Adversary Emulation
An adversary emulation platform uses real-world threat intelligence to duplicate the exact tactics, techniques, behaviors, and procedures that a threat actor would use within an organization’s real environment.
More
Attack Surface
Attack surfaces are all of the entry points where an unauthorized bad actor can potentially access and exploit flaws and weaknesses.
More
Attack Vector
Attack vectors are the methods or paths adversaries use to breach or infiltrate a network, system, or service.
More
Automated Penetration Testing
Automated penetration testing tools systematize the process of detecting and validating vulnerabilities.
More
Breach and Attack Simulation
Breach and attack simulation (BAS) technologies enable improved visibility into enterprise security weak spots by automating testing of threat vectors such as external and insider, lateral movement, and data exfiltration.
More
Common Vulnerabilities and Exposures (CVEs)
Common vulnerabilities and exposures (CVEs) are a list of publicly disclosed computer security flaws.
More
Continuous Threat Exposure Management (CTEM)
Traditional vulnerability management programs can no longer keep up with rapidly expanding attack surfaces.
More
Cyberasset Attack Surface Management
Cyberasset attack surface management (CAASM) enables security teams to overcome challenges associated with asset visibility and exposure.
More
Cybersecurity Mesh Architecture
A cybersecurity mesh architecture (CSMA) is a security operations approach for architecting composable, distributed security controls that improve cybersecurity effectiveness.
More
Data Exfiltration
Data exfiltration is a form of data theft that occurs when a bad actor carries out an unauthorized data transfer.
More
Digital Risk Protection Services
Digital risk protection services (DRPS) are technology and services that protect digital resources and data from external threats, while reducing enterprise attack surfaces.
More
Ethical Hacking
Ethical hacking can be conducted by skilled security personnel or by automated penetration testing platforms.
More
Exposure Management
Exposure management (EM) is a program based upon a set of processes and capabilities that allow enterprises to evaluate the visibility, accessibility, and vulnerability of their digital assets continually and consistently.
More
External Attack Surface Management
Cloud, mobility, IoT, and remote workforces have expanded enterprise attack surfaces, exposing potentially exposing enterprise assets to external threats.
More
MITRE ATT&CK Framework
The adversarial tactics, techniques, and common knowledge (MITRE ATT&CK) is a guideline for classifying and describing cyberattacks and intrusions.
More
Pentesting as a Service
Pentesting as a service (PTaaS) provides point-in-time and continuous application and infrastructure penetration testing services, which traditionally relied heavily on human pentesters using commercial/proprietary tools.
More
Red Team and Blue Team
A red team plays the role of an enemy or competitor to provide threat intelligence from the adversarial perspective.
More
Risk-based Vulnerability Management
Risk-based vulnerability management (RBVM) is a cybersecurity process that reduces vulnerabilities across your attack surface by prioritizing remediation based on the degree of risk they pose to your organization.
More
Risk Validation
Risk validation is the process of determining how well a product or solution performs based upon predicted risk.
More
Threat Intelligence
Increasing awareness of the threat landscape is an increasing demand by organizations to help identify risk and reduce their exposure.
More
Vulnerability Assessment
Vulnerability assessment (VA) solutions operate across on-premises, cloud, and virtual environments to help reduce risk exposure.
More
Vulnerability Prioritization Technology
Vulnerability prioritization technology (VPT) streamlines the vulnerability analysis and mitigation process by identifying and prioritizing the vulnerabilities that pose the greatest organizational risks.
More