Know Your Exposures and Remediate Fast with SET

Take control of your asset inventory with External Attack Surface Management (EASM) from BreachLock. Gain the insights and visibility you need to take to fully manage the risks to your externally exposed attack surface.

Schedule a Discovery Call
Hero image

See External Threats (SET) with BreachLock’s EASM platform

SET stands for ‘See External Threats’ and is BreachLock’s EASM platform that gives security leaders the immediate visibility and intelligence they need. Security leaders can now proactively and continuously scan the internet with SET to discover and protect their real-time asset inventory that can be ‘seen’ online by threat actors.

Your known and unknown Internet-scannable assets, web-facing applications, and external networks will now be visible to the CISO and Security Teams with SET.

  • Icon

    See your discoverable assets on the internet with Asset Discovery

  • See the total number of exposed assets and users
  • Track the geo-location and IP coordinates of your assets
  • Create your asset inventory for on-going asset security management
  • Understand your users’ dark web exposures
  • Icon

    External assets are inventoried for Attack Surface Management

  • Reduce external risks associated with preventable breaches
  • Remediate vulnerabilities with a DevSecOps approach
  • Eliminate breached passwords from your systems
  • Patch newly exposed vulnerabilities (i.e., zero-days)
  • Icon

    Threats are continuously discovered for Threat Monitoring

  • Scan continuously to monitor for new vulnerabilities
  • Report vulnerabilities discovered
  • Monitor results in customizable dashboard
  • Measure analytics with drag and drop widgets
  • 1-Click Sorting to archive an asset or investigate a false positive

Empowering Global Teams with Always-On Security

Journey from Start to Finish image
Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image Journey from Start to Finish image

Discover Known and Unknown Vulnerabilities

Whatever your organization has exposed to the internet can be ‘seen’ by cybercriminals.

However, managing the asset inventory in the modern security operations center is daunting. Unknown exposures and rogue assets exposed to the internet can get out of control and cause business-breaking data breaches. Hidden virtual machines, cloud applications, unmanaged microsites, and IoT may be connected to your perimeter or network and off your security team’s radar. These are the ‘unknowns’ that are not counted, not monitored, and exposed on the external web at any time.

SET changes the game on threat actors and now gives you complete visibility into your searchable asset inventory.

Icon

See What your Adversaries See, including:

  • Total number of assets by geo-target
  • Total number of vulnerabilities, along with a detailed vulnerability description and steps for remediation
  • Breached data of your users with active user passwords and credential access in your environment, including:
    • Real-time OSINT to identify and reset affected users with breached passwords and credentials online
    • A breach timeline illustrates when a user’s breached PII data first appeared online to investigate additional potential vulnerabilities and threats
Icon

Integrate Third Party Vulnerability Management

  • Check for known and unknown assets that have been discovered that are owned or connected to your organization via your digital supply chain and vendor management systems – including any third-party and fourth-party providers working with your organization that have reported data breaches.
  • Get updated fast when a provider reports a zero-day vulnerability, experiences a security event in the news, reports a breach, or issues a CVE.
Icon

DevSecOps Approach with an Attack Surface Management Platform

  • Today’s security teams need real-time visibility with automated web scanning capabilities to manage the risks from the known and the unknown. Yet, understanding the internet-facing exposures in external systems may be known or unknown to the SOC and DevOps teams – until now.
  • With SET, you can truly enable a DevSecOps approach with your teams as they gain that visibility with unparalleled reporting for continuous discovery and remediation of external vulnerabilities.

See your Asset Inventory Categorized in a Real-Time Dashboard

SET stands for ‘See External Threats’ and is BreachLock’s EASM platform that gives security leaders the immediate visibility and intelligence they need. Security leaders can now proactively and continuously scan the internet with SET to discover and protect their real-time asset inventory that can be ‘seen’ online by threat actors.

Your known and unknown Internet-scannable assets, web-facing applications, and external networks will now be visible to the CISO and Security Teams with SET.

