{"id":20695,"date":"2024-10-10T13:12:00","date_gmt":"2024-10-10T11:12:00","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=20695"},"modified":"2024-10-10T14:03:28","modified_gmt":"2024-10-10T12:03:28","slug":"external-attack-surface-management","status":"publish","type":"page","link":"https:\/\/sertalink.com\/nl\/external-attack-surface-management\/","title":{"rendered":"External Attack Surface Management"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.27.0&#8243; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;||||true|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\" style=\"text-align: center;\">\n<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\">\n<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\">\n<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\">\n<div class=\"cmp-title mt-5\">\n<div class=\"hero__title\">\n<div class=\"hero__title\">\n<h1 class=\"heading heading--with-underline heading__without-link\" style=\"text-align: left;\">External Attack Surface Management<\/h1>\n<\/div>\n<div class=\"body-text\">\n<p style=\"text-align: left;\">Get the full lay of the land with Bitsight\u2019s External Attack Surface Management (EASM) capabilities. See what you\u2019re up against across the expanding attack surface. Prioritize what matters most. And mitigate where you\u2019re most vulnerable.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/www.bitsight.com\/get-free-attack-surface-report&#8221; button_text=&#8221;Get your custom attack surface analysis&#8221; button_alignment=&#8221;left&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/www.bitsight.com\/sites\/default\/files\/2023\/07\/26\/EASM%20Hero%20V3.svg&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f0efe9&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<h1><strong>Instant<\/strong><\/h1>\n<p><strong>visibility into your external attack surface\u2014mapped from day one<\/strong><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<h1><strong>10,000+<\/strong><\/h1>\n<p><strong>Common Vulnerabilities and Exposures (CVEs) tracked every day<\/strong><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#ffffff&#8221; custom_padding=&#8221;20px|20px|20px|20px|true|true&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<h1><strong>9<\/strong><\/h1>\n<p><strong>patents for the way Bitsight attributes infrastructure<\/strong><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.27.0&#8243; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;||||true|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.bitsight.com\/sites\/default\/files\/2023\/07\/24\/Hosting%20Providers.svg&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\" style=\"text-align: center;\">\n<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\">\n<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\">\n<div class=\"MuiChip-root MuiChip-filled MuiChip-sizeMedium MuiChip-colorDefault MuiChip-filledDefault css-168ggg3-MuiChip-root-HeroSubpage-styledChip\">\n<div class=\"cmp-title mt-5\">\n<div class=\"hero__title\">\n<div class=\"hero__title\">\n<div class=\"card__heading\">\n<h2 class=\"heading card__title heading__without-link\" style=\"text-align: left;\">See what an attacker sees.<\/h2>\n<\/div>\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<p style=\"text-align: left;\">Your attack surface may be quickly expanding, but that doesn\u2019t mean your exposure has to. Security leaders harness the power of Bitsight\u2019s EASM capabilities to keep track of countless digital assets &#8211; like operational technology (OT) and cloud infrastructure &#8211; at any given moment.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.27.0&#8243; background_enable_color=&#8221;off&#8221; background_enable_image=&#8221;off&#8221; custom_margin=&#8221;||||true|true&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"icon-grid__title\">\n<h2 class=\"heading heading__without-link\">Know that your attack surface is covered.<\/h2>\n<\/div>\n<div class=\"icon-grid__description\">\n<div class=\"body-text\">\n<p>Fix immediate exposure issues while keeping an eye on what\u2019s new in your company. And get to the root cause of EASM issues so you don\u2019t see repeat problems. Now that\u2019s long-term success.<\/p>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; background_enable_color=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h3>Manage exposure<br \/>\u2014proactively.\u00a0<\/h3>\n<p>Cut the risk of cyber attacks and keep your security posture strong.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h3>Get more<br \/>efficient.<\/h3>\n<p>Asset discovery, risk analysis, and remediation suggestions\u2014automatically.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h3>Build the right<br \/>reputation.<\/h3>\n<p>Protect your brand by preventing breaches and service disruptions.<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h3>Respond<br \/>faster.<\/h3>\n<p>Don\u2019t get caught off guard by new vulnerabilities. Act on exposure issues before attackers do.