External Attack Surface Management Frequently Asked Questions (FAQ)

ThreatNG EASM: Your Questions Answered

ThreatNG External Attack Surface Management (EASM) offers a comprehensive solution to identify and manage potential security risks across your organization's digital footprint. This FAQ addresses common questions about ThreatNG EASM, including its functionality, key features, and practical applications. Whether you're seeking to understand the basics of EASM or looking for specific details on ThreatNG's capabilities, this resource will provide valuable insights.

General Questions

  • This solution provides a comprehensive view of your organization's digital footprint and potential security risks. It goes beyond traditional EASM solutions by including cloud implementation vulnerabilities, code repository checks, online sentiment and financial assessments, dark web monitoring, and more. Proactively manage your external attack surface and prevent cyberattacks.

  • ThreatNG helps by:

  • It has a holistic approach, incorporating more data points than traditional solutions. This includes cloud security posture, code repository analysis, online reputation monitoring, dark web activity, and financial assessments, providing a 360-degree view of potential risks.

  • It addresses to various security roles and their respective responsibilities in managing and securing the organization's external attack surface.

    • Security Analyst: Security analysts gain visibility into the organization's external attack surface, identify potential vulnerabilities, and investigate security incidents. They can use the platform's intelligence repositories and vulnerability assessment capabilities to monitor threats and proactively analyze their potential impact.

    • Security Engineer: Security engineers assess the security posture of external-facing systems, identify and remediate vulnerabilities, and ensure compliance with security policies. Actionable insights and risk prioritization features help them focus on the most critical threats and implement effective security controls.

    • Threat Hunter: Threat hunters gain a deeper understanding of the organization's external attack surface and identify potential attack vectors. The comprehensive view of the external attack surface, including shadow IT and misconfigurations, helps them proactively search for and identify potential threats.

    • Vulnerability Management Team: The vulnerability management team discovers and manages vulnerabilities in external-facing systems and prioritizes remediation efforts. Its continuous scanning and vulnerability assessment capabilities enable it to stay ahead of emerging threats and ensure timely patching and mitigation.

    • IT Operations Manager: IT operations managers gain visibility into the organization's external-facing assets and ensure that they are correctly configured and secured. Comprehensive asset inventory and vulnerability assessment features help them accurately view the external attack surface and identify potential risks.

    • System Administrator: System administrators identify and address vulnerabilities in external-facing systems under their responsibility. Detailed vulnerability information and remediation recommendations help them take appropriate action to secure their systems.

    • Network Administrator: Network administrators identify and address vulnerabilities in external-facing network devices and configurations. Network scanning and analysis capabilities help them discover and mitigate potential risks in the network perimeter.

    • Chief Risk Officer (CRO): CROs understand and quantify cyber risks associated with the external attack surface and make informed decisions about risk mitigation strategies. Risk prioritization and reporting features help them communicate cyber risks to the board and executive leadership and ensure alignment with the organization's risk appetite.

    • Risk Analyst: Risk analysts evaluate potential risks associated with the external attack surface and contribute to developing risk mitigation plans. Comprehensive risk assessments and actionable insights help them analyze and prioritize risks and recommend appropriate mitigation measures.

    • Chief Information Security Officer (CISO): CISOs gain a comprehensive view of the organization's external security posture, identify and prioritize risks, and make informed decisions about security investments and strategies. The holistic approach and executive reporting capabilities enable them to effectively communicate cyber risks to the board and executive leadership and drive strategic security initiatives.

    • Chief Technology Officer (CTO): CTOs understand the security posture of the organization's external-facing technology assets and ensure they align with business objectives. CTOs use visibility into the external attack surface and risk assessments to make informed decisions about technology investments and security priorities.

  • Various techniques are used to discover all external-facing assets, including forgotten subdomains, shadow IT, misconfigured cloud buckets, and more.

  • Yes, the external attack surface of third-party vendors and partners is discovered and assessed, providing insights into potential supply chain risks.

  • ThreatNG EASM offers flexible scan scheduling options to meet your needs. You can perform one-time scans for immediate insights or schedule recurring scans at your preferred frequency. This allows you to maintain continuous visibility into your attack surface or perform targeted assessments as required.

  • Comprehensive assessments that go beyond basic vulnerability scanning are performed. Data points, including domain intelligence, cloud exposure, SaaS implementations, and online chatter, are analyzed to identify potential attack vectors and prioritize risks.

  • Risks are prioritized based on severity and potential impact, allowing security teams to focus on the most critical threats.

  • Yes, actionable recommendations on mitigating identified risks and improving your security posture are provided.

  • Various reports tailored to different audiences are generated, from high-level summaries for executives to detailed technical reports for security teams.

  • Data from various sources are correlated to provide context for risk prioritization, allowing security teams to focus on the most critical issues.

  • Features like role-based access control and dynamically generated Correlation Evidence Questionnaires (CEQs) facilitate clear communication and collaboration across departments.

  • Role-based access control (RBAC) ensures stakeholders can access the information they need while safeguarding sensitive data.

  • CEQs are dynamically generated questionnaires based on identified risks, helping stakeholders gather relevant information for accurate risk assessment and mitigation.

  • Organizations can define and enforce consistent security policies across their entire external attack surface, including third-party vendors and the supply chain.

Key Features and Capabilities