Resources

Get the latest thoughts from analysts and JupiterOne Champions on how to level up your security program.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
June 4, 2025
Case Study
Zephyr AI Overcomes Compliance Hurdles, Achieves Drastic Audit Efficiency

Cut audit prep time from months to days and achieve continuous compliance with real customer-proven results.

  • Compliance
  • CAASM
May 6, 2025
Case Study
EagleView Maps Risk and Identity Across the Cloud with JupiterOne

Discover how EagleView streamlined cloud security, improved identity risk management, and boosted cybersecurity maturity by 150% using JupiterOne’s CAASM platform.

  • CAASM
  • CSPM
March 6, 2025
Case Study
How Mirriad Strengthened Security and Compliance to Support Business Growth

Mirriad improved security, compliance, and efficiency with JupiterOne, gaining real-time visibility and automation to scale with top media partners.

  • CAASM
  • Asset Management
  • Vuln Management
January 14, 2025
Case Study
Achieving Full Asset Visibility: How Socotra Gained Control Over a Growing and Complex Inventory

Learn how Socotra used JupiterOne to achieve full asset visibility, streamline compliance, and secure operations during rapid growth and expansion.

  • CAASM
  • Compliance
American Financial Services Company achieves actionability across vulnerabilities and assets with JupiterOne
May 31, 2024
Case Study
An American Financial Services Company achieves actionability across vulnerabilities and assets with JupiterOne

An American financial services company achieves collaborative vulnerability management and asset management that actually works, using a risk-based approach to managing its asset ecosystem with a centralized view of its environment.

  • Vuln Mgmt
Okta Customer Identity Cloud transforms security into a business enabler
June 16, 2023
Case Study
Okta Customer Identity Cloud transforms security into a business enabler

Learn how Okta has turned security into a business enabler by bringing secure-by-design products to market quickly.

  • IAM
  • CAASM
Mercury® Financial tackles complexity with a single source of truth
March 7, 2023
Case Study
Mercury Financial tackles complexity with a single source of truth

Mercury Financial established complete cyber asset visibility across 130 integrations within one week.

  • GRC
  • CAASM
  • Vuln Mgmt
Indeed securely transitions to AWS with JupiterOne
November 28, 2022
Case Study
Indeed securely transitions to AWS with JupiterOne

With JupiterOne, Indeed gained a holistic view of all its asset relationships and attack surface alongside a broad cloud migration.

  • CAASM
  • Vuln Mgmt
  • CSPM
  • IR
LiveIntent secures thousands of ephemeral devices daily with JupiterOne
September 19, 2022
Case Study
LiveIntent secures thousands of ephemeral devices daily with JupiterOne

Learn how LiveIntent uses JupiterOne daily to secure thousands of ephemeral devices and a highly dynamic workload in AWS.

  • IR
Blend Case Study
August 1, 2022
Case Study
Blend simplifies major acquisition and continuous compliance with JupiterOne

See how Blend simplified a major acquisition, cyber asset management, and continuous compliance with the JupiterOne platform.

  • CSPM
Auth0 improves SecOps capability with JupiterOne
July 6, 2022
Case Study
Auth0 improves SecOps capability with JupiterOne

Auth0 achieved end-to-end cloud security. monitoring and a complete understanding of 3rd party risks using JupiterOne.

  • SecOps
  • IAM
  • Vuln Mgmt
Codoxo tackles compliance on a tight budget
May 5, 2022
Case Study
Codoxo tackles compliance on a tight budget

Learn how Codoxo became healthcare compliant in two months at a price point suitable to its business size and resources.

  • GRC
How Databricks achieved greater asset visibility
April 28, 2022
Case Study
How Databricks achieved greater asset visibility

Databricks deployed JupiterOne and started discovering critical data within an hour of deployment.

  • IR
  • Vuln Mgmt
How Aver achieves streamlined, reliable threat modeling
March 23, 2022
Case Study
How Aver achieves streamlined, reliable threat modeling

Aver drastically reduced the time and effort to assemble detailed attack surface reports and complete post-breach analysis.

  • CAASM
Gartner's 'How to Grow Vulnerability Management Into Exposure Management' report cover
December 17, 2024
Report & eBook
Report
Gartner® How to Grow Vulnerability Management Into Exposure Management

Gartner® latest report provides strategies to prioritize vulnerabilities and reduce exposures.

