Cytomate provides each agent with a set of credentials to login to the cloud web interface. Cytomate endpoint module is equipped with different types of malwares, ransomware and worms and trojans to test endpoint security controls. To avoid scenarios where a customer uses Cytomate endpoint to test the endpoint which he does not own, Cytomate requires a lightweight agent to be set up on the endpoint. Cytomate uses this agent to test corporate endpoint security controls and communicate with the endpoint server.