CYSR's Attack Perimeter feature begins by identifying the company's domain and then locating its entire attack surface, including assets that are visible from the outside, such as websites, IPs, mail servers, networks, and ASNs. In addition, it analyzes the presence of company information on the darkweb and in data leaks and represents all of this information in a comprehensive graph that summarizes the company's attack perimeter.
Our analysis is extremely detailed, and for each asset, we extract a wide range of information, including:
This feature of CYSR allows for a comprehensive understanding of the company's exposure to cyber risks, and makes it possible to take proactive measures to protect the organization. The analysis is regularly updated, typically on a weekly or daily basis depending on the needs of the organization.