HomeCII/OTNetSPI launches solutions for managing external attack surface

NetSPI launches solutions for managing external attack surface

Published on

spot_img

NetSPI, a leader in cybersecurity solutions, has introduced a new range of External Attack Surface Management (EASM) offerings to better serve the needs of its global customer base. The company’s goal is to help organizations adopt a continuous threat exposure management (CTEM) model and strengthen their proactive security posture in the face of evolving cyber threats.

According to Tom Parker, the Chief Technology Officer at NetSPI, organizations need to constantly assess and validate their attack surfaces to stay ahead of cybercriminals. The new EASM solutions provide security teams with comprehensive visibility, powerful insights, and asset contextualization to identify and eliminate risks effectively.

In recent times, CTEM has gained popularity among Chief Information Security Officers (CISOs) as a strategic approach to address security exposures systematically. While other tools support the implementation of a CTEM strategy, NetSPI is unique in providing a single platform that integrates essential components like EASM for a successful execution.

Unlike traditional vulnerability management approaches, which offer only a snapshot of security at a given moment, NetSPI’s integrated solutions like Penetration Testing as a Service (PTaaS), Cyber Asset Attack Surface Management (CAASM), and Breach and Attack Simulation (BAS) offer continuous monitoring and proactive security measures against persistent threats.

Aaron Shilts, the CEO of NetSPI, highlighted the significance of the company’s innovative EASM offerings in enhancing security postures across various industries. By making EASM accessible and easy to implement, businesses can fortify their defenses and mitigate risks posed by the current threat landscape effectively.

The updated EASM offerings from NetSPI comprise three tiers tailored to meet the diverse needs of organizations:

– EASM lite: A user-friendly, automated solution for asset discovery, allowing organizations to quickly identify and comprehend their external attack surfaces.
– EASM standard: An upgraded version with expert exposure validation and platform enhancements for prompt identification and prioritization of external exposures.
– EASM plus: A comprehensive solution that combines continuous EASM-powered external penetration testing with ongoing discovery and exposure identification by consultants.

These offerings enable organizations of all sizes to proactively strengthen their security postures and establish a robust CTEM program. Additionally, NetSPI’s acquisition of Hubble, an acclaimed CAASM solution, further enhances the company’s suite of EASM offerings and provides additional support for organizations looking to bolster their cybersecurity defenses.

With these new EASM solutions, NetSPI continues to lead the way in providing cutting-edge cybersecurity services that empower businesses to combat threats effectively and safeguard their critical assets in today’s dynamic threat landscape.

Source link

Latest articles

2024: The Year of Takedowns – Significant Law Enforcement Operations

In the year 2024, the global fight against cybercrime has reached new heights with...

Vulnerability Exploit Assessment Tool EPSS Exposed to Adversarial Attacks

Morphisec, a leading endpoint security provider, recently conducted a proof-of-concept experiment that revealed a...

UK’s White Hat Legal Shield Proposal Falls Short in House of Lords

A proposed amendment to the Computer Misuse Act in the United Kingdom, which aimed...

Blackberry divests Cylance to Arctic Wolf for $160M

Arctic Wolf, a leading cybersecurity company, recently announced its acquisition of Cylance, an endpoint...

More like this

2024: The Year of Takedowns – Significant Law Enforcement Operations

In the year 2024, the global fight against cybercrime has reached new heights with...

Vulnerability Exploit Assessment Tool EPSS Exposed to Adversarial Attacks

Morphisec, a leading endpoint security provider, recently conducted a proof-of-concept experiment that revealed a...

UK’s White Hat Legal Shield Proposal Falls Short in House of Lords

A proposed amendment to the Computer Misuse Act in the United Kingdom, which aimed...