top of page

Breach Commander
Unified Incident Management

Document | Lead | Collaborate | Act | Audit | Report

Tabletop Exercises

Cyber Insurance

Compliance 

Step by step role-based process

Our web-based software smoothly takes participants through the best course of action.

​

Just enough AI supports our deterministic, repeatable, measurable workflows.

​

You can add you own steps if you wish.

gv_insurance_obl_edited.jpg
Efficient risk-oriented KPIs

Efficient risk-oriented KPIs

Real-time, detailed metrics and KPIs to drive risk and operational decision making.

 

Each case is assigned a performance score calculated from several meaningful internal metrics.

Live timeline of events and decisions

Always be ready to recount the story with a 360° view of decisions made, impacts documented, SLOs and more.

​

The timeline is optimized to be printed or exported for convenient reporting or sharing.

Live timeline of events and decisions
BC_AI_support.png

Contextual AI support

We've cooked in AI support to provide you just-in-time support related to our deterministic pre-defined playbook items.

​

Our assistant knows what's coming, and acts as a cyber expert to interact with you about business or technical aspects.

Repeatability and auditability at its core

Breach Commander is based on hundreds of deterministic playbook items where the flow can be repeated with precision with the same answers.

 

Consequently the cases and their metrics can be compared to each other for performance and quality. 

BC_flow.png

The value of Breach Commanderâ„¢

Elite Innovation

Unique on the market, our solution is built on 20+ years of operational experience at dealing with all forms of cyber incidents imaginable.

​

Unique literally means it does not exist anywhere else.​​​​

Bridges the needs of multiple industries

Breach Commander does provide a never seen before  streamlined incident management platform for security operations teams.

 

But most of all it is a unified answer to the challenges of several industry verticals:

​

  • Privacy & legal breach coaching

  • Insurance underwriting

  • Auditing & compliance

  • Cyber incident response & forensics providers.

Demonstrated Usefulness

We have developed and refined our solution from real-world incidents and crisis management, including business challenges spanning across the whole enterprise (legal, compliance, insurance, finance, risk management, audit, etc) .

Just the right Amount of AI

Of course we have cooked-in some AI to offer just-in-time assistance on top of our deterministic, repeatable and comparable workflows.

​

And we are doing proper R&D to build our own internal AI models to replace any commercial 3rd party consumption.

Exciting Industry Opportunities

The timing is perfect.

 

Partnering with Breach Commander opens the door to a lucrative positioning in an immature, high-demand and low offer market for proper cyber incident management.

  • Who is the developer of Breach commander?
    Fullblown Security Consulting is the sole developer of the solution and owns 100% of the intellectual property fuelling it.
  • Why was Breach Commander created?
    Breach Commander is born from the universal need to properly manage cyber incidents in a simple, collaborative, streamlined, repeatable and measurable fashion. The creator has cooked into the solution his experience of 20+ years of IT, cybersecurity, digital forensics, governance and incident management experience.
  • Which technologies are used to build Breach Commander?
    Breach Commander is built on the very standard and robust Linux - Apache - MySQL - PHP (LAMP) combination of technologies. The content does not rely on a complex 3rd-party content management system (CMS). We have tried to build everything by hand. First for the pleasure of it; Then we wanted to avoid all the possible external dependencies. The external modules we use are either commercial add-ons provided by their vendors (mapping, AI, font/icons) or very standard programming libraries in PHP.
  • What kind of attention did you give to security aspects in the development?
    There are 2 aspects to discuss here: Secure Coding and Coding Best Practices We have leveraged security best practices to make sure our code is not only reliable, but absent of vulnerabilities or weaknesses that could compromise its integrity or reliability, including: + Building reusable code and object-oriented programming (OOP); + Validation and sanitation of input data types; + Sanitation of SQL queries (especially coming from user-input data); + Utilization of cross-site request forgery tokens to avoid the replay of our parametered URLs; + Freeing our variables after use; + Salting and hashing of stored credentials; + And more ... Application logic security Breach Commander is built with role-based access controls (RBAC) for access to content and resources. It ensures that users can access restricted data and content only if they have the proper rights to do so. Our authentication enforces multi-factor authentication (MFA) via mobile authenticator at account configuration.
  • Is Breach Commander a multi-tenant solution?
    Yes. Breach Commander has built-in multi-tenancy. This means that a user can be given granular access rights to various company tenants via the same user account and credentials. This is of particular interest for providers supporting multiple clients like breach coaches, insurers and incident responders.
  • Can the incident timeline be exported to PDF?
    Yes. The timeline display has been designed with exporting in mind, so that the page prints well and exports/prints to PDF conveniently for inclusion in a report.
  • Does Breach Commander have multiple display themes?
    Yes. Breach Commander has a light and a dark mode display themes
  • Is it possible to export the audit logs for an incident case?
    Yes. The audit log review functionality offers the download in standard CSV format.
  • Is it possible to consume the logs, metrics and KPIs via API?
    Currently no. But this is being worked on for a future release.

Ready to know more?

Get in touch with us to discuss how Breach Commander can empower your incident management journey.

(Registration Required)

bottom of page