CyCognito Platform Overview
CyCognito Platform Overview
Intelligent Remediation
Guidance: Operations teams can
spend their time fixing issues instead
of figuring out how to fix issues
with our prescriptive and intelligent
remediation planner, remediation
guidance, and supporting evidence.
01 02 03 04 05
Global Asset Automated Active Testing Intelligent Risk Intuitive Reporting
Discovery Business Context Detects data exposures, Prioritization Pre-built dashboards
Attacker-like A graph data model authentication and Dramatically increases enable quick analysis
reconnaissance and intelligent, encryption weaknesses, your operational of attack surface
discovers unknown, iterative analysis of misconfigured efficiency with an risk, as well as
unmanaged, and cloud- your organization and applications, network innovative risk scoring continuously updated
based assets as well its subsidiaries and architecture flaws, system based on an progress toward risk
as those you manage, business units classifies phishing threats and attacker’s priorities, reduction goals.
third-party components, and o‑rganizes assets other risks as well as as well as threat
and abandoned by their business context common vulnerabilities intelligence about
environments. The and relationship to and exposures (CVEs). attacks in the wild.
platform’s discovery your organization.
capability offers
3 times the visibility
of port scanners.
Graph Business & Asset Relationships ɿ Identifies all attack vectors that an attacker could
use to breach your most critical assets, including
ɿ Maps your business structure, subsidiaries, acquired
non-CVE related weaknesses, like data exposures,
companies, cloud environments, and more using
misconfigurations, code injection risks, and even
machine learning and natural language processing
zero-day vulnerabilities.
to reveal the full organizational makeup of your
attack surface. ɿ Tests your entire attack surface, not just the assets
and IP ranges that your teams have programmed
ɿ Continuously discovers and fingerprints all of your
into a scanner, with automated risk-detection
digital assets with our global discovery network and
techniques, vulnerability assessment, encryption
associates those assets with your organization, even
analysis, and more.
those that might not be clearly or traditionally related.
ɿ Validates discovery data with a complete discovery
path to assets, providing proof and reasoning behind
Prioritizes Risks
why assets were associated with your organization. ɿ Cuts through the noise to reveal the most critical
risks that security and IT teams need to fix first.
ɿ Inventories all of your external digital assets with
identifying elements, including IP ranges, web ɿ Grades risks based on attackers’ priorities, business
applications, links, URL patterns, headers, banners, context, discoverability, ease of exploitation, and
certificates, code fragments, deployed software, TLS remediation complexity–including whether there
configuration, related domains, encryption ciphers, have been attacks in the wild.
and many more. ɿ Determines security grades for the entire organization,
as well as on asset, business-unit, issue, and region
Automatically Determines type to help understand where there are weaknesses
and to track improvement over time.
Business Context
ɿ Analyzes and classifies your assets based on your
organization’s structure, whether on-premises or
Accelerates Remediation
in cloud (IaaS, PaaS, SaaS), technology partner, or ɿ Saves time for security and IT teams and reduces
subsidiary environments. your window of exposure by automatically providing
detailed remediation guidance for each identified risk.
ɿ Automatically associates which assets and what data
belong to which departments or subsidiaries within ɿ Provides automated guidance on what to do in order
your organization, the business processes associated to achieve a desired remediation outcome (such as
with those assets, and what risks and attack paths the “raise my overall score from D to B,” or “eliminate
assets expose. all Apache vulnerabilities in my customer-facing
systems”) with Remediation Planner.
Continuously Tests Security at Scale ɿ Integrates CyCognito’s remediation guidance,
planning, and attack surface insights into your
ɿ Goes beyond port scanning and simple identification
existing security stack, including SIEM/SOAR,
of common vulnerabilities and exposures (CVEs)
ticketing, communication and collaboration, GRC,
by automatically and actively testing assets to
and asset management tools.
enumerate, validate, and score attack vectors
based on context. ɿ Analyzes and reports on changes and trends in your
attack surface, including remediation progress
and new issues.
APPLICATION
SECURITY RISKS:
Actively test for insecure
code and vulnerable software
components that enable
attackers to take full control
of assets, default credentials,
CyCognito came up
and misconfigurations with more unique
and significant findings
than any other [vendor].”
SC MAGAZINE | April 22, 2021