Schedule a Discovery Call
  • Icon

    Sort All SET Discoveries

  • Total Assets under Your Organization
  • Credentials Breached
  • Vulnerability-to-Risk Analysis
  • Overall Risk
  • Services Exposed
  • Asset Location
  • Icon

    Assess Discovered Findings

  • Create your SET Asset Inventory
  • Reveal Credential Breaches in the Organization
  • Visualize Risk categories and Total Vulnerabilities
  • Visualize Overall Risk
  • See Exposed Services with details
  • See discovery locations for your asset inventory management
  • Icon

    Understand Total Risks

  • Total Number of Assets
  • Total Number of Credential Breaches
  • Total Number of vulnerabilities in the organization
  • Sortable Risks by Criticality
  • Scrollable list of exposed services under your organization by Count and Risk Category
  • Interactive World Map to identify the geo-location of where your assets are physically located, including countries

See Your Assets - Understand Your Exposures - Take Action

Icon

Know your External Exposures

  • See the summary of asset discovery to see what scans have revealed
  • See the summary of organization ASM that have been in the organization
  • See the functions the are available in the EASM SET platform
  • Check the assets that have been discovered, the vulnerabilities with these assets, and the data breaches for the organization
Icon

See Individual Asset Details

  • See how the assets are affected
  • See the detailed list of assets that have been found, including ASN, IP blocks, and IP addresses
  • Select and Mark as “False positive” or archive capabilities with description
  • See list of vulnerabilities that are in the organization and see the risk associated with each
Icon

Access Breach Data on the Internet and Dark Web

  • View the data breach intelligence discovered in OSINT for your domain(s) and see the users exposed
  • Get notified about your internal users, including passwords and credentials discovered in publicly available data dumps and breach data discovered on the dark web
Icon

Categorize Assets to Improve Vulnerability Management

  • Drill down to see contextual data on findings, including: Organization, Subsidiary Organization, Domains, Sub Domains, IP Blocks (including addresses and ranges), ASN, Mergers & Acquisition, Mobile App Finders, Certificates, and more

Get SET for an Advanced EASM Platform Solution

When you are ready to discover the power of the SET platform, your experts at BreachLock will demonstrate the capabilities of the purpose-built SET platform with embedded Attack Surface Management Software. This solution comprehensively covers the five elements for successful attack surface management.

Asset Discovery

After you are onboarded with BreachLock for attack surface management, you can launch SET easily and fast for your first asset discovery scan.

SET scans the internet for all externally facing digital assets that contain or process sensitive information related to your organization, such as your domain(s), DNS, IPs, PII, PHI, and regulated data. The assets can be owned or operated by your organization, or they may be operated by third parties, including cloud providers, IaaS, SaaS, business partners, suppliers, vendors, or external contractors.

Use initial findings revealed to document, investigate, and make a plan to remediate rogue assets posing critical risks to your perimeter.

See SET’s initial results in your Asset Discovery dashboard, including:

  • Your primary organization
  • Total number of your related organizations with ASN (autonomous system number)
  • Interactive charts with trends, data analysis, and detailed context
    • Total number of IP Blocks and IP ranges
    • Total number of IP Addresses
    • Total number of domains and sub domains
    • Real-time List of your asset inventory

Inventory and Classification

After your initial discoveries have been validated, SET organizes your assets into a validated asset inventory with designated classifications for comprehensive attack surface management and day-to-day security operations. Your assets are organized using the pre-defined and customizable categories in your Vulnerabilities dashboard:

  • Asset Type
  • Technical specifications and properties
  • Business criticality
  • Compliance requirements
  • Framework identification
  • Business Owner
  • Customizable tags for additional classifications

See Your Vulnerable Assets and URLs and Take Action

Review all your affected assets and URLs associated with each discovered vulnerability. Analyze the vulnerability’s full description and how many assets have been affected.

Drill further into remediation recommendations and extract raw JSON data for historical context and workflow management.

Risk and Criticality Scoring

SET’s Critical Risk Scoring methodology calculates OSINT, CVSS, and known breach data into an associated risk score for each asset. Using assigned criticality categories, security teams can quickly sort through vulnerabilities and assets to reveal the top priorities for DevSecOps rapid remediation.