<\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#303030&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"quote__cite-text\">\n<div class=\"quote__cite-name\">\n<div class=\"quote__cite-text\">\n<h3 class=\"quote__cite-name\"><span style=\"color: #ffffff;\"><strong>James Arden<\/strong><\/span><\/h3>\n<div class=\"quote__cite-job\"><span style=\"color: #ffffff;\">Advisory and Assurance Manager, RBC Brewin Dolphin<\/span><\/div>\n<\/div>\n<div class=\"quote__cite-media\">\n<article class=\"media media--type-image media--view-mode-medium\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/medium\/public\/2023\/04\/18\/rbc-white-min.png?itok=t3RtPpJW\" width=\"220\" height=\"65\" alt=\"RBC\" loading=\"lazy\" typeof=\"foaf:Image\" class=\"image-style-medium\" \/><\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<blockquote>\n<p><span style=\"color: #ffffff;\"><strong>With hundreds of thousands of assets on the internet and cloud instances being spun up every day, we needed visibility into where cybersecurity falls short\u2014and Bitsight delivers that. You can&#8217;t reduce the cyber risks faced by your organization if you don&#8217;t know what you&#8217;re up against\u2014both internally and across your vendor portfolio.<\/strong><\/span><\/p>\n<\/blockquote>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h2 class=\"heading heading--with-underline heading__without-link\">Holistic external attack surface management solutions\u2014at scale.<\/h2>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_tabs _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_tab title=&#8221;Map your company&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"col-sm-12 order-12 col-md-5 order-md-0 cylance-mod-tab1__text-content\">\n<div class=\"cylance-mod-tab1__content\">\n<div class=\"cylance-mod-tab1__text-container\">\n<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\">\n<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/2023\/07\/24\/Geographical.svg\" alt=\"EASM Geo\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"card__content\">\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<h3>Discover &amp; classify your assets.<\/h3>\n<p>Take stock of your cyber assets and know how they impact you\u2014with your organization mapped from day one. See your digital footprint from a 10,000-foot view, down to individual details of each asset.<\/p>\n<ul>\n<li>Continuously monitor assets to see what\u2019s changing and where you might be exposed<\/li>\n<li>See your digital footprint based on the combination of automation and human annotation<\/li>\n<li>Built on Bitsight\u2019s 9 patents of attributing infrastructure.<\/li>\n<\/ul>\n<p><strong><a data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"36593ac2-fadf-4d2a-b1eb-35870d388de7\" href=\"https:\/\/www.bitsight.com\/blog\/reflect-your-security-posture-more-accurately-bitsight-ratings-tree\">See how you can organize your footprint<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_tab][et_pb_tab title=&#8221;See your exposure&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"col-sm-12 order-12 col-md-5 order-md-0 cylance-mod-tab1__text-content\">\n<div class=\"cylance-mod-tab1__content\">\n<div class=\"cylance-mod-tab1__text-container\">\n<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/2023\/07\/24\/Hosting%20Providers.svg\" alt=\"EASM Hosting Providers\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"card__content\">\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<h3>Analyze your exposure.<\/h3>\n<p>See your attack surface the way an attacker does\u2014where you\u2019re most exposed and vulnerable. Build your view based on exposure data from vulnerabilities, operational technology (OT), user behavior, compromised systems, public disclosures, and configurations across email, software, and the web.<\/p>\n<ul>\n<li>Gather insights on your entire infrastructure\u2014with minimal work<\/li>\n<li>Drill-down into areas that matter most to you, like subsidiary, geography, or technology.<\/li>\n<li>See what\u2019s lurking in shadow IT<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_tab][et_pb_tab title=&#8221;Respond to vulnerabilities&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"col-sm-12 order-12 col-md-5 order-md-0 cylance-mod-tab1__text-content\">\n<div class=\"cylance-mod-tab1__content\">\n<div class=\"cylance-mod-tab1__text-container\">\n<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/2023\/07\/24\/Vulnerability%20Detection.svg\" alt=\"EASM Vulnerability Detection\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"card__content\">\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<h3>Respond quickly to vulnerabilities.<\/h3>\n<p>There are thousands of known vulnerabilities in the world. Make sure you\u2019re protected from them. Get a full view of your exposure across the extended enterprise when a new vulnerability pops up.