Sweepatic and Axonius integrate
Sweepatic is now available as an adapter in the integrations stack of the Axonius asset management platform.
Axonius is a cybersecurity platform aggregating and correlating asset data from existing solutions and providing an up-to-date inventory. Axonius added an integration of Sweepatic, using our API to securely fetch the data from the EASM Platform.
This Axonius connection is a great addition to the integrations we are continuously building. Recently we announced the option to directly create Jira tickets and ServiceNow incidents from the Sweepatic EASM Platform. Additionally, the Palo Alto Cortex XSOAR integration connects Sweepatic-discovered issues and misconfigurations with your orchestration platform.
Integration use case
Our customer Lineas requested a Sweepatic integration to be added in the Axonius catalogue. Their cybersecurity team considers the Sweepatic external attack surface data a key element in their larger attack surface management. Christophe Rome, CISO at Lineas:
“We use Axonius as our devices and asset database. A Sweepatic integration was very important to include all our internet-facing assets in our one source of truth. The detailed data Sweepatic provides is an integral part of our attack surface management.”
EASM and CAASM
The integration is an example of how External Attack Surface Management (EASM) and Cyber Asset Attack Surface Mangement (CAASM) help to get a clear view and grip on your organization’s attack surface.
What is the difference between EASM and CAASM?
Gartner defines EASM as follows: ‘External attack surface management refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated vulnerabilities’ (Source: Gartner, Hype Cycle for Security Operations, 2022).
CAASM on the other hand, ‘uses API integrations with existing tools to gain visibility across all organizations’ assets both internal and external, query consolidated data, identify the scope of vulnerabilities and gaps in security
controls, and remediate issues’ (Source: Gartner, Hype Cycle for Security Operations, 2022).
Both technologies help to get full visibility on all your internal and external assets and prevent cybercriminals from taking advantage of your vulnerable knowns and unknowns.
Request your personalized demo
Do you have an automatic and continuous way to discover all your online IT assets? Curious to see what your external attack surface looks like, including the unknowns? Request your free demo and find out about your attack surface up close!