Black-Box Reconnaissance: Any ASM solution must automatically discover the external assets an attacker can see – this includes IPv4, IPv6, Cloud, and IoT Assets. Unlike asset management solutions, there should be no need to provide IP address ranges or other asset information to get started. Your domain name should be sufficient. Randori’s patented center-of-mass approach finds assets others miss and starts with only an email.
Continuous Monitoring: Your attack surface is dynamic; your ASM solution must be too. Assets come and go; ASM solutions must continuously monitor and track these changes and quickly alert users when a critical issue is found. Randori’s global network of dynamic cloud infrastructure is constantly monitoring to provide you the most authentic view of your external attack surface.
Shadow IT Discovery: Gartner estimates 1/3 of breaches will start with unknown assets. ASM solutions should make it easy to identify any assets you were not previously aware of by integrating with asset management solutions and supporting policy-driven rule & prioritization workflows. Randori’s rich integrations and policy-driven rules engine make it easy to automate the discovery of Shadow IT.
Risk-Based Prioritization: Not all assets have the same value to your organization or attackers. Any ASM should automatically provide an external threat assessment, identifying the most tempting issues to attackers. Leading ASM solutions go further, giving users rich capabilities for real-time risk-based prioritization. Randori’s prioritization engine combines the attacker’s perspective with business value, business impact, existing security controls, and remediation status to build a stack-ranked list of your most risky targets.
Bi-Directional API & Enterprise Integrations: Leveraged by vulnerability management, threat intelligence, and security operations teams, ASM solutions must enable teams to integrate into their daily workflows. Bi-directional APIs and the ability to integrate with SIEM, SOAR, asset management, and ticketing systems are critically important. Randori’s REST API and integration ecosystem make it easy to embed the attacker’s perspective.