0% found this document useful (0 votes)
37 views

CyCognito Platform Overview

Uploaded by

mailtolahirik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

CyCognito Platform Overview

Uploaded by

mailtolahirik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

DATA SHEET

The CyCognito Platform


Go well beyond discovery with external attack
surface management that lets you rule your risk.
CORE CAPABILITIES
The CyCognito platform helps
you identify, prioritize and
eliminate the most critical cyber
risks to your organization with:
Reduce Business Risk and Protect Your Attack Surface
Attack Surface Discovery
The CyCognito platform focuses on what attackers think, see, and do to
& Mapping: CyCognito automatically
help you dramatically reduce your overall business risk. With no deployment discovers your organization’s structure
required, it autonomously discovers and maps your organization’s entire and internet-exposed assets,
eliminating blindspots caused by
external attack surface and identifies the business context of assets. It then
unknown or forgotten infrastructure
tests your attack surface, looking for the path of least resistance—critical and giving security and IT operations
points of exposure that attackers can most easily exploit. teams a single, complete inventory
of your digital assets.
The CyCognito platform prioritizes your risks based on attacker interest,
discoverability, and exploitability. All of this information is delivered to your Automated Security Testing:
With continuous, active security
operations teams­— via our UI and using a broad range of integrations and testing of all exposed assets, you
automated workflows—so they know where to focus immediately. This can confidently understand the real
accelerates remediation by giving your teams the actionable intelligence, vulnerabilities in your attack surface.
Some issues discovered with active
evidence, and prescriptive remediation guidance they need.
testing include weak and misconfigured
encryption protocols and ciphers,
login issues, man-in-the-middle
attacks, and exposed data.

Integrated Threat and Exploit


intelligence: Not every vulnerability
is created equal, so CyCognito
combines threat intelligence with
attack surface vulnerability data to
highlight weaknesses in your attack
surface that attackers are actively
looking to exploit.

Intelligent Remediation
Guidance: Operations teams can
spend their time fixing issues instead
of figuring out how to fix issues
with our prescriptive and intelligent
remediation planner, remediation
guidance, and supporting evidence.

CYCOGNITO | DATA SHEET


CyCognito Platform Differentiators
The platform automates attacker-style reconnaissance and offensive security techniques
to close the gaps left by other security solutions, including legacy attack surface
management products, vulnerability scanners, penetration testing, and security ratings
services. Unique capabilities of the CyCognito platform include:

01 02 03 04 05
Global Asset Automated Active Testing Intelligent Risk Intuitive Reporting
Discovery Business Context Detects data exposures, Prioritization Pre-built dashboards
Attacker-like A graph data model authentication and Dramatically increases enable quick analysis
reconnaissance and intelligent, encryption weaknesses, your operational of attack surface
discovers unknown, iterative analysis of misconfigured efficiency with an risk, as well as
unmanaged, and cloud- your organization and applications, network innovative risk scoring continuously updated
based assets as well its subsidiaries and architecture flaws, system based on an progress toward risk
as those you manage, business units classifies phishing threats and attacker’s priorities, reduction goals.
third-party components, and o‑rganizes assets other risks as well as as well as threat
and abandoned by their business context common vulnerabilities intelligence about
environments. The and relationship to and exposures (CVEs). attacks in the wild.
platform’s discovery your organization.
capability offers
3 times the visibility
of port scanners.

Key Use Cases for


the CyCognito Platform
Like industry-leading organizations around the
globe, you can use the CyCognito platform to:

Automate Attack Surface Management:


Identify and manage your attacker-exposed assets
with an understanding of their business context
and security risks.
Scale External Risk Assessment & Penetration Figure 1. Analyze and report on security posture, including trends,
Testing: Augment periodic, narrowly focused testing to demonstrate you are managing cyber risk. You can see overall
trends as well as trends for asset groups.
coverage with continuous, multi-factor testing of your
entire external attack surface.
Eliminate Ransomware Attack Vectors: Pinpoint and
prioritize critical remote access exposures that attackers can Monitor Subsidiary Risk: Identify and prioritize subsidiary
use to plant malware or use for initial access. and business unit-level security risks so relevant teams can
eliminate them.
M&A Risk Reduction: Evaluate the security risks of your
merger or acquisition targets and quickly bring the security Security Self-Assessment: Continuously assess, monitor,
posture of acquired entities into alignment with the rest of and eliminate cybersecurity risk to measure and improve
the organization. your security posture.
How the CyCognito Platform Works
The CyCognito platform performs reconnaissance automatically, using an attacker mindset
to build a comprehensive view of your external attack surface. It then guides you and your
operations teams on what needs to be fixed immediately to reduce the most risk and
eliminate attackers’ paths of least resistance into your organization. The platform works
without deployment or configuration and does not disrupt business continuity.

