Attack Surface Management
Find & Secure Your Security Blind Spots
Identify security blind spots and map all assets discovered in your global IT ecosystems. Our platform continuously evaluates information in real-time as new assets are deployed, decommissioned or as a system changes.
The platform leverages both vulnerability data and business context to prioritize risk – this way developers can fix critical exposures first.
See Your Attack Surface Just Like an Attacker
The Edgescan platform uncovers all attack vectors that can be used to breach your most critical assets, including data exposures and misconfigurations.
It uncovers all attack vectors that can be used to breach your most critical assets, including data exposures and misconfigurations.
You can't secure what you can't see...
Attack Surface Management (ASM) provides you the ability to see all services exposed to the public internet across your global estate.
As new systems are deployed, decommissioned or a system changes, ASM can inform you of the event. This is delivered in real-time and on a continuous basis.
The challenge is to keep pace with change, as change may introduce risk.
Manage and Reduce Your Risk
Complete Visibility. Continuous Monitoring. Risk Prioritization.
Visibility Across the Global IT Ecosystem
The Edgescan platform discovers and then maps your entire The Edgescan platform discovers and then maps your entire global perimeter. It Intelligently probes and identifies all networking devices, platforms, operating systems, databases, and web applications. It finds unknown assets, identifies security blind spots, and automates the analysis of changes across the entire IT ecosystem.
Continuous Monitoring and Automated Security Testing
Changes to firewalls, exposed services and rogue deployments are all avenues of attack. Edgescan’s external IP monitoring coupled with asynchronous port scanning identifies then continuously monitors assets. Notifications are sent when the system detects a change that may increase your attack surface and introduce additional risk. The platform also provides the capability to identify and detect APIs on the enterprise’s external IP range.
Reliable & Timely Event Alerts
Keep informed as events happen. As new systems are deployed, decommissioned or a system changes, the Edgescan platform can inform you of the event. Our simple customizable events feature sends notifications when discovering:
• Human Error resulting in exposed services
• Vulnerable and outdated software
• Rogue deployments
• Rogue API’s, unknown API’s
• IoT detection
• Application / DNS discovery
Intelligent Risk Prioritization
The platform leverages both vulnerability data and business context to prioritize risk – this way developers can fix critical exposures first. Developers know what to prioritize to fix what matters most, accelerating the remediation process for those critical exposures.
Key Features of the Edgescan ASM Solution
The Edgescan discovery engine asynchronously scans across an organizations entire IT ecosystem. We continuously search for and intelligently evaluate, networking devices, platforms, operating systems, databases and applications.
Attack Surface Mapping
Edgescan ASM maps and indexes your attack surface to determine which ports and services are present. This helps you detect exposed ports, vulnerable services and even misconfigured firewalls or ACLs.
Customizable Scan Profiling
Organizations can specify which services and systems are the highest priority and highest risk.
Discovery of exposed services based on response fingerprints and identifiers. This aids in the discovery of exposed old or deprecated systems and coupled with continuous vulnerability management, is very effective in reducing exposure windows.
On-Demand Live Retests
As you address exposures, you can trigger on-demand probing to ensure the issue has been fixed.
Historical Host Information
Detailed history of past host discovery data, can assist with incident reporting and root cause analysis.
Detection of misconfigured ACL’s or Firewall rules that could lead to service exposures and weaknesses.
Customizable alerting by email, SMS or webhook. Automatic notification of any potential exposures in real time.
Continuous API detection to ensure you know which of your API’s are exposed to the internet. This can help detect rogue, legacy or forgotten deployments and assets.
Integrate into native cloud services. Ensure your entire cloud attack surface is under management as it evolves with native cloud service integrations (Amazon Web Services, Azure, Google).
Assess your landscape from any region across the globe and detect exposures based on source traffic geolocation.