Welcome to the Violet User guide. Violet is a virtual purple team used by cybersecurity professionals. Violet’s AI and NLP capabilities make Violet a unique platform, able to take commands through a keyboard or spoken voice — to perform in-depth proactive cyber defense tasks. Violet is a breach and attack simulation (BAS) technology.
Violet is able to listen to a user’s voice to perform multiple tasks at once, so it is important to read through the user guide to understand how to use Violet properly.
Violet’s voice commands can be broken down into three basic parts:
- Run multiple simluations
- Run a single simulation
- Run the Violet knowledge base
To run multiple simulations built into a specific task user can ask Violet to “CHECK“ or “TEST“ one of their current products.
Examples: “CHECK my Firewall“, “TEST my DLP“
These examples will make Violet run multiple simulations to verify if products in your security stack are currently up and working properly.
To run a single simulation a user can ask Violet to “RUN“, “MIMIC“ or “SIMULATE“ a specific attack. Violet has over a hundred (and growing) built-in attacks that are benign and can be run on a live network.
Examples: “SIMULATE malware beaconing“, “RUN a credit card exfiltration“, “MIMIC DNS Tunneling“
To find out more about Violet’s many capabilities — and how Violet can be used to augment multiple security jobs — select one of the options on the screen for a more in-depth look at why organizations choose Violet to validate security tools, verify protection, and save time while helping keep their systems protected.