Platform
How it works
Watch a demo
Integrations
Products
CAASM: Asset Analysis
Continuous Controls Monitoring
Exposure Management
Resources
Resources
Case studies
Blog
Books & Reports
Events
Business case
ROI
Company
Company
About
Contact
Careers
Partners
Community
Community
Support
Questions library
Documentation
Sign In
Get a Demo
Thank you! Your submission has been received!
Please enter a valid email address
Glossary of terms
A
Access management
Asset analysis
Asset inventory
Attack surface analysis
Attack surface management
C
Cloud asset management
Cloud native cybersecurity
Configuration management database
Continuous controls monitoring (CCM)
Continuous threat exposure management (CTEM)
Critical assets
Crown jewels
Cyber asset attack surface management (CAASM)
Cyber asset management
Cyber assets
Cyber attack surface
Cyber hygiene
Cyber risk management
D
Data breach
E
EPSS
Exploitable vulnerabilities
External attack surface management (EASM)
G
Governance, risk, and compliance (GRC)
I
ISO 27001
Identity management
Internal attack surface
N
NIST
P
Privilege management
S
SOC 2
Security operations
Security posture
V
Vulnerability management
Z
Zero trust