Professional Documents
Culture Documents
ATTACK SURFACE
F-Secure Radar - Vulnerability risk management
ADVERSARIES DONT NEED MANY VULNERABILITIES
ONE IS ENOUGH.
Every 90 minutes
a new security vulnerability is identified That is an average of 7 vulnerabilities
per asset across a typical IT environment
8000
50-300
known and disclosed vulnerabilities
known and disclosed vulnerabilities each year critical vulnerabilities
exploitable depending on industry
2
VULNERABILITIES AND THEIR EXPLOITATION ARE STILL
THE ROOT CAUSE OF MOST BREACHES
Only constant scanning and ruthless control can help you find
vulnerabilities before anyone does.
3
MANAGE
BUSINESS-CRITICAL VULNERABILITIES
1 2
F-Secure Radar is a turnkey, enterprise- MAP THE TOPOLOGY OF THE WEB DISCOVER NETWORK ASSETS
grade vulnerability scanning and discover your external global digital Map all assets on the application layer
management platform. presence
4
WHAT IS YOUR IDENTIFY AND EXPOSE
ATTACK SURFACE? THE POSSIBLE THREATS
The best threat response is to predict and map Radar can generate a threat assessment report of your organizations
your cyber security threats. No other technology Internet and web topology, giving your security team incomparable
visibility and foresight into cyber security risks.
does that better than vulnerability management.
F-Secure Radar identifies your organizations assets where they are
An organizations attack surface crosses all network infrastructures, vulnerable. You can minimize your attack surface while reducing
software, and web applications internally and in the global Internet. risk.
It includes an understanding of all points of interaction.
With F-Secure Radar, your IT security team maps your organisations
Information security managers need to be able to approach attack surface in the aggregate of:
vulnerability assessment from several perspectives in order to
get an accurate assessment of risks, minimize security threats, all known, unknown, and potential vulnerabilities critical to
and maintain compliance. business
controls across all software, hardware, firmware, and
Unlike any other vulnerability solution on the market, F-Secure networks
Radar features web topology mapping, which is the arrangement shadow IT, external misconfigured systems, malware
of a network, including its nodes and connecting lines.In other websites, website-linked hosts
words, Radar allows you to easily browse through all targets to partner and contractor security entropy
quickly identify and expand the possible attack surface. brand infringements and phishing
5
THE REAL RADAR VULNERABILITY
ATTACK SURFACE RISK MANAGEMENT
TT A
E MALW AC
AC ESS
ES AR KS
RF SIN EA
BU ND
SU
UF
R P Comprehensive visibility
NE
CK
RA
HI
RT
TA
CE
Effective security mapping through precise discovery and mapping
SH
PA
AT
IN
BLE
G
of all assets, systems, and applications on the network and beyond.
ERA
VULN
EM ENTS
E-Commerce Development Quickly address problems across multiple domains with an efficient
service workflow, including vulnerability monitoring, automated
FRIN G
scheduled scans, and ticketing for prioritized remediation and
SHA
M IS
CO
TS
FI R
N
AN
W
GU PO
RA
IT
BR
N
TIO N OPE
S Reporting on risk
E
AC
AT
EX
CK NS
TA
TER
SU
SU NAL TIO CK
M ISC O N FIG U RA security posture over time. Show and justify how IT security enables
RF TA
AC AT
E business continuity.
6
LEAVE IT TO US.
RADAR-AS-A-MANAGED-SERVICE
Focus on your business and outsource vulnerability management to the security experts.
F-Secure offers a cost-efficient service tailored to your needs. We and our selected, dedicated partners can help remediate any situation.
In the case you have resource gaps such as: In the case you have information gaps such as:
7
ABOUT F-SECURE
f-secure.com/radar
8