Quick navigation

RiskIQ

RiskIQ Digital Footprint

Visualize and Defend your Attack Surface
Value Proposition

Problem

Attackers performing reconnaissance will often find unknown, unprotected, and unmonitored assets to use as attack vectors. For a large enterprise, unknown assets often exist by the hundreds and are typically easy for even novice hackers and threat groups to find. Because they’re unmonitored, they provide an easy way in and out. To defend yourself, you need to know what attackers see when they’re looking at you. After all, following an attack or breach, saying “we didn’t know that asset existed,” doesn’t mitigate the damage done. Beyond just knowing that an asset exists, it’s critical to understand what powers that asset such the type of server it is, software and frameworks running on that server, as well as any vulnerabilities associated with it. Exploited vulnerabilities on internet-facing assets are the leading cause of data breaches from external threat actors.

Solution

RiskIQ scans millions of web pages and IPs every day, collecting telemetric data to produce a map of the internet. Digital Footprint uncovers and inventories all digital assets appearing online that tie back to your organization and that you depend on for your digital presence. Digital Footprint enables your security team to manage assets outside your firewall, bring unknown assets under management, and survey your digital footprint from the view of the global adversary. With a full understanding of the scope of your digital presence—and continuous visibility into your internet attack surface, your security team can make accurate, comprehensive, and strategic risk management decisions.

Features

  • Continuous inventory of your internet-facing assets, such as hosts, IPs and open ports, websites, mobile apps, and social profiles
  • Categorize assets to business unit, brand, or owne
  • View details on assets such as IP, registrant details, web components, associated CVEs
  • API integration with GRC, CMDB, and vulnerability management applications
  • Risk Reporting based on key Threat Indicators and Security Posture
  • Gain visibility into your digital attack surface from the outside in
  • Quickly pinpoint vulnerable assets for remediation
  • On demand reporting on asset compliance
  • Interoperability with existing asset and vulnerability management tools
  • Easily prioritize efforts to improve your security posture based on risk and exposure
Downloads

Video(s)