<\/p>\n<ul>\n<li>Quickly understand your external exposure<\/li>\n<li>Prioritize vulnerabilities based on how severe they are<\/li>\n<li>Focus resources on what matters most<\/li>\n<\/ul>\n<p><strong><a data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"a882b148-ca34-43e7-9caf-89dce0f75250\" href=\"https:\/\/www.bitsight.com\/blog\/third-party-vulnerability-response\">See vulnerability detection &amp; response<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_tab][et_pb_tab title=&#8221;Remediate problems&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card__media\">\n<div class=\"media-wrapper\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/2023\/07\/24\/Control%20Insights.svg\" alt=\"EASM Control Insights\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/div>\n<\/article>\n<\/div>\n<\/div>\n<div class=\"card__content\">\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<h3>Get to the root cause.<\/h3>\n<p>Stop fixing the same findings over and over again. Continuously assess how effective your security controls are to get better at preventing cyber attacks and scaling efforts.<\/p>\n<ul>\n<li>Set processes that can scale with your team<\/li>\n<li>See how your controls are working so you don\u2019t keep experiencing the same problems over again.<\/li>\n<li>Prioritize and communicate performance to stakeholders<\/li>\n<\/ul>\n<p><strong><a data-entity-substitution=\"canonical\" data-entity-type=\"node\" data-entity-uuid=\"98aa3975-8f17-4d28-94a6-effa887bcafe\" href=\"https:\/\/www.bitsight.com\/blog\/continuous-controls-monitoring-control-insights\">No more whac-a-mole with issues<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_tab][\/et_pb_tabs][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card__heading\">\n<h2 class=\"heading card__title heading__without-link\">Extend Attack Surface Visibility to AWS, GCP, and Azure<\/h2>\n<\/div>\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<ul>\n<li><strong>Multi-Cloud Support<\/strong>: Extend visibility across all major cloud providers, including AWS, Azure, and GCP.\u00a0<\/li>\n<li><strong>Streamlined Setup &amp; Control<\/strong>: Easy configuration in 15 minutes, with complete scope control.\u00a0<\/li>\n<li><strong>Enhanced Security Insights<\/strong>: Synchronize public IP addresses 4+ per day, enhancing the accuracy and breadth of risk assessments and Bitsight ratings.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.bitsight.com\/blog\/extend-attack-surface-visibility-aws-gcp-and-azure-bitsight\">Learn more here<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/card_media\/public\/2024\/07\/15\/Image%201.png?itok=c7QA4HqE&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"icon-grid__title\">\n<h2 class=\"heading heading__without-link\">See our certified EASM partners<\/h2>\n<\/div>\n<div class=\"icon-grid__description\">\n<div class=\"body-text\">\n<p>Integrate with workflow tools to assign and track remediation across teams and report on external attack surface management insights.<\/p>\n<p><a href=\"https:\/\/www.bitsight.com\/products\/spm-integrations#contact\">Contact us about these integrations<\/a><\/p>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_3&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card-icon__logo\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2022\/06\/30\/servicenow%20logo.webp?itok=uOSyfX0G\" alt=\"servicenow logo\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card-icon__heading\">\n<div class=\"card-icon__title-cell\">\n<div class=\"card-icon__title\">\n<h4 class=\"heading heading__without-link\" aria-level=\"3\">ServiceNow (SNOW)<\/h4>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"card-icon__content\">\n<div class=\"card-icon__text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n\nLevel up remediation workflows in Security Incident Response (SIR) by pulling in compromised systems data from Bitsight. Leverage Bitsight findings data for triage, analysis and remediation workflow in SNOW.\n\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_3&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card-icon__logo\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/02\/01\/palo-alto-cortex-logo.webp?itok=D2CTm07l\" alt=\"palo alto cortex logo\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card-icon__heading\">\n<div class=\"card-icon__title-cell\">\n<div class=\"card-icon__title\">\n<h4 class=\"heading heading__without-link\">Palo Alto Cortex<\/h4>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"card-icon__content\">\n<div class=\"card-icon__text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n\nImprove incident creation and workflows with Bitsight data, enabling filtering by Findings Severity, Asset category, Findings Grade, and Risk Vector.\n\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_3&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card-icon__logo\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/02\/01\/splunk-logo-2.webp?itok=KGitHhEr\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card-icon__heading\">\n<div class=\"card-icon__title-cell\">\n<div class=\"card-icon__title\">\n<h4 class=\"heading heading__without-link\">Splunk<\/h4>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"card-icon__content\">\n<div class=\"card-icon__text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n\nCorrelate security data and create rules and workflows in Splunk with Bitsight data.