{"id":1098,"date":"2021-11-25T20:37:10","date_gmt":"2021-11-25T20:37:10","guid":{"rendered":"http:\/\/www.cyberdna.com.au\/cyber-automation\/?page_id=1098"},"modified":"2021-12-03T16:30:01","modified_gmt":"2021-12-03T16:30:01","slug":"automated-attack-surface-management","status":"publish","type":"page","link":"https:\/\/www.cyberdna.com.au\/cyber-automation\/automated-attack-surface-management\/","title":{"rendered":"Automated Attack Surface Management"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwff4ywa-f5c19e65da67ce3c14d5ae493cad577c\">\n.avia-section.av-kwff4ywa-f5c19e65da67ce3c14d5ae493cad577c .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/Automated-Attack-Surface-Management.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-kwff4ywa-f5c19e65da67ce3c14d5ae493cad577c .av-section-color-overlay{\nopacity:0.4;\nbackground-color:#474747;\n}\n<\/style>\n<div id='av_section_1'  class='avia-section av-kwff4ywa-f5c19e65da67ce3c14d5ae493cad577c main_color avia-section-huge avia-no-border-styling  avia-builder-el-0  el_before_av_section  avia-builder-el-first  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  av-minimum-height av-minimum-height-20  container_wrap fullsize'  data-section-bg-repeat='stretch' data-av_minimum_height_pc='20'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><a href='#next-section' title='' class='scroll-down-link ' aria-hidden='true' data-av_icon='\ue877' data-av_iconfont='entypo-fontello'><\/a><div class='container av-section-cont-open' ><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1098'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-dq7ayi-f3f5205853412d536cd53e4dc1ad70e6 av_one_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-cuc6nu-2257b5f5dbda6b5ad4d26771799802ec av_three_fifth  avia-builder-el-2  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwff33ap-374e71f8a49dd04086926f5a9ff58090\">\n#top .av-special-heading.av-kwff33ap-374e71f8a49dd04086926f5a9ff58090{\npadding-bottom:10px;\ncolor:#ffffff;\nfont-size:60px;\n}\n.av-special-heading.av-kwff33ap-374e71f8a49dd04086926f5a9ff58090 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='av-special-heading av-kwff33ap-374e71f8a49dd04086926f5a9ff58090 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-3  el_before_av_hr  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Automated Attack Surface Management<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-a99x3e-4b74bf979ae11c4d8e71798ff15fc401\">\n#top .hr.av-a99x3e-4b74bf979ae11c4d8e71798ff15fc401{\nmargin-top:40px;\nmargin-bottom:40px;\n}\n.hr.av-a99x3e-4b74bf979ae11c4d8e71798ff15fc401 .hr-inner{\nwidth:50px;\nborder-color:#ffffff;\n}\n<\/style>\n<div  class='hr av-a99x3e-4b74bf979ae11c4d8e71798ff15fc401 hr-custom  avia-builder-el-4  el_after_av_heading  avia-builder-el-last  hr-center hr-icon-no '><span class='hr-inner inner-border-av-border-fat'><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p><\/div><div class='flex_column av-8ys6gq-0a4aff276806c3a17a80b9b47cd7656b av_one_fifth  avia-builder-el-5  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-79pynu-a157249c219964f0331807bb03f673d4\">\n.avia-section.av-79pynu-a157249c219964f0331807bb03f673d4{\nmargin-top:30px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-79pynu-a157249c219964f0331807bb03f673d4 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-6  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1098'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-5qgq0a-0d2f75e025a34bef77d32c83896d449c av_one_fifth  avia-builder-el-7  el_before_av_three_fifth  avia-builder-el-first  first flex_column_div '   ><\/div><div class='flex_column av-gil62-4bb3a3cf1b03cf3a0a62fb5200f80602 av_three_fifth  avia-builder-el-8  el_after_av_one_fifth  el_before_av_one_fifth  flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwff5g55-555b2a7584d3f88c2529b6dae3827c44\">\n.av_textblock_section.av-kwff5g55-555b2a7584d3f88c2529b6dae3827c44 .avia_textblock{\ncolor:#3b4a73;\nfont-size:18px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwff5g55-555b2a7584d3f88c2529b6dae3827c44 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p style=\"text-align: center;\"><strong>Reconnaissance<\/strong> is the initial planning stage of an attack, a penetration test or a red teaming campaign. During this phase, an attacker performs a comprehensive technical analysis on their target organization in addition to gathering employee and organizational intelligence that can be used in a social engineering attack or to gain illicit network access. Cymulate Attack Surface Manager lets you know what a hacker might know before they know it.