{"id":330,"date":"2021-03-25T22:54:00","date_gmt":"2021-03-25T22:54:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=330"},"modified":"2025-06-19T09:15:09","modified_gmt":"2025-06-19T16:15:09","slug":"external-attack-surface-management","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/","title":{"rendered":"Now Is the Time for External Attack Surface Management"},"content":{"rendered":"\n<p>The importance of attack surface management hit a major milestone this week with the release of a\u00a0<a href=\"https:\/\/www.gartner.com\/en\">Gartner<\/a>\u00a0report titled \u201cEmerging Technologies: Critical Insights for External Attack Surface Management,&#8221; a category Gartner calls <a href=\"\/external-attack-surface-management\/\">EASM<\/a> for short.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"> One Customer at a Time<\/h2>\n\n\n\n<p>As a start-up pioneering a new market and championing a unique vision, it can be a lot of work trying to get the word out. A lot of the time, you do that at a personal level, one customer at a time.<\/p>\n\n\n\n<p>It is very exciting and great validation when chief information security officers (CISOs) purchase and use your product along with their security teams. When they renew their subscription, and buy your product again when they move on to a new company, it is an even better feeling.<\/p>\n\n\n\n<p>And it is also fantastic when market analysts, especially those at Gartner, recognize that they are seeing the market emerge too.<\/p>\n\n\n\n<p>The Critical Insights for External Attack Surface Management report provides advice for both potential buyers and vendors like CyCognito. We wanted to share a copy with everyone who&#8217;s interested, but it\u2019s not available for licensing yet. So, if you\u2019re a Gartner subscriber you should check it out! If you\u2019re not, please&nbsp;<a href=\"\/contact\/\">contact us<\/a>&nbsp;and we will be happy to discuss our takeaways and share our insights on what we see in the market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Attack Surface Management?<\/h2>\n\n\n\n<p><a href=\"\/learn\/attack-surface-management.php\">Attack surface management (ASM)<\/a>&nbsp;is the process of continuously discovering, classifying and assessing the security of all your attacker-exposed IT assets, known and unknown, wherever they are: on-premises, in the cloud, in third-party or partner environments, or in the networks of your subsidiaries. Most solutions assess security using basic proxy measures such as banner grabbing that are incomplete and produce many false positive results.<\/p>\n\n\n\n<p>In contrast, the CyCognito platform is an External Attack Surface Management Solution that delivers attack surface protection by combining the market\u2019s most advanced ASM capabilities with automated multi-factor testing, to discover the paths of least resistance that attackers are most likely to use to compromise organizations.<\/p>\n\n\n\n<p>Again, we\u2019re gratified to see this market validation from Gartner. We believe that EASM should be the foundation of every enterprise security program, and our own approach is something we call attack surface protection, a combination of attack surface management and multi-factor security testing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New Gartner report Emerging Technologies: Critical Insights for External Attack Surface Management, validates the importance of attack surface management.<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,9,96],"class_list":["post-330","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-attack-surface-management","tag-cybersecurity","tag-digital-risk-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Now Is the Time for External Attack Surface Management | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Now Is the Time for External Attack Surface Management | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"New Gartner report Emerging Technologies: Critical Insights for External Attack Surface Management, validates the importance of attack surface management.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-25T22:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T16:15:09+00:00\" \/>\n<meta name=\"author\" content=\"Raphael Reich\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raphael Reich\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\"},\"author\":{\"name\":\"Raphael Reich\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7\"},\"headline\":\"Now Is the Time for External Attack Surface Management\",\"datePublished\":\"2021-03-25T22:54:00+00:00\",\"dateModified\":\"2025-06-19T16:15:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\"},\"wordCount\":401,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Attack Surface Management\",\"Cybersecurity\",\"Digital Risk Management\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\",\"name\":\"Now Is the Time for External Attack Surface Management | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2021-03-25T22:54:00+00:00\",\"dateModified\":\"2025-06-19T16:15:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Now Is the Time for External Attack Surface Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7\",\"name\":\"Raphael Reich\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g\",\"caption\":\"Raphael Reich\"},\"description\":\"Was Vice President of Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/raphael-reich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Now Is the Time for External Attack Surface Management | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/","og_locale":"en_US","og_type":"article","og_title":"Now Is the Time for External Attack Surface Management | CyCognito Blog","og_description":"New Gartner report Emerging Technologies: Critical Insights for External Attack Surface Management, validates the importance of attack surface management.","og_url":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/","og_site_name":"CyCognito Blog","article_published_time":"2021-03-25T22:54:00+00:00","article_modified_time":"2025-06-19T16:15:09+00:00","author":"Raphael Reich","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Raphael Reich","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/"},"author":{"name":"Raphael Reich","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7"},"headline":"Now Is the Time for External Attack Surface Management","datePublished":"2021-03-25T22:54:00+00:00","dateModified":"2025-06-19T16:15:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/"},"wordCount":401,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Attack Surface Management","Cybersecurity","Digital Risk Management"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/","url":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/","name":"Now Is the Time for External Attack Surface Management | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2021-03-25T22:54:00+00:00","dateModified":"2025-06-19T16:15:09+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/external-attack-surface-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Now Is the Time for External Attack Surface Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7","name":"Raphael Reich","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g","caption":"Raphael Reich"},"description":"Was Vice President of Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/raphael-reich\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":6,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":1588,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/330\/revisions\/1588"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}