  • CTEM
  • Vuln Mgmt
October 9, 2024
Report & eBook
Report
Continuous Threat Exposure Management Whitepaper

Learn how JupiterOne's CTEM solution enhances cybersecurity with asset visibility, attack surface discovery, exposure prioritization, and automated responses.

July 30, 2024
Report & eBook
Report
Cyentia Institute’s "A Visual Exploration of Exploitation in the Wild"

Cyentia's "A Visual Exploration of Exploitation in the Wild" study covers insights for using EPSS data to manage and prioritize vulnerabilities in your environment.

  • CTEM
2023 State of Cyber Assets Report
April 12, 2023
Report & eBook
Report
The 2023 State of Cyber Assets Report

The 2023 State of Cyber Assets Report revealed nearly 600% annual growth in vulnerable cloud attack surface and 133% growth in cyber assets over the 2022 report.

Modern Visibility for Cybersecurity and IT Asset Management
May 3, 2021
Report & eBook
Report
Modern Visibility for Cybersecurity and IT Asset Management

It’s not enough to "know" where all your assets are. Gaining ‘visibility’ when you don’t have the ability to act on it is pointless. Download this whitepaper to learn

  • CAASM
A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface
October 27, 2022
Report & eBook
Report
A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface

In this paper from the JupiterOne research and development and data science teams, we'll discuss the early findings from our ongoing attack surface research, pose ope

  • CAASM
318% ROI and a Reduced Attack Surface: The Total Economic Impact of JupiterOne
January 26, 2023
Report & eBook
Report
332% ROI and a Reduced Attack Surface: The Total Economic Impact of JupiterOne

JupiterOne commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may real

  • SecOps
  • CAASM
  • CSPM
  • IR
Security Hygiene and Posture Management Survey, 2021
November 1, 2021
Report & eBook
Report
Security Hygiene and Posture Management Survey, 2021

This 30 page research report details key cybersecurity coverage gaps and how organizations plan to improve their security posture. Download using the form below.

  • CAASM
  • SecOps
The 2022 State of Cyber Assets Report
April 1, 2022
Report & eBook
Report
The 2022 State of Cyber Assets Report

In this first-ever SCAR report, we analyzed over 370 million cyber assets, findings, and policies across almost 1,300 organizations to better understand today’s cyber

  • CAASM
High-Velocity Cloud Security at Scale
July 1, 2020
Report & eBook
eBook
High-Velocity Cloud Security at Scale

JupiterOne has partnered up with BreakFree Solutions, a leading provider of practical cloud, DevOps, and automation professional services to enterprise organizations.

  • SecOps
6 Steps to Creating a DevSecOps Culture
September 1, 2020
Report & eBook
eBook
6 Steps to Creating a DevSecOps Culture

These 6 steps and tactics will move you into the fast-lane when it comes to delivering better products by helping you create a DevSecOps culture.

  • SecOps
Gain Visibility Into Your Environment
November 1, 2020
Report & eBook
eBook
Gain Visibility Into Your Environment

Efficient security operations and prompt detection of breaches are critical for limiting the impact bad actors can have on your business. Download our ebook and learn

  • CAASM
Security Review Playbook
December 1, 2020
Report & eBook
eBook
Security Review Playbook

Whether you invest in tools to automate and accelerate the security review process or you do it manually, these 8 plays will help you methodically create and submit

  • SecOps
SaaS Security Program Blueprint
February 1, 2021
Report & eBook
eBook
SaaS Security Program Blueprint

In this workbook, we dive into each area to ensure your team is prepared for proactive security using a DevSecOps mindset. Then, our blueprint will help set the found

  • SecOps
Sampling vs Population Based Analysis for Security
May 1, 2021
Report & eBook
eBook
Sampling vs Population Based Analysis for Security

If one bad apple can spoil the entire bunch, do you analyze a subset of the bunch to find the bad apple, or do you look across the whole population? How might this

  • SecOps
The IT Asset Revolution
July 1, 2021
Report & eBook
eBook
The IT Asset Revolution

The digital age forced an evolution of the term "asset." Physical assets still exist, but cloud and digital transformation added complexity that extends beyond the

  • CAASM
Boardroom Conversations on Security
August 23, 2021
Report & eBook
eBook
Boardroom Conversations on Security

Enrique Salem, Partner at Bain Capital and JupiterOne CEO Erkang Zheng discuss best practices to approaching cybersecurity at board meetings based on years of experie

