ThreatNG Security

View Original

July 22, 2024

Discover, Assess, Report, and Monitor

Cloud and SaaS Exposure > SaaS Identification

ThreatNG Boosts SaaS Security: Enhanced Module Identifies Wider Range of SaaS Services for Proactive Risk Management

ThreatNG's Cloud and SaaS Exposure Investigation Module has been enhanced to externally identify the use of additional SaaS services, including Asana (project management), Atlassian (collaboration and productivity), Kustomer (customer service and support), Looker (business intelligence and data analytics), Monday.com (work operating system), ServiceNow (IT service management), Sharepoint (content management and collaboration), Slack (communication and collaboration), and Splunk (data analytics and observability). This expanded capability is crucial for External Attack Surface Management, Digital Risk Protection, Security Ratings, Third-Party Risk Management, and Supply Chain Security, as it provides organizations with a more comprehensive view of their SaaS ecosystem, enabling them to identify and mitigate potential risks associated with these widely used services.

Report and Share

Archived Web Pages

ThreatNG Transforms Archived Web Page Data into Actionable Security Intelligence

ThreatNG's Archived Web Page Investigation Module now features enhanced reporting capabilities, delivering detailed, visually rich reports highlighting historical vulnerabilities, data leaks, and potential brand risks in archived content. This upgrade enables security teams and decision-makers to quickly grasp the impact of past exposures on their current attack surface and digital risk profile, facilitating swift, targeted remediation and strengthening their overall security posture.

Security Ratings Delta

ThreatNG's Security Ratings Change Tracking: Visualizing Your Risk Profile Over Time

ThreatNG's Security Ratings Change Tracking now offers enhanced reporting on historical fluctuations in security scores, providing a comprehensive overview of an organization's risk profile over time. This includes tracking changes in Brand Damage, BEC & Phishing, Data Leak, Web Application Hijack, Subdomain Takeover susceptibility, overall Cyber Risk, ESG, Supply Chain & Third Party, and Breach & Ransomware exposure. By visualizing these trends, organizations gain actionable insights into their security strengths and weaknesses, enabling them to prioritize remediation efforts and continuously improve their overall security posture.