{"id":161,"date":"2023-01-30T23:12:00","date_gmt":"2023-01-30T23:12:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=161"},"modified":"2024-01-22T08:31:55","modified_gmt":"2024-01-22T16:31:55","slug":"cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/","title":{"rendered":"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Managing the Dynamic External Landscape<\/h2>\n\n\n\n<p>Today, essentially every organization has experienced an evolution of their IT infrastructure, now having developed web applications, moved assets to public and private cloud environments and connected rapidly to partners and third parties to better serve customers and stay competitive in their marketplace. This new landscape is as dynamic as it is sprawling, something legacy vulnerability management tools were not designed to manage.<\/p>\n\n\n\n<p>Forrester, an analyst firm, has been monitoring this change and the new category termed External Attack Surface Management or EASM. They recently named CyCognito a large vendor in this category in their new report,\u00a0<a href=\"https:\/\/www.forrester.com\/report\/the-external-attack-surface-management-landscape-q1-2023\/RES178691\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cForrester External Attack Surface Management Landscape Report, Q1 2023\u201d<\/a>\u00a0which provides an overview of the\u00a0<a href=\"\/external-attack-surface-management\/\">EASM landscape<\/a>, things to consider and use cases.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Uncovering Hidden Assets: External Attack Surface Management in Action<\/h2>\n\n\n\n<p>CyCognito is excited to see the EASM category gain recognition. CyCognito was founded in 2017 by ex-intelligence agency reconnaissance experts who brought a unique perspective on defenses. That experience gave them unique insight into how attackers would find a path of least resistance to exploit security blindspots. This led them to build CyCognito to perform continuous attack simulations that help organizations understand areas of weakness and eliminate organizational risk.<\/p>\n\n\n\n<p>The report by Forrester cites organizations found 30% more assets using an EASM tool than they knew they had. This is fairly consistent with what customers using CyCognito\u2019s platform often find, upwards of 50% more assets thanks to its deep discovery using machine learning and natural language processing without any data input, zero assumptions or configurations, and no ongoing maintenance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Precisely Prioritizing and Remediating Risks: The CyCognito Approach to EASM<\/h2>\n\n\n\n<p>While asset discovery is a good first step to any EASM program, CyCognito believes the focus needs to be on finding, prioritizing and remediating risks for a great EASM program. The report by Forrester makes the point that IT and security need to work together. The CyCognito platform helps IT and security teams to take immediate action by giving them precise prioritization on the most critical risks and a continuous automated process protecting their constantly changing attack surface.<\/p>\n\n\n\n<p>The CyCognito platform is a SaaS application that helps IT operations and security teams to eliminate internet-facing risks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The external attack surface is&nbsp;<em>automatically and continuously monitored.<\/em><\/li>\n\n\n\n<li>Each asset is&nbsp;<em>mapped,<\/em>&nbsp;visually showing its relationship to the organization such as subsidiary, partner or third-party and identifying the organizational or departmental&nbsp;<em>owner of the asset.&nbsp;<\/em><\/li>\n\n\n\n<li>Assets found are&nbsp;<em>contextualized<\/em>&nbsp;to include details about the asset and the services running on it.&nbsp;<\/li>\n\n\n\n<li><em>Active security testing<\/em>&nbsp;of all live assets is performed up to a daily cadence.<\/li>\n\n\n\n<li><em>Every risk is precisely prioritized<\/em>&nbsp;helping teams zero in on a handful of critical risks to remediate first. Prioritization is based on the severity of the issue, the value or attractiveness of the asset to attackers, and how easy it is for attackers to reach.&nbsp;<\/li>\n\n\n\n<li><em>Actionable, step-by-step instructions to remediate<\/em>&nbsp;each risk is provided and can be automated with configurable workflows through integrations into popular ticketing systems, SIEMs and vulnerability management systems to help establish a fast and efficient process.<\/li>\n<\/ul>\n\n\n\n<p>The comprehensive set of capabilities the CyCognito platform provides have helped customers improve their Mean Time to Resolution (MTTR) by as much as 88%.*<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-world success: See how CyCognito customers are utilizing the platform for various use cases<\/h2>\n\n\n\n<p>CyCognito customers use the platform in various ways including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Asset Discovery:<\/strong>&nbsp;including unknown or new assets in highly dynamic environments<\/li>\n\n\n\n<li><strong>Asset Inventory Management:<\/strong>&nbsp;helping to maintain a constantly updated inventory with asset contextualization and mapping assets to the organization<\/li>\n\n\n\n<li><strong>Vulnerability Risk Management:<\/strong>&nbsp;both active and passive discovery and assessment for risks and prioritizing based on criticality of the risk given context of the organization.