One screen to monitor all areas of your external exposure
We’ve launched the new Attack Surface dashboard, a centralized summary of your exposure across five key solutions: EASM, XTRA, TPRM, CTI, and CSPM. This screen consolidates validated results from all scanners and gives you a clear, categorized view of the findings tied to each monitored domain.
What’s Included
Multi-Domain Overview View all your monitored domains grouped by attack surface category, with direct links to drill down into findings for each area.
EASM (External Attack Surface Management)
Metrics include related domains, discovered assets, assigned assets, WHOIS records, SSL certificates, IP addresses, and open ports.
Helps surface exposed infrastructure and overlooked external assets.
XTRA (Extended Threat Recon & Analysis) - New
Our latest addition focuses on phishing and impersonation threats.
Automatically classifies assets by intent: malicious, potentially malicious, unknown, or legitimate.
Designed to help teams track and respond to domain spoofing, impersonation, and phishing exposure more effectively.
TPRM (Third-Party Risk Management)
Aggregates scanner findings across vendor-owned domains.
Results are categorized by severity level to support vendor risk scoring and remediation tracking.
CTI & CSPM - Coming Soon
Why It Matters
This dashboard provides:
A single point of visibility for key exposure areas across your environment.
Better threat categorization and domain-level insights.
Faster access to the right screen for triage, validation, and response.
Playbooks Update
New conditions and actions for vector-based automation
We’ve expanded playbook automation options with more flexible logic for vectors. You can now trigger actions based on data from the Vector Analysis section and dynamically adjust vector priorities based on your internal policies.
What’s New
New condition for the following triggers:
Vector Created
Vector Status Changed
You can now define conditions based on attributes found in the Vector Analysis section (e.g., description, observed behaviors, or indicators).
New action:
Automatically change the priority of a vector when triggered, allowing you to align response urgency with threat context.