Discover, Assess, Continuous Visibility, Reporting and Sharing

Mobile App Discovery (New)

ThreatNG has just introduced a game-changing feature: the Mobile App Discovery, a part of our Sensitive Code Exposure Investigation Module. This powerful solution surpasses traditional EASM solutions by revealing all mobile apps associated with your organization. This means you can proactively identify vulnerabilities, misconfigurations, and data exposure. It also enhances your third-party risk management by assessing vendor mobile app security. Moreover, it streamlines your threat hunting by investigating discovered apps for hidden risks. This new feature provides a broader attack surface view, empowering security teams, leaders, and developers to make informed security decisions.

Securities and Exchange Commission Cybersecurity Risk and Oversight Disclosures (New)

ThreatNG and the R&D team at DarcSight Labs have revolutionized our platform with a unique module that analyzes cybersecurity disclosures in US SEC filings. This capability is provided within the Sentiment and Financials Investigation Module and goes beyond essential monitoring to uncover critical details that enhance ThreatNG's core functions:

  • Enhanced EASM: Gain insights into a company's security controls, past attacks, and vulnerabilities, helping you build a more comprehensive picture of their attack surface and potential threats.

  • Advanced DRP: Proactively identify potential breaches and litigation risks before they become public knowledge.

  • More profound Security Ratings: Evaluate a company's cybersecurity transparency and compliance with frameworks, leading to more nuanced security ratings.

This translates to actionable benefits for you:

  • Prioritize Threats: Based on a company's disclosed vulnerabilities and overall risk posture, identify and focus on the most significant threats.

  • Enhanced Threat Intelligence: Learn how similar organizations manage cyber risks, informing your broader threat intelligence strategies.

  • Improved Security Posture: Leverage extracted information to identify areas for improvement in your security practices.

The new SEC Filings Cybersecurity Disclosure module empowers you to make informed decisions and build a more robust security posture.

US Securities and Exchange Commission Filing Report (New)

ThreatNG just launched a game-changing report! Analyze all US public companies' cybersecurity posture and risk management with our new US SEC Filing Report. This report dives deep into SEC filings to uncover details on their:

  • Risk Disclosures: Are they transparent about cyber risks and oversight?

  • Board Involvement: How engaged is the board in cybersecurity oversight?

  • Cybersecurity Risk: Does the company acknowledge it as a risk factor? What investments are they making?

  • Risk Management: What processes and training do they have to mitigate risks?

This report lets you make informed decisions about potential partners and vendors by understanding their cybersecurity approach.

SaaS External Identification Enhancement

ThreatNG has fortified its comprehensive platform with an enhanced SaaS discovery feature for better security management within the Cloud and SaaS Exposure Investigation Module. Unlike other complex solutions that require you to authenticate and connect, ThreatNG uncovers all externally identifiable applications, including shadow IT, to provide a complete picture of your attack surface. This proactive approach empowers various teams across your organization: security teams can identify and prioritize vulnerabilities, Third Party Risk Management (TPRM), procurement teams can manage vendor risk and optimize spending, and business leaders can make informed decisions about cloud adoption and security. ThreatNG helps you see the unseen and gain a holistic view of your SaaS landscape to improve your security posture, instilling a sense of security and confidence in your risk management.

Supply Chain and Third-Party Exposure Rating Bolstered by Technology Stack Investigation Module Enhancements

Attention Security and Risk Management professionals: We are excited to announce a significant upgrade. Our enhanced Supply Chain and Third-Party Exposure Security Rating bolsters your defenses against a growing attack vector.

This upgrade combines the power of our External Attack Surface Management (EASM) and Digital Risk Protection (DRP) with deeper Technology Stack Investigation capabilities. This translates to a more precise understanding of your vendors' security posture, allowing you to:

  • Identify and prioritize vulnerabilities within your supply chain for faster remediation.

  • Gain a holistic view of your security posture, highlighting potential risks from third-party vendors.

  • Make smarter security decisions with actionable intelligence that empowers strategic resource allocation.

Log in to your ThreatNG platform account today and leverage our enhanced Security Ratings to manage your supply chain risks proactively.

Platform Administration

Operations Management Hub (New)

The Operations Management Hub is a powerful addition to the ThreatNG Solution Platform. It is your central command center, allowing you to customize ongoing discovery and assessment jobs. With this hub, you can precisely manage how your system scans for vulnerabilities by editing key parameters for scheduled jobs. This level of customization ensures your scans are tailored to your unique needs, enhancing your security posture.

  • Policy: Select the specific security policies you want to apply during scans, ensuring compliance with industry standards or tailoring them to your unique needs.

  • Wordlist: Refine the wordlist used during scans to target specific vulnerabilities or types of attacks.

  • Risk Appetite: Set your desired risk tolerance level, focusing scans on high-risk areas while minimizing distractions from lower-risk findings.

  • Frequency: Determine the optimal schedule for recurring scans, balancing real-time threat detection with efficient resource allocation.

With the Operations Management Hub, you can maintain a proactive security posture by customizing your vulnerability discovery and assessment approach.

Previous
Previous

July 1, 2024

Next
Next

March 25, 2024