
1 minute read
■ Intro
from Sunmap eBook Design
Society is becoming increasingly connected via digital technologies, resulting in the exponential growth of opportunities and efficiency for companies. However, this rapid growth means cyber security practitioners need to manage a massive surge in the numbers of assets and vulnerabilities, forcing them to make security trade-offs.
The goal to be 100% secure against cybersecurity threats is an unattainable benchmark. Instead, we believe that security should be seen as a gauge where securing the first 95% takes much less time and effort than securing the last 5%. SunMap focuses on impact first: securing the riskiest vulnerabilities and sustaining this protection level. Then companies should set strategies to counter-attack quickly once breaches happen. Our teams therefore produce agile, scalable and efficient platform that continually seek to address the core problem of every security strategy:
Advertisement
What is my complete attack surface? What do my attackers see? What are the consequences if this asset is compromised? How can I remedy this?
SunMap has been designed to set the foundation of strong security strategies, by providing actionable cyber insights on assets and vulnerabilities, simply and efficiently.
 Discover every asset in real time to eliminate all your blind spots.
 Access an unified view of all your assets with comprehensive context in real time.  Detect, prioritize and quickly remediate cyber exposure by utilizing the attacker’s mindset.
 Customize and share dashboards/reports across the company to ensure compliance.
SunMap’s platform is plug and play, fully agentless, doesn’t require any passwords, and stores data on-premises. Our platform provides you with an easy to use, massively scalable and secure experience.
SUNMAP | 4
Discover Map Assess Monitor
þ Continuous asset discovery þ Complete and live asset inventory þ Internal vulnerability management
þ CMDB/IPAM sync þ Asset profiling þ External vulnerability management
þ Intelligent scan scheduler þ Asset tagging þ Compliance
þ Optimized scoping þ Certificates þ Remediation project
þ Live and customizable
Dashboard
þ Reporting
Scan techniques ō Active ō Passive ō Pre scan
Environments ō On premise ō Endpoints ō Public ō Container ō Cloud
Characteristic ō Plug and play ō Agentless ō Credential less
SUNMAP | 5