<\/p>\n<\/div><\/section><\/div><div class='flex_column av-6znhm-137da4084000b9fed006ff3308eb9b88 av_one_fifth  avia-builder-el-10  el_after_av_three_fifth  avia-builder-el-last  flex_column_div '   ><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1weije-77dc127fce864cd3060d7eaae0a5f257\">\n.avia-section.av-1weije-77dc127fce864cd3060d7eaae0a5f257{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_3'  class='avia-section av-1weije-77dc127fce864cd3060d7eaae0a5f257 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-11  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1098'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-kwffcy7n-f9e293c018366a35827b5c0ffd6a3d01 sc-av_one_third av-equal-height-column-flextable'><div class='flex_column av-kwffcy7n-f9e293c018366a35827b5c0ffd6a3d01 av_one_third  avia-builder-el-12  el_before_av_two_third  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwffcj38-87bf6ea08724db16c471d7a1cdfd8efb\">\n.av_textblock_section.av-kwffcj38-87bf6ea08724db16c471d7a1cdfd8efb .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwffcj38-87bf6ea08724db16c471d7a1cdfd8efb '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p>The Cymulate Recon module continuously scans the internet for information that an adversary can find and use before launching an attack. The module can scan for intelligence on your company, 3rd party supply chain or a target for a merger or acquisition. It scans domains and sub-domains for application and infrastructure vulnerabilities, web misconfigurations and open ports, it also searches open sources for leaked credentials, compromised passwords, darknet presence, employee emails, and other exploitable intelligence that an attacker may use to their advantage.<\/p>\n<p>The Recon module alerts the security operations team when newly found intelligence is discovered, enabling them to mitigate vulnerabilities and reduce their cyber exposure.<\/p>\n<\/div><\/section><\/div><div class='av-flex-placeholder'><\/div><div class='flex_column av-kwffe5cz-bd1ce593235ea48ce3f35a3b0961763c av_two_third  avia-builder-el-14  el_after_av_one_third  avia-builder-el-last  flex_column_table_cell av-equal-height-column av-align-middle '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwnp5oz3-c545ad00e52ba1c6d699f4dbac17abd4\">\n.avia-image-container.av-kwnp5oz3-c545ad00e52ba1c6d699f4dbac17abd4 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kwnp5oz3-c545ad00e52ba1c6d699f4dbac17abd4 av-styling- avia-align-center  avia-builder-el-15  avia-builder-el-no-sibling  '  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img class='wp-image-1108 avia-img-lazy-loading-not-1108 avia_image' src=\"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/cymulte-score.png\" alt='cymulte score' title='cymulte score'  height=\"420\" width=\"766\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/cymulte-score.png 766w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/cymulte-score-300x164.png 300w, https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/cymulte-score-705x387.png 705w\" sizes=\"(max-width: 766px) 100vw, 766px\" \/><\/div><\/div><\/div><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-93qoq-39890cf5d33f36ac9533b441174e8360\">\n.avia-section.av-93qoq-39890cf5d33f36ac9533b441174e8360{\nmargin-top:0px;\nmargin-bottom:30px;\n}\n<\/style>\n<div id='av_section_4'  class='avia-section av-93qoq-39890cf5d33f36ac9533b441174e8360 main_color avia-section-no-padding avia-no-border-styling  avia-builder-el-16  el_after_av_section  el_before_av_section  avia-bg-style-scroll  container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1098'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-kwffk0b7-c2662f8e2e3391119751d835ca64705f av_one_full  avia-builder-el-17  avia-builder-el-no-sibling  first flex_column_div '   ><style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwffkz7m-5422171bc74f31a9714fb36eb7412425\">\n.av_textblock_section.av-kwffkz7m-5422171bc74f31a9714fb36eb7412425 .avia_textblock{\ncolor:#3b4a73;\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-kwffkz7m-5422171bc74f31a9714fb36eb7412425 '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color '  itemprop=\"text\" ><p style=\"text-align: center;\"><strong style=\"font-size: 18px;\">Key Features<\/strong><\/p>\n<p style=\"text-align: center;\">The Recon module is continuous, new findings trigger alerts for immediate attention.