Edge Expander discovers all of your public-facing network edge assets, understands where they are and what risks they pose, and tracks successful remediation of their edge exposures. This provides an accurate, real-time picture of customers’ dynamic, global network footprint. Edge Expander combines mapping across IPv4-wide active sensing (port scan) data with global DNS, all registration records, and CDN data. Edge Expander data sources are “best-of-breed” to deliver a current, accurate, and complete knowledge of the customer’s global attack surface.
Edge Behavior provides instant analysis of your network edge communications. Discover hidden communication in network edge flow data without the burdens of collection or costly infrastructure. Edge Behavior cuts through massive amounts of flow data noise to identify systems that are making risky connections to out-of-policy services like Tor and BitTorrent. It sees communications to C&C servers—even through obfuscated access points. Behavior shows you where your network policy gaps are and helps you keep them closed.
Investigate potentially malicious network behaviors beyond your firewall.
Expanse provides rapid analytical support to defensive threat hunt and incident response missions, producing actionable leads based on minimal initial indicators of compromise or digital signatures. We start with trace evidence – even a solitary fact – and build associations between that evidence and all other Expanse data across the global Internet. This includes device identity, configuration, and related flows.
Threat Hunt assistance includes:
Protect your supply chain, weapons systems, Programs of Record, and strategic industry partners.
Federal department and agencies are partnering with strategic suppliers without having full visibility into the supplier’s transitive cybersecurity risks. A Strategic Supplier Diligence assessment from Expanse can ensure that federal operational, policy, and compliance leaders have an accurate and current understanding of their strategic industry partners, context behind evaluations of supplier security and their specific risks, an improved security ecosystem through escalation of identified security risks with the suppliers, and complete visibility into the organization’s Internet Edge.
Strategic Supplier Diligence reports illuminate: