Assets
                    
                        
                    
                        
                    
                        
                    
                        
                    
                
                    External Attack Surface 
                    
                        
                    
                        
                            
                            Web Application Scanning
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                    
                        
                            
                            Domain Reputation Monitoring
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                            
                            SSL/TLS Certificate Audit
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                
                    API Attack Surface
                    
                        
                    
                        
                            
                            Input Sanitization Issues
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                            
                            Rate Limiting and Throttling
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                            
                            Authentication and Authorization Issues
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                            
                            Leakage of Sensitive Data
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                
                    Internal Attack Surface 
                    
                        
                    
                        
                    
                        
                            
                            Attacker Behavior Analysis
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                    
                        
                            
                            Ransomware Signature and Behavior Detection
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                
                    Cyber Intelligence
                    
                        
                            
                            Vulnerability Analysis and Remediation Recommendations
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                    
                        
                            
                            Security Issues Intelligence
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                    
                        
                            
                            Phishing analytics (over DMARC)
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                    
                
                    Risk Quantification
                    
                        
                    
                        
                    
                        
                    
                        
                            
                            General Organization Scoring
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                        
                    
                
                    Reporting & Analytics
                    
                        
                    
                        
                            
                            Scheduled Posture Monitoring Reports
                                
                            
                            
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                                
                                    
                                        
                                    
                                
                            
                         
                    
                
                    Business mode
                    
                        
                            
                            Key Performance Metrics for C-Suite