Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Bringing External Attack Surface Management to the Masses with Bit Discovery

Bringing External Attack Surface Management to the Masses with Bit Discovery

External Attack Surface Management (EASM) is an essential foundation of cybersecurity best practices. Soon, you’ll be able to take advantage of automated attack surface discovery in Tenable products.

Visibility remains at the heart of cybersecurity today. Full and complete visibility — of assets, data, exposures, privileges, threats — is essential in order to adequately defend against adversaries and cyber criminals. There is a reason why the first two controls in the CIS Controls and the first Framework Core Function in the NIST Cybersecurity Framework call out inventory and identification as critical functions of cybersecurity best practices. It isn’t hyperbole to state that nearly all security controls and best practices hinge on visibility in order to be effective.

This insight isn’t necessarily new to many of our readers. We at Tenable have been discussing the importance of comprehensive visibility for many years, since effective vulnerability management is also highly dependent on it. Yet, full asset visibility remains one of cybersecurity’s most elusive goals and organizations’ Achilles’ heel. Consider these recent examples:

The reality is that gaining comprehensive visibility and discovering all assets across the attack surface is challenging. Many assets are highly dynamic and ephemeral in the era of cloud, which means they can be difficult to detect using traditional scanning. New asset deployments are becoming decentralized with many application and development teams across different business units and subsidiaries spinning up their own cloud workloads and web applications without informing their cybersecurity teams. Mergers and acquisitions create even more challenges as the parent organization often has limited visibility into the acquired company’s external attack surface. And there is tremendous asset sprawl with many assets outliving their initial use and running without ongoing upkeep or lifecycle management. The result is that many organizations can only see a fraction of their digital footprint, leading to significant blind spots and pockets of cyber risk.

Visibility = External Attack Surface Management + Risk-based VM

External Attack Surface Management (EASM) is becoming an essential cybersecurity technology to help organizations discover internet-facing assets and resources, providing an outside-in perspective of probable entry points. EASM solutions scan the internet to create an inventory of internet-accessible assets and then map relationships between those assets and the organizations that own them. When combined with Risk-based Vulnerability Management, EASM dramatically improves visibility for cybersecurity teams so they can begin to assess previously unknown assets for cyber risks. And these aren’t just any old assets — EASM focuses on internet-facing assets that could also be targeted by cybercriminals and be leveraged as an entry point in the attack path.

This is one of the many reasons why Tenable acquired Bit Discovery. We believe every organization needs to have full visibility into their assets, especially internet-facing ones, to fully understand where, exactly, they might be exposed. Bit Discovery has built one of the largest attack surface maps in the world using 500 data sources to identify more than 5 billion assets. Their technology combines IP addresses, hostnames, ports, website URLs, WHOIS records, Autonomous System Numbers (ASN) data, and much more, to discover assets and help security teams establish their complete digital footprint in just a few minutes. And automation allows security teams to not only enumerate known assets, but continuously discover unknown assets every 24 hours. 

However, Bit Discovery goes beyond providing automated external asset discovery. It also provides extensive context and attribution details for each asset with over 150 metadata fields such as CMS type, TLS certificate status, geo-IP physical location, and cloud or CDN provider. This additional context is critical for helping cybersecurity teams determine asset criticality, identify asset ownership and help make more informed decisions based on potential exposure.

Now we can help you know what you own, what’s running — and what shouldn’t be running — to reduce your cyber risk.

Bringing EASM to the masses

As a result of this acquisition, Tenable will be incorporating Bit Discovery capabilities across our product portfolio. Our goal is to ensure all of our 40,000 customers have access to and deploy this technology to dramatically improve visibility and reduce cyber risk. Bit Discovery will help Tenable customers get the context of potential attack paths from external systems to critical assets throughout their organization, providing the most complete measure of their overall exposure.

We’re excited to announce that we’re integrating key Bit Discovery functionality — at no additional cost — into Tenable.io, Tenable.sc and Tenable.ep. Starting in early Q3, customers will have the ability to launch a new attack surface discovery scan that refreshes each quarter to provide visibility into all internet-facing assets owned by an organization.

We have also announced today a new offering, Tenable.asm, that will provide the full breadth of Bit Discovery capabilities, including additional context and attribution information of exposed assets and continuous monitoring of the constantly changing external attack surface. Tenable.asm will be an add-on solution to Tenable.io, Tenable.sc and Tenable.ep, and will be available in early Q3 for purchase. 

Join us at RSA Conference 2022!

If you’re attending RSA Conference 2022, please stop by booth #6245 at the North Expo to learn more about Bit Discovery and our upcoming product integrations. 

Stay tuned for more information in the coming weeks. We’ll be providing additional product details in upcoming Tenable webinars, Tenable Community posts and Tenable Product Education videos.

Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today.

NEW - Nessus Expert Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Professional Trial.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable.io Vulnerability Management trial also includes Tenable Lumin, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now

Try Tenable.io Web Application Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web Application Scanning trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.cs Cloud Security.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable.io Container Security

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Try Tenable Lumin

Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable.io Vulnerability Management, Tenable.io Web Application Scanning and Tenable.cs Cloud Security.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable.cs

Enjoy full access to detect and fix cloud infrastructure misconfigurations and view runtime vulnerabilities. Sign up for your free trial now. To learn more about the trial process click here.

Your Tenable.cs Cloud Security trial also includes Tenable.io Vulnerability Management, Tenable Lumin and Tenable.io Web Application Scanning.

Contact a Sales Rep to Buy Tenable.cs

Contact a Sales Representative to learn more about Tenable.cs Cloud Security and see how easy it is to onboard your cloud accounts and get visibility into both cloud misconfigurations and vulnerabilities within minutes.

Try Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training