\n\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; column_structure=&#8221;1_4,1_4,1_4,1_4&#8243;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card-icon__logo\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/02\/01\/powerbi-logo-2.webp?itok=9ODiKPsc\" alt=\"powerbi-logo-2\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card-icon__heading\">\n<div class=\"card-icon__title-cell\">\n<div class=\"card-icon__title\">\n<h4 class=\"heading heading__without-link\">Microsoft PowerBI<\/h4>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"card-icon__content\">\n<div class=\"card-icon__text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n\nGain further analysis, reporting, and dashboard creation with Bitsight data.\n\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card-icon__logo\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/02\/01\/Ms-sentinel-logo.webp?itok=z0do80LG\" sizes=\"auto, 100vw\" width=\"220\" height=\"165\" alt=\"Ms sentinel logo\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card-icon__heading\">\n<div class=\"card-icon__title-cell\">\n<div class=\"card-icon__title\">\n<h4 class=\"heading heading__without-link\">Microsoft Sentinel<\/h4>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"card-icon__content\">\n<div class=\"card-icon__text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n\nCorrelate security data, create rules and workflows, display data in a graphical view, and create alerts that are translated into incidents with Bitsight data.\n\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_4&#8243; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; theme_builder_area=&#8221;post_content&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/card_media\/public\/tabs-03.png?itok=UUCQktq9&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card__heading\">\n<h2 class=\"heading card__title heading__without-link\">Extend EASM capabilities to your third-party network.<\/h2>\n<\/div>\n<div class=\"card__summary\">\n<div class=\"body-text\">\n<div class=\"clearfix text-formatted field field--name-field-summary field--type-text-long field--label-hidden field__item\">\n<p>Work with vendors without working with their vulnerabilities. Use the same detailed attack surface data you have on your own ecosystem and share it with critical vendors to expedite remediation of their vulnerable areas.<\/p>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][et_pb_button button_text=&#8221;See vulnerability detection &#038; response&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; theme_builder_area=&#8221;post_content&#8221; button_url=&#8221;https:\/\/www.bitsight.com\/vulnerability-detection-response&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; background_color=&#8221;#303030&#8243; sticky_enabled=&#8221;0&#8243; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<p class=\"eyebrow\"><span style=\"color: #ffffff;\">External Attack Surface Management<\/span><\/p>\n<div class=\"text-wysiwyg\">\n<div class=\"text-wysiwyg__title\">\n<h2 class=\"heading featured-title heading__without-link\"><span style=\"color: #ffffff;\">EASM Resources<\/span><\/h2>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"card-header imageCard-header\">\n<div class=\"card-header--title h3 text-left\">\n<div class=\"card__media\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2023\/09\/28\/EASM-datasheet-cover.webp?itok=l6z7CXzX\" sizes=\"auto, 100vw\" width=\"220\" height=\"145\" alt=\"Bitsight EASM datasheet cover\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<h4 class=\"heading heading__with-link\" aria-level=\"3\"><a href=\"https:\/\/www.bitsight.com\/resources\/bitsight-external-attack-surface-management-data-sheet\" class=\"heading--link\">Bitsight External Attack Surface Management (Data Sheet)<\/a><\/h4>\n<div class=\"card__button\"><a href=\"https:\/\/www.bitsight.com\/resources\/bitsight-external-attack-surface-management-data-sheet\" class=\"button button--transparent\" aria-label=\"Bitsight External Attack Surface Management (Data Sheet)\">Download now<\/a><\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"card-header imageCard-header\">\n<div class=\"card-header--title h3 text-left\">\n<div class=\"card-header imageCard-header\">\n<div class=\"card-header--title h3 text-left\">\n<div class=\"card__media\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/03\/27\/Best%20Practices%20For%20Implementing%20External%20Attack%20Surface%20Management.webp?itok=d-MqEb62\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<h4 class=\"heading heading__with-link\"><a href=\"https:\/\/www.bitsight.com\/resources\/forrester-report-best-practices-implementing-external-attack-surface-management\" class=\"heading--link\">Forrester