Pragmatic Observations on EASM, Data Quality, and the Future AI
Edgescan War Room - Episode 2

This is the second episode in a series of informal conversations between Eoin Keary, CEO and Founder of Edgescan
and Jim Manico, Edgescan Strategic Technical Advisor and Founder of Manicode.

 

 

WR-hereos

 

Information on Topics Covered from an Edgescan Perspective

External Attack Surface Management

Edgescan's EASM offers a cutting-edge combination of automated risk-based vulnerability intelligence and validation, harnessing the power of cyber analytics and human expertise.

By integrating EASM (External Attack Surface Management) with its award-winning PTaaS (Penetration Testing as a Service) and RBVM (Risk-based Vulnerability Management) solutions, Edgescan's hybrid approach offers a comprehensive understanding of risks and exposures. This unique combination allows for a clear assessment of existing assets and the level of coverage applied. The result is a detailed, actionable, and validated vulnerability intelligence that enables risk prioritization for accelerated remediation and enhanced coverage assurance.

 

Three Reasons why Edgescan has Superior Data Quality

With our superior data quality, Edgescan equips organizations with the necessary insights to make informed decisions, prioritize remediation efforts, and enhance overall cybersecurity posture.

1. Human Intelligence with Unmatched Expertise

At Edgescan, we pride ourselves on the exceptional talent of our Certified Security Experts. With a team of highly-skilled professionals who possess extensive industry accreditations such as CREST, OSCP, CEH, and more, we bring unparalleled accuracy and intelligence to our platform. Their battle-hardened experience and deep understanding of cybersecurity provide a valuable and distinctive supplement to our automated vulnerability management solutions.

2. Risk-rated Vulnerability Results

Unlike traditional vulnerability scanning, Edgescan's hybrid approach goes beyond surface-level identification to uncover hidden vulnerabilities. Our focus is on delivering validated vulnerability data that swiftly assesses the severity level of each exposure. Through our proprietary scoring process called EVSS (Edgescan Validated Security Score), we provide a comprehensive understanding of risks, enabling prioritized remediation efforts. Additionally, we leverage industry-established risk-rating systems like CVSS, EPSS, and CISA KEV to validate and prioritize risks, ensuring that remediation efforts are directed towards the most critical vulnerabilities.

3. Expanding Data Lake of Vulnerability Intelligence

 Edgescan boasts an expansive and constantly growing data lake of vulnerability examples. This vast repository, derived from real-world assessments, is shared by all solutions in our platform. As new vulnerabilities are discovered, their data is added to our expanding intelligence, improving analytical validation. This ever-growing pool of knowledge enhances our ability to identify and address emerging threats, providing our clients with up-to-date and comprehensive vulnerability intelligence.

 

 

Edgescan-Logo-All-Withe

Copyright © 2023 Edgescan  All Rights Reserved  |  Privacy Policy
Ireland: Unit 701 Northwest Business Park, Dublin 15, D15  CH256   |   United States: 445 Park Avenue, 9th Floor, New York, NY 10023