SET risk scores help you understand:

  • The risks associated with your asset inventory, including emerging critical risks DevOps needs to prioritize for remediation
  • The context you need on recent data breaches, zero-day vulnerabilities, data leaks, and other cyberattacks
  • The full list of vulnerabilities discovered and asset inventory on your external attack surface by risk category and criticality

The full list of vulnerabilities discovered and asset inventory on your external attack surface by risk category and criticality

The risk associated with a zero-day vulnerability with an easy-to-replicate PoC will multiply significantly every hour that zero-day vulnerability is left undiscovered and unpatched. 

  1. SET gives you continuous security monitoring capabilities for always-on external attack surface management.
  2. SET scans and detects new vulnerabilities every day that are new to your environment, including emerging zero-day vulnerabilities, like log4j.
  3. SET alerts you and your team when new exposure has been confirmed on your attack surface.

Malicious Asset and Incident Monitoring

Asset and data exposures – especially accidental exposures and publicly harvested data dumps – are the unknowns that CISOs and Security Leaders must proactively discover with an EASM platform to protect and defend their environments.

The SET platform gives Security Leaders the capabilities to orchestrate continuous DevSecOps identification and remediation workflows to stop preventable breaches from impacting the Security Operations Center and damaging the business.

Breached Credential Monitoring

Breached credentials are a risk as users notoriously reuse passwords and credentials for personal and business life. These breached credentials remain visible on the Internet long after they are initially compromised. Left exposed, this data could be further exploited through an exposed vector on your attack surface. SET gives you the OSINT to get the credentials refreshed and replaced before that happens.

With SET scanning your environment’s dynamically expanding attack surface, you can quickly identify when there are leaked employee credentials on the internet. This OSINT gives you the ability to manage the risks that a cybercriminal may use to impersonate one of your users with harvested credentials and/or stolen passwords to gain unauthorized access to your assets, network, and data.

See Your External Attack Surface with SET for EASM with Breachlock

Gain the visibility you need to see the risk exposures in your environment and take remediation action now with External Attack Management (EASM) from BreachLock’s SET platform.

SET is easy-to-use and streamlined for a complete EASM platform with advanced vulnerability scanning that helps you discover and identify the assets and vulnerabilities you have within your scanned environment – giving you real-time visibility to critical risks and exposures that you may have been unaware of before.

Today’s security leaders considering EASM need to take action to protect and defend their systems, users, and environment. Rogue assets – whether they are deployed by under-pressure in-house developers or an existential threat, such as a cyber criminal impersonating a CEO in a deepfake phishing campaign, today’s threat landscape is full of cybercriminals actively scanning the internet, looking for new targets.

Your SET EASM platform provides the actionable visibility you need to manage your externally exposed assets along with vulnerability management in a simple, easy, and streamlined UI.

Hero image Hero image Hero image Hero image Hero image

Asset Discovery

After you are onboarded with BreachLock for attack surface management, you can launch SET easily and fast for your first asset discovery scan.

SET scans the internet for all externally facing digital assets that contain or process sensitive information related to your organization, such as your domain(s), DNS, IPs, PII, PHI, and regulated data. The assets can be owned or operated by your organization, or they may be operated by third parties, including cloud providers, IaaS, SaaS, business partners, suppliers, vendors, or external contractors.

Use initial findings revealed to document, investigate, and make a plan to remediate rogue assets posing critical risks to your perimeter.

See SET’s initial results in your Asset Discovery dashboard, including:

  • Your primary organization
  • Total number of your related organizations with ASN (autonomous system number)
  • Interactive charts with trends, data analysis, and detailed context
    • Total number of IP Blocks and IP ranges
    • Total number of IP Addresses
    • Total number of domains and sub domains
    • Real-time List of your asset inventory
Hero image

Inventory and Classification

After validating your initial discoveries, SET organizes your assets into a validated asset inventory with designated classifications for comprehensive attack surface management and day-to-day security operations. Your assets are organized using the pre-defined and customizable categories in your Vulnerabilities dashboard:

  • Asset Type
  • Technical specifications and properties
  • Business criticality
  • Compliance requirements
  • Framework identification
  • Business Owner
  • Customizable tags for additional classifications

See your Vulnerable Assets and URLs and Take Action

Review all your affected assets and URLs associated with each discovered vulnerability. Analyze the vulnerability’s full description and the impacted assets.