Report: Best Practices For Implementing External Attack Surface Management (EASM)<\/a><\/h4>\n<div class=\"card__button\"><a href=\"https:\/\/www.bitsight.com\/resources\/forrester-report-best-practices-implementing-external-attack-surface-management\" class=\"button button--transparent\" aria-label=\"Forrester Report: Best Practices For Implementing External Attack Surface Management (EASM)\">Download now<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<div class=\"featured-resources__card\">\n<div class=\"card-content\">\n<div class=\"card__media\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/09\/23\/Bitsight%20CTEM%20Impact%20Paper_Final.webp?itok=Opn7M713\" sizes=\"auto, 100vw\" width=\"220\" height=\"145\" alt=\"Bitsight CTEM Impact Paper\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card__arrow\"><span class=\"card__arrow-content\">NEW!<\/span><\/div>\n<h4 class=\"heading heading__with-link\"><a href=\"https:\/\/www.bitsight.com\/resources\/start-deploying-continuous-threat-exposure-management-ctem\" class=\"heading--link\">Start Deploying Continuous Threat Exposure Management (CTEM)<\/a><\/h4>\n<div class=\"card__button\"><a href=\"https:\/\/www.bitsight.com\/resources\/start-deploying-continuous-threat-exposure-management-ctem\" class=\"button button--transparent\" aria-label=\"Start Deploying Continuous Threat Exposure Management (CTEM)\">Download now<\/a><\/div>\n<\/div>\n<\/div>\n<div class=\"featured-resources__card\">\n<div class=\"card-content\">\n<div class=\"card__media\"><\/div>\n<\/div>\n<\/div>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"card__media\">\n<article class=\"media media--type-image media--view-mode-full\">\n<div class=\"field field--name-field-image field--type-image field--label-hidden field__item\"><picture><img decoding=\"async\" src=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/16_9_large_2x\/public\/2024\/10\/03\/Building%20Better%20Visibility%20into%20Manufacturing%20Cybersecurity%20Programs.webp?itok=n0ZY3wYk\" sizes=\"auto, 100vw\" width=\"220\" height=\"145\" alt=\"Building Better Visibility into Manufacturing Cybersecurity Programs\" loading=\"lazy\" typeof=\"foaf:Image\" \/><\/picture><\/div>\n<\/article><\/div>\n<div class=\"card__arrow\"><span class=\"card__arrow-content\">NEW!<\/span><\/div>\n<h4 class=\"heading heading__with-link\"><a href=\"https:\/\/www.bitsight.com\/resources\/boost-your-cyber-visibility-securing-manufacturings-future\" class=\"heading--link\">Boost Your Cyber Visibility: Securing Manufacturing&#8217;s Future<\/a><\/h4>\n<div class=\"card__button\"><a href=\"https:\/\/www.bitsight.com\/resources\/boost-your-cyber-visibility-securing-manufacturings-future\" class=\"button button--transparent\" aria-label=\"Boost Your Cyber Visibility: Securing Manufacturing's Future\">Download now<\/a><\/div>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<h2 class=\"field field--name-field-title field--type-string field--label-hidden field__item\">FAQs: What is attack surface management?<\/h2>\n<section itemscope=\"\" itemtype=\"https:\/\/schema.org\/FAQPage\" class=\"accordion__wrapper\">\n<div class=\"field field--name-field-accordion-item field--type-entity-reference-revisions field--label-hidden field__items\">\n<div class=\"field__item clearfix\">\n<article class=\"accordion\">\n<div itemscope=\"\" itemprop=\"mainEntity\" itemtype=\"https:\/\/schema.org\/Question\"><\/div>\n<\/article>\n<\/div>\n<\/div>\n<\/section>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221;][et_pb_column _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243;][et_pb_accordion _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_accordion_item title=&#8221;What is an attack surface?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;on&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">In cybersecurity, an attack surface is the collection of physical or digital points within an IT network where malicious actors may exploit vulnerabilities to gain unauthorized access to a system. Attack surfaces include endpoint devices and users along with vulnerabilities within software and connected hardware.<\/div>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is attack surface management?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">Attack surface management is the practice of visualizing an IT environment as well as the vulnerabilities within it and taking steps to mitigate vulnerabilities, eliminate human error and establish security controls to protect the network.<\/div>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is an external cybersecurity threat?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">External cybersecurity threats to your infrastructure are simply cyber-related intrusions from outside an organization. These include threats like hacking, malware, ransomware, phishing, DDoS attacks, and espionage, specifically targeting the digital systems of critical infrastructure.