Feature: Mapping

External Attack Surface Management (EASM)

Identify your web-exposed assets to better focus on remediation by continuously monitoring for vulnerabilities, misconfigurations, and unauthorized changes, ensuring a proactive approach to security.

Request a demo

What is External Attack Surface Management (EASM)?

External Attack Surface Management (EASM) is a new emerging concept which provides a way to continuously discover, fingerprint and assess all your Internet exposed (external facing) assets that may lead to compromise or leak if misconfigured, unmanaged or unpatched.

When it is not done continuously, External Attack Surface Management (EASM) can sometimes be called: RECON, fingerprinting or digital footprint.

We do not sell EASM independently but we use it as a first step for our PTaaS.

Why doing External Attack Surface Management (EASM)?

External Attack Surface Management (EASM) brings you a continuously updated view of your Internet exposed (external facing) and the associated cybersecurity risks.

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” – Sun Tzu, The Art of War

Patrowl EASM use cases

External Attack Surface Management tool & platform (EASM)

With Patrowl’s EASM you can confirm the ownership of your asset and discover unmanaged assets, Shadow IT, Phishing websites mimicking your corporate visual identity, Counterfeiting e-market…

Monitor

continuously any changes on your external-facing asset.

Discover

and map your external-facing assets including Shadow IT, phishing websites being prepared and counterfeit

Analyze

continuously the assets attributes like exposed services, components versions… to evaluate the risk depending on the news, asset criticality and threat

Prioriser

and remediate the most critical vulnerabilities to reduce risk and strengthen the security of your external assets.

How does Patrowl's EASM differ from other solutions?

There is actually no solution that allows you to go as far as Patrowl’s External Attack Surface Management (EASM).

Traditionally, external-facing assets fingerprint or External Attack Surface Analysis are done once a year, unable to keep up with both your business creativity and its unpredictability.

What kind of assets can Patrowl work with?

Patrowl does External Attack Surface Management (EASM) based on several types of assets:

  • IP addresses / IP subnet

  • Autonomous System

  • DNS Zone / Domain name

  • Second level domain name

  • All types of DNS records (MX, SPF, DMARC, NS…)

  • FQDN / URL

  • Public cloud tenant / account / Email addresses

  • Keywords (company name, trademark, product name, chemical formula…)

How does Patrowl's EASM differ from other solutions?

There is actually no solution that allows you to go as far as Patrowl’s External Attack Surface Management (EASM).

Traditionally, external-facing assets fingerprint or External Attack Surface Analysis are done once a year, unable to keep up with both your business creativity and its unpredictability.

What kind of assets can Patrowl work with?

Patrowl does External Attack Surface Management (EASM) based on several types of assets:

  • IP addresses / IP subnet

  • Autonomous System

  • DNS Zone / Domain name

  • Second level domain name

  • All types of DNS records (MX, SPF, DMARC, NS…)

  • FQDN / URL

  • Public cloud tenant / account / Email addresses

  • Keywords (company name, trademark, product name, chemical formula…)

Your most frequently asked questions about EASM:

What types of components can EASM uncover?

External Attack Surface Management (EASM) can help you uncover many forgotten, abandoned, unmanaged, unpatched components... exposing data and your brand:

  • Websites

  • Web services and APIs

  • Remote access and VPN

  • File sharing

  • File storage

  • SaaS applications used for project management, testing, temporary promotions, etc.

  • Source code repository (leakage of credentials, secrets or exposed data)

What's the difference between EASM, CAASM and DRPS?

EASM (External Attack Surface Management) monitors external assets exposed to the Internet for vulnerabilities.

CAASM (Cyber Asset Attack Surface Management) provides a unified view of all internal and external assets, mapping their connections and assessing vulnerabilities in real time.

DRPS (Digital Risk Protection Services) protects against external digital threats by monitoring the dark web, social networks and other online sources for risks such as data leaks and phishing.