<\/li>\n\n\n\n<li><strong>Cloud Security Posture Management:&nbsp;<\/strong>identifying misconfigurations, exposed data and other security issues<\/li>\n\n\n\n<li><strong>Mergers and Acquisitions (M&amp;A) Due Diligence:&nbsp;<\/strong>an attacker perspective on the internet-facing risk exposure before, during and after an acquisition<\/li>\n\n\n\n<li><strong>Supply Chain Risk Management:<\/strong>&nbsp;including third-parties, including those connected to partners or subsidiaries to continuously monitor and prioritize exposed risks<\/li>\n<\/ul>\n\n\n\n<p>Read this recently published&nbsp;<a href=\"\/resources\/reports\/forrester-the-total-economic-impact-of-the-cycognito-platform\/\" target=\"_blank\" rel=\"noreferrer noopener\">Forrester Total Economic (TEI) Report<\/a>&nbsp;on EASM which includes real world case studies based on active customer environments. The quotes and commentary are particularly insightful.<\/p>\n\n\n\n<p>*Fortune 100 customers of CyCognito across industries including hospitality, manufacturing and asset management report 50% to 88% faster remediation times.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Forrester named CyCognito a large vendor in this category in their new report, \u201cForrester External Attack Surface Management Landscape Report, Q1 2023\u201d which provides an overview of the EASM landscape, things to consider and use cases.<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[17,65],"class_list":["post-161","post","type-post","status-publish","format-standard","hentry","category-company","tag-external-attack-surface-management","tag-forrester-consulting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Forrester named CyCognito a large vendor in this category in their new report, \u201cForrester External Attack Surface Management Landscape Report, Q1 2023\u201d which provides an overview of the EASM landscape, things to consider and use cases.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-30T23:12:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-22T16:31:55+00:00\" \/>\n<meta name=\"author\" content=\"Greg Delaney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Greg Delaney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\"},\"author\":{\"name\":\"Greg Delaney\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355\"},\"headline\":\"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report\",\"datePublished\":\"2023-01-30T23:12:00+00:00\",\"dateModified\":\"2024-01-22T16:31:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\"},\"wordCount\":745,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"External Attack Surface Management\",\"Forrester Consulting\"],\"articleSection\":[\"Company\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\",\"name\":\"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2023-01-30T23:12:00+00:00\",\"dateModified\":\"2024-01-22T16:31:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355\",\"name\":\"Greg Delaney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g\",\"caption\":\"Greg Delaney\"},\"description\":\"Was a Senior Product Marketing Manager at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/greg-delaney\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/","og_locale":"en_US","og_type":"article","og_title":"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report | CyCognito Blog","og_description":"Forrester named CyCognito a large vendor in this category in their new report, \u201cForrester External Attack Surface Management Landscape Report, Q1 2023\u201d which provides an overview of the EASM landscape, things to consider and use cases.","og_url":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/","og_site_name":"CyCognito Blog","article_published_time":"2023-01-30T23:12:00+00:00","article_modified_time":"2024-01-22T16:31:55+00:00","author":"Greg Delaney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Greg Delaney","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/"},"author":{"name":"Greg Delaney","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355"},"headline":"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report","datePublished":"2023-01-30T23:12:00+00:00","dateModified":"2024-01-22T16:31:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/"},"wordCount":745,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["External Attack Surface Management","Forrester Consulting"],"articleSection":["Company"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/","url":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/","name":"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2023-01-30T23:12:00+00:00","dateModified":"2024-01-22T16:31:55+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/cycognito-named-large-vendor-in-forrester-external-attack-surface-management-easm-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CyCognito Named Large Vendor in Forrester External Attack Surface Management (EASM) Report"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/8ed761b22065a35a04700f68ab8ad355","name":"Greg Delaney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da4609b2d7e714631e6323058326834a?s=96&d=mm&r=g","caption":"Greg Delaney"},"description":"Was a Senior Product Marketing Manager at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/greg-delaney\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=161"}],"version-history":[{"count":6,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/161\/revisions"}],"predecessor-version":[{"id":654,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/161\/revisions\/654"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}