Visibility without control is only half the battle. To truly stay ahead of attackers, security teams need precise access, trusted data, and efficient workflows they can rely on. That’s why we’re continuing to enhance the CyCognito platform with features that improve transparency, streamline operations, and put more power in your hands.
The last month brought a range of updates to the CyCognito platform, designed to simplify operations, strengthen visibility, and support smarter and faster decisions in exposure management. Here is a quick look at what is new.
Our Teams capability, which provides comprehensive role-based access control (RBAC), is now generally available across all customer realms. Realm administrators can define and manage teams, control access to specific assets and functionalities, and better align user management with your organizational structure (figure 1). If Teams was not previously configured in your realm, users will default to the root-level team with no change in access permissions. Access Teams through the setting menu in the console.
Figure 1: Access new teams capability for robust role based access control (RBAC)
We’ve introduced a new Service Evidence Field that offers detailed detection information for services identified on your assets. This enhancement increases transparency into our detection process, allowing you to validate findings and understand how CyCognito identifies technologies in your environment. Look for this evidence in the Asset Details page under Services and Ports—where the “Raw Data” button is now renamed Evidence (figure 2).
Figure 2: New “View Evidence” field under service and ports
We’ve enhanced our Unified Asset List capability to now include:
These updates make managing and analyzing your attack surface more efficient than ever (figure 3).
Figure 3: Unified asset list for easier filtering and search pivoting
The new Quick Start button is located at the bottom of the left sidebar (marked with a rocket icon), this feature gives you one-click access to frequently used actions, helping you get started faster and navigate key platform areas with ease (figure 4).
Figure 4: New quick start button allows rapid access to commonly used actions
We’ve improved our search capabilities with:
Figure 5: Automatic expansion of search to include related assets
These features reflect our commitment to helping security teams move beyond reactive asset management. They support a proactive exposure management strategy, one that delivers visibility, prioritization, and automation at scale, without adding complexity.
Ready to see it in action? Log in and explore the new capabilities today. Not yet a customer? Contact us for a demo if you’re evaluating CyCognito as part of your exposure management journey.
Subscribe to our blog and follow us on LinkedIn to get the next month’s updates as they arrive. Until then, happy securing!
Jason Pappalexis has worked in cybersecurity for nearly two decades, holding roles across government security administration, third-party testing, solutions architecture, product management, and technical product marketing.
Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.
Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.
Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.
Discover insights on application security, exposure management and other key topics below.
The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.
Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.
Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.
Explore CyCognito modules ASM, AST and EI in the resources below.
Scalable, continuous, and comprehensive testing for all external assets, all the time.
CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.
CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.