<\/p>\n<p style=\"text-align: center;\">Findings include both technical and organizational findings.<\/p>\n<p style=\"text-align: center;\">Third-Party Assessments\u2013customers can assess potential business partners before engaging with them.<\/p>\n<p style=\"text-align: center;\">Simple mitigation and remediation steps are provided together with a complete view of the findings.<\/p>\n<\/div><\/section><\/div>\n\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_section-f7a622a192eb4e7c4953e9c0865ff204\">\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204{\nmargin-top:20px;\nmargin-bottom:0px;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-parallax .av-parallax-inner{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-content\/uploads\/2021\/11\/pexels-eduardo-dutra-2115217.jpg);\nbackground-position:50% 50%;\nbackground-attachment:scroll;\n}\n.avia-section.av-av_section-f7a622a192eb4e7c4953e9c0865ff204 .av-section-color-overlay{\nopacity:0.5;\nbackground-color:#ffffff;\n}\n<\/style>\n<div id='av_section_5'  class='avia-section av-av_section-f7a622a192eb4e7c4953e9c0865ff204 main_color avia-section-default avia-no-border-styling  avia-builder-el-19  el_after_av_section  avia-builder-el-last  avia-full-stretch av-parallax-section avia-bg-style-parallax av-section-color-overlay-active  container_wrap fullsize'  data-section-bg-repeat='stretch'><div class='av-parallax' data-avia-parallax-ratio='0.3' ><div class='av-parallax-inner main_color avia-full-stretch'><\/div><\/div><div class='av-section-color-overlay-wrap'><div class=\"av-section-color-overlay\"><\/div><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-1098'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column av-av_one_full-516b7eac7a9c6cd1b746245801c7486c av_one_full  avia-builder-el-20  avia-builder-el-no-sibling  first flex_column_div '   ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-av_heading-8677320905dc9bdec3e6c88e4c576590\">\n#top .av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590{\npadding-bottom:10px;\ncolor:#000000;\nfont-size:40px;\n}\n.av-special-heading.av-av_heading-8677320905dc9bdec3e6c88e4c576590 .special-heading-inner-border{\nborder-color:#000000;\n}\n<\/style>\n<div  class='av-special-heading av-av_heading-8677320905dc9bdec3e6c88e4c576590 av-special-heading-h1 custom-color-heading blockquote modern-quote modern-centered  avia-builder-el-21  el_before_av_button  avia-builder-el-first  av-thin-font av-inherit-size '><h1 class='av-special-heading-tag '  itemprop=\"headline\"  ><strong>Get in touch with us and receive more information on how it can help you<\/strong><\/h1><div class='special-heading-border'><div class='special-heading-inner-border'><\/div><\/div><\/div><br \/>\n<div  class='avia-button-wrap avia-button-center  avia-builder-el-22  el_after_av_heading  avia-builder-el-last ' ><a href='http:\/\/www.cyberdna.com.au\/cyber-automation\/contact\/'  class='avia-button av-av_button-4869be09c2e71144d3515a4d55b0849a avia-icon_select-no avia-size-large avia-position-center avia-color-theme-color ' ><span class='avia_iconbox_title' >Contact<\/span><\/a><\/div><\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1098"}],"collection":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/comments?post=1098"}],"version-history":[{"count":24,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1098\/revisions"}],"predecessor-version":[{"id":1457,"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/pages\/1098\/revisions\/1457"}],"wp:attachment":[{"href":"https:\/\/www.cyberdna.com.au\/cyber-automation\/wp-json\/wp\/v2\/media?parent=1098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}