<\/div>\n<\/div>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is an attack surface analysis?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">Attack surface analysis is the process of identifying and evaluating all potential points of entry or vulnerability within a system, network, or application that could be exploited by an attacker. It involves examining the various components, interfaces, and interactions of the system to understand its exposure to potential threats.<\/div>\n<\/div>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is a cyber asset?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">A cyber asset refers to any digital resource, component, or entity within an organization&#8217;s information technology infrastructure that is essential for the operation, management, or security of its systems and data. This can include hardware, software, networks, databases, applications, and information assets.<\/div>\n<\/div>\n<\/div>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is asset inventory in cybersecurity?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">Asset inventory in cybersecurity involves creating and maintaining a comprehensive catalog or database of all the digital assets within an organization&#8217;s IT environment. This includes hardware devices, software applications, data repositories, network resources, and other components. Asset inventory is crucial for effective cybersecurity management, as it helps organizations identify and prioritize security measures and assess their overall risk exposure.<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_accordion_item][et_pb_accordion_item title=&#8221;What is attack surface discovery?&#8221; _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; open=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">\n<div class=\"field field--name-field-title field--type-string field--label-hidden field__item\">Attack surface discovery is the initial phase of assessing and mapping out the various elements and entry points that comprise an organization&#8217;s attack surface. This process involves identifying all potential vulnerabilities, weak spots, and exposure points within the system, network, or application. Attack surface discovery is essential for understanding the scope and complexity of potential threats and for developing effective security strategies and defenses.<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section]","protected":false},"excerpt":{"rendered":"<p>External Attack Surface Management Get the full lay of the land with Bitsight\u2019s External Attack Surface Management (EASM) capabilities. See what you\u2019re up against across the expanding attack surface. Prioritize what matters most. And mitigate where you\u2019re most vulnerable. Instant visibility into your external attack surface\u2014mapped from day one10,000+ Common Vulnerabilities and Exposures (CVEs) tracked [&hellip;]<\/p>","protected":false},"author":29,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:divi\/placeholder \/-->","_et_gb_content_width":"","footnotes":""},"class_list":["post-20695","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>External Attack Surface Management | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/nl\/external-attack-surface-management\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"External Attack Surface Management | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/nl\/external-attack-surface-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-10T12:03:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/medium\/public\/2023\/04\/18\/rbc-white-min.png?itok=t3RtPpJW\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/nl\/#website\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/nl\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#primaryimage\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/www.bitsight.com\/sites\/default\/files\/styles\/medium\/public\/2023\/04\/18\/rbc-white-min.png?itok=t3RtPpJW\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#webpage\",\"url\":\"https:\/\/sertalink.com\/external-attack-surface-management\/\",\"name\":\"External Attack Surface Management | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#primaryimage\"},\"datePublished\":\"2024-10-10T11:12:00+00:00\",\"dateModified\":\"2024-10-10T12:03:28+00:00\",\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/external-attack-surface-management\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/external-attack-surface-management\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgium\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/20695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/comments?post=20695"}],"version-history":[{"count":10,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/20695\/revisions"}],"predecessor-version":[{"id":20713,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/20695\/revisions\/20713"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/media?parent=20695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}