Graph Business & Asset Relationships ɿ Identifies all attack vectors that an attacker could
use to breach your most critical assets, including
ɿ Maps your business structure, subsidiaries, acquired
non-CVE related weaknesses, like data exposures,
companies, cloud environments, and more using
misconfigurations, code injection risks, and even
machine learning and natural language processing
zero-day vulnerabilities.
to reveal the full organizational makeup of your
attack surface. ɿ Tests your entire attack surface, not just the assets
and IP ranges that your teams have programmed
ɿ Continuously discovers and fingerprints all of your
into a scanner, with automated risk-detection
digital assets with our global discovery network and
techniques, vulnerability assessment, encryption
associates those assets with your organization, even
analysis, and more.
those that might not be clearly or traditionally related.
ɿ Validates discovery data with a complete discovery
path to assets, providing proof and reasoning behind
Prioritizes Risks
why assets were associated with your organization. ɿ Cuts through the noise to reveal the most critical
risks that security and IT teams need to fix first.
ɿ Inventories all of your external digital assets with
identifying elements, including IP ranges, web ɿ Grades risks based on attackers’ priorities, business
applications, links, URL patterns, headers, banners, context, discoverability, ease of exploitation, and
certificates, code fragments, deployed software, TLS remediation complexity–including whether there
configuration, related domains, encryption ciphers, have been attacks in the wild.
and many more. ɿ Determines security grades for the entire organization,
as well as on asset, business-unit, issue, and region
Automatically Determines type to help understand where there are weaknesses
and to track improvement over time.
Business Context
ɿ Analyzes and classifies your assets based on your
organization’s structure, whether on-premises or
Accelerates Remediation
in cloud (IaaS, PaaS, SaaS), technology partner, or ɿ Saves time for security and IT teams and reduces
subsidiary environments. your window of exposure by automatically providing
detailed remediation guidance for each identified risk.
ɿ Automatically associates which assets and what data
belong to which departments or subsidiaries within ɿ Provides automated guidance on what to do in order
your organization, the business processes associated to achieve a desired remediation outcome (such as
with those assets, and what risks and attack paths the “raise my overall score from D to B,” or “eliminate
assets expose. all Apache vulnerabilities in my customer-facing
systems”) with Remediation Planner.
Continuously Tests Security at Scale ɿ Integrates CyCognito’s remediation guidance,
planning, and attack surface insights into your
ɿ Goes beyond port scanning and simple identification
existing security stack, including SIEM/SOAR,
of common vulnerabilities and exposures (CVEs)
ticketing, communication and collaboration, GRC,
by automatically and actively testing assets to
and asset management tools.
enumerate, validate, and score attack vectors
based on context. ɿ Analyzes and reports on changes and trends in your
attack surface, including remediation progress
and new issues.

CYCOGNITO | DATA SHEET


Reduce Risks Across
Your IT Ecosystem
CyCognito empowers companies to take full
control over their attack surface by uncovering
and eliminating the critical security risks they
didn’t even know existed.

NETWORK SECURITY RISKS: Uncover assets


you do not manage or are not aware of, including
remotely accessible servers with misconfigured
and insecure authentication mechanisms
and services
Figure 2. The CyCognito platform helps you identify
and eliminate attackers’ paths of least resistance
CONFIDENTIALITY RISKS: Reveal weak and in your attack surface. It provides the evidence you
misconfigured encryption protocols and need, including how risks were discovered, so you can
confidently remediate or mitigate issues.
ciphers, login issues, man-in-the-middle
attacks, and exposed data

APPLICATION
SECURITY RISKS:
Actively test for insecure
code and vulnerable software
components that enable
attackers to take full control
of assets, default credentials,
CyCognito came up
and misconfigurations with more unique
and significant findings
than any other [vendor].”
SC MAGAZINE | April 22, 2021

To learn how the CyCognito platform uniquely helps you identify


and prioritize the paths of least resistance into your IT ecosystem,
so that you can eliminate them, visit cycognito.com.

You might also like