Drill further into remediation recommendations and extract raw JSON data for historical context and workflow management.

Hero image

Risk and Criticality Scoring

SET’s Critical Risk Scoring methodology calculates OSINT, CVSS, and known breach data into an associated risk score for each asset. Security teams can quickly sort through vulnerabilities and assets using assigned criticality categories to reveal the top priorities for DevSecOps rapid remediation.

SET risk scores help you understand:

  • The risks associated with your asset inventory, including emerging critical risks DevOps needs to prioritize for remediation
  • The context you need on recent data breaches, zero-day vulnerabilities, data leaks, and other cyberattacks
  • The complete list of vulnerabilities discovered and asset inventory on your external attack surface by risk category and criticality

The full list of vulnerabilities discovered and asset inventory on your external attack surface by risk category and criticality

The risk associated with a zero-day vulnerability with an easy-to-replicate PoC will multiply significantly every hour that zero-day vulnerability is undiscovered and unpatched. 

  1. SET gives you continuous security monitoring capabilities for always-on external attack surface management.
  2. SET scans and detects new vulnerabilities every day that are new to your environment, including emerging zero-day vulnerabilities, like log4j.
  3. SET alerts you and your team when new exposure has been confirmed on your attack surface.
Hero image

Malicious Asset and Incident Monitoring

Asset and data exposures – especially accidental exposures and publicly harvested data dumps – are the unknowns that CISOs and Security Leaders must proactively discover with an EASM platform to protect and defend their environments.

The SET platform gives Security Leaders the capabilities to orchestrate continuous DevSecOps identification and remediation workflows to stop preventable breaches from impacting the Security Operations Center and damaging the business.

Breached Credential Monitoring

Breached credentials are risky as users notoriously reuse passwords and credentials for personal and business life. These breached credentials remain visible on the Internet long after being compromised. Left exposed, this data could be further exploited through an exposed vector on your attack surface. SET gives you the OSINT to get the credentials refreshed and replaced before that happens.

With SET scanning your environment’s dynamically expanding attack surface, you can quickly identify when there are leaked employee credentials on the Internet. This OSINT allows you to manage the risks that a cybercriminal may use to impersonate one of your users with harvested credentials and/or stolen passwords to gain unauthorized access to your assets, network, and data.

Hero image

See Your External Attack Surface with SET for EASM with Breachlock

Gain the visibility you need to see the risk exposures in your environment and take remediation action now with External Attack Management (EASM) from BreachLock’s SET platform.

SET is easy-to-use and streamlined for a complete EASM platform with advanced vulnerability scanning that helps you discover and identify the assets and vulnerabilities you have within your scanned environment – giving you real-time visibility to critical risks and exposures that you may have been unaware of before.

Today’s security leaders considering EASM need to take action to protect and defend their systems, users, and environment. Rogue assets – whether deployed by under-pressure in-house developers or an existential threat, such as a cybercriminal impersonating a CEO in a deep fake phishing campaign, today’s threat landscape is full of cybercriminals actively scanning the internet, looking for new targets.

Your SET EASM platform provides the actionable visibility you need to manage your externally exposed assets and vulnerability management in a simple, easy, and streamlined UI.

Hero image

Eliminate Exposures with SET, BreachLock’s world-class EASM Platform

Security Leaders, the SOC, and DevOps can take prioritize findings for rapid remediation of the most critical external vulnerabilities that SET reveals. Your SET platform for EASM scans external surfaces for vulnerabilities, assets, URLs, and user data, including deep and dark web scans, to reveal any user credential risks with third-party compromises or data breaches.

Continuously see your assets that comprise your external attack surface organized inside the SET dashboard with the following key metrics and performance indicators:

  • Total Discovered Assets
  • Asset Geo-Location
  • Credentials Breach
  • Total Vulnerabilities
  • Overall Risk
  • Risk to Vulnerability Bar Graph
  • Services Exposed
Hero image

Start your PenTest Journey with BreachLock

Ready to find and fix your next cyber breach before it happens? We’re ready when you are.