XM Cyber Extends its Continuous Exposure Management Platform to the External Attack Surface


XM Cyber, the leader in continuous exposure management, today announced the extension of its platform to include External Attack Surface Management (EASM) and exposed credentials capabilities. This new extension, in response to the evolving cyber threat landscape, empowers organizations to proactively manage and defend against cyber threats by providing unparalleled visibility into the attacker’s journey – from the initial planning to compromising critical assets.

The external attack surface of organizations keeps expanding to support business initiatives. According to the Verizon 2023 Data Breach Investigations Report, 83% of cyber attacks were carried out by external actors, and 49% of breaches by external actors involved the use of stolen credentials. XM Cyber’s Continuous Exposure Management platform directly addresses this challenge by empowering organizations to visualize and prioritize exposures along the entire attack path, preventing high-impact attacks, enhancing remediation efficiency, and reporting on true risk.

“XM Cyber is the only vendor who can discover attack paths all the way from the attacker’s initial concept, to the breaching point, to the organization’s critical assets. We do that across a hybrid environment of on-prem and cloud,” said Noam Erez, CEO and Co-Founder at XM Cyber. “Attackers breach external assets and then exercise lateral movement and reach critical assets anywhere in your environment. To remain one step ahead of attackers, organizations must be able to discover, visualize, and prioritize all exposures across the attack path end-to-end.”

Also Read: Top Cyber Threats to Retail Industry

Key capabilities of XM Cyber’s solution for securing the external attack surface include:

  • Discovery of Exposed Public-Facing Assets: Identifying internet-facing assets and monitoring them for vulnerabilities and risks allows customers to prioritize and remediate exposures that provide attackers an initial foothold and lead to a breach.
  • Exposed Credentials Discovery and Prioritization: Monitoring Infostealers for stolen and leaked credentials identifies employees and customer accounts that are at risk, and enables customers to force password change, revoke active sessions, and enforce stronger authentication to block the use of these credentials.
  • Impactful Remediation Prioritization: Identifying exposed assets and credentials, and then flagging them as breach points, offers a strategic advantage in visualizing the complete attack path, from the external attack surface, across on-prem and cloud environments, to the critical assets. This allows organizations to prioritize remediation efforts based on exploitability and impact, ensuring a more effective cybersecurity posture.

The addition of EASM and exposed credentials capabilities complements the XM Cyber Continuous Exposure Management platform’s discovery and prioritization scope, making it the most comprehensive solution for adopting CTEM (Continuous Threat Exposure Management). The CTEM framework was established by Gartner™ to help organizations transform from trying to fix endless lists of vulnerabilities, to a consistent, actionable remediation plan.

Check Out The New ITsecuritywire Podcast. For more such updates follow us on Google News ITsecuritywire News.