The Platform

Enable your security and operations teams to proactively identify, prioritize, and remediate exposures to stay ahead of attackers.

Watch a Demo
GigaOm Radar for Attack Surface Management

The expansion of an organization's attack surface continues to present a critical business challenge. Download the GigaOm Radar for Attack Surface Management to get an overview of the available ASM solutions, identify leading offerings, and evaluate the best solution for you.  

Use Cases

The CyCognito platform helps you identify all of the attacker-exposed assets in your IT ecosystem for a complete view of your attack surface.

State of External Exposure Management

Download CyCognito’s State of External Exposure Management Report to learn key recommendations that your Security teams can implement to improve their exposure management strategy and minimize risk. 

Our Customers

External attack surface management is advancing cybersecurity into a new era. Learn how security experts across all industries benefit from using CyCognito’s platform.

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

About CyCognito

We believe all organizations should be able to protect themselves from even the most sophisticated attackers.

Contact us
Resources

The knowledge you need to manage and protect your attack surface.

What's New Blog
Company

The State of External Attack Surface Management (EASM)

Rob-Gurzeev
By Rob Gurzeev
CEO & Co-Founder
August 23, 2021

When Dima and I co-founded CyCognito four years ago, our goal was simple: change the attacker/defender dynamic by proactively giving security teams insight about their attack surface and guidance about what they had to do to prevent breaches.

It was at a time when the concept now known as “External Attack Surface Management” didn’t even have a name. Enterprises still had to defend themselves and, in most cases, they focused on putting more locks–newer, shinier locks–on their known assets.

But with the connectedness of everything, the move to the cloud, and continued breach after breach after breach, those tactics have been proven to simply not work. Organizations continued to get compromised because of unknown, unmanaged assets. 

Changing the game – moving from defense to offense

Our initial concept was to provide organizations with insights about how they looked to attackers, and to do so with the same skill and rigor that we used as former cyber intelligence soldiers ourselves. 

A key part of our doctrine was that most organizations don’t know their attack surface. And because of this, all solutions that rely on their knowledge of what’s theirs will fail at preventing breaches.

So we taught our customers how attackers think. How they look for the path of least resistance on their target’s attack surface. How they get creative with their strategies and tactics. How relatively easy it is to find likely abandoned but still alive and connected assets to use as beachheads into an organization.

We wanted our customers to understand the kind of reconnaissance that attackers did on their targets, and then to do that reconnaissance for them.

And we did. And from this idea, we’ve seen this market grow into something truly impactful. External Attack Surface Management is now a recognized category by Gartner (and it even has its own acronym – EASM) and its core technologies are something that enterprise security teams everywhere are familiar with. 

To understand where we’re going, we need to
remember where we’ve been

The concept of scanning networks for connected devices has been around since the late ‘90s with the creation of Nmap. Since it was free, a few commercial products were launched based on this technology, and some of these tools are still in existence today.

Ten years ago, new advancements made this scanning much faster and more efficient. This meant that the concept could now be applied to the entire internet. New software companies began collecting this internet-wide data and allowing organizations to query for things that were alive and exposed behind known IPs that were assigned to them. This was the next iteration of attack surface tools focused on inventory and visibility.

And while inventory and visibility is a critical first step in the prevention of breaches, it’s not enough. What does a security operations team (and IT team, red team, and vuln management team) need to do in order to take their knowledge of their attack surface and actually protect it?

CyCognito has built the only platform to answer that question.


Topics





Recent Posts








Top Tags



CyCognito Research Report

State of External Exposure Management

State of External Exposure Management

Download CyCognito’s State of External Exposure Management Report to learn key recommendations that your Security teams can implement to improve their exposure management strategy and minimize risk.

Dummies Book

External Exposure & Attack Surface Management For Dummies

External Exposure & Attack Surface Management For Dummies

As your attack surface has grown to cloud infrastructures and across subsidiaries, attackers are looking for and finding unknown and unmanaged assets to serve as their entry points.

Interactive Demo

Ready to Rule Your Risk?

Request a personalized walkthrough of the CyCognito platform to see how we can help your company identify all its internet-exposed assets, focus on which are most vulnerable to attacks, and accelerate your time to remediating critical risks.