  • SecOps
Modern Cybersecurity: Tales from the Near-Distant Future
December 9, 2021
Report & eBook
eBook
Modern Cybersecurity: Tales from the Near-Distant Future

This collection of stories from experienced security leaders and practitioners details the major business problems they experienced when implementing cybersecurity

  • CAASM
  • SecOps
Reinventing Cybersecurity
May 3, 2022
Report & eBook
eBook
Reinventing Cybersecurity

In this collection of stories, 19 cybersecurity experts offer a unique look at cybersecurity that addresses the technical, interpersonal, and strategic aspects of th

  • CAASM
  • SecOps
  • CSPM
The Cyber Defense Matrix
February 10, 2022
Report & eBook
eBook
The Cyber Defense Matrix

Written by Sounil Yu, and with forewords by security industry luminaries Dan Geer and Wendy Nather, the Cyber Defense Matrix eBook helps practitioners, vendors, and

  • SecOps
  • CAASM
  • CSPM
Video & Webinar
Video
What's New in JupiterOne - July Edition

Join us for What's New in JupiterOne: July Edition to explore the latest features, updates, and enhancements to maximize your platform value.

Video & Webinar
Video
JupiterOne Query Language J1QL Deep Dive

Stay ahead in cyber asset security—join our webinar for a deep dive into J1QL, JupiterOne’s powerful query language for graph-based data insights.

Video & Webinar
Video
JupiterOne What's New - June Edition

Join us for What's New in JupiterOne: June Edition to explore the latest features, updates, and enhancements to maximize your platform value.

Video & Webinar
Video
JupiterOne Cross Account Trust in AWS

Explore how to detect risky AWS trust relationships using JupiterOne’s Insights, Questions & Alerts in this 45-min focused webinar.

Video & Webinar
Video
JupiterOne Alerts Deep Dive

Explore JupiterOne Alerts: overview, configuration tips, and a live demo of using Alert Rules to streamline vulnerability discovery and triage.

Video & Webinar
Video
Product Roadmap 2025 Webinar

Join us for an exclusive customer webinar as we share JupiterOne’s 2025 product roadmap and our strategic vision for the future of cyber asset visibility and security

Video & Webinar
Video
Getting the Most from JupiterOne Without Knowing J1QL

Learn to use JupiterOne’s UI, dashboards, and automation—no J1QL expertise needed. Get insights fast with built-in tools and zero coding.

Video & Webinar
Video
Addressing Cloud Permissions with CAASM

Learn how CAASM helps prevent privilege risks by mapping cloud permissions, roles, and misconfigs across dynamic environments.

Video & Webinar
Video
Device and Config Management Use Case

Gain full asset visibility to streamline device management, improve hygiene, and close critical security gaps.

Video & Webinar
Video
Unlocking the Value of JupiterOne with MCP

Use JupiterOne MCP Server to turn natural language into insights and unify your security data—no coding required.

Sorry, but no items could be found.
July 1, 2024
This is some text inside of a div block.
Datasheet
Continuous Threat Exposure Management Solution Brief

Discover the most critical and exploitable vulnerabilities, prioritize with asset context based on business impact and receive a recommended remediation plan.

  • CTEM
July 1, 2024
This is some text inside of a div block.
Datasheet
Cyber Asset Attack Surface Management Solution Brief

A unified view of all cyber assets, across cloud, on-premises, and hybrid environments. Map and visualize asset relationships to see vulnerabilities and their impact.

  • CAASM
The Business Case for JupiterOne
May 3, 2023
This is some text inside of a div block.
Whitepaper
The Business Case for JupiterOne

Getting the answers to key questions is one of the greatest challenges facing security, IT, and DevOps teams today. These questions can be answered using JupiterOne.

  • CAASM
  • SecOps
  • GRC
  • Vuln Mgmt
  • IR
Build a Virtually Air-gapped Secure Environment in AWS
February 16, 2021
This is some text inside of a div block.
Whitepaper
Build a Virtually Air-gapped Secure Environment in AWS

Learn how to put in place real security for your AWS environment, with minimal resources, to protect the confidentiality, integrity, availability and privacy

  • SecOps
Modern Visibility for Cybersecurity and IT Asset Management
May 3, 2021
This is some text inside of a div block.
Whitepaper
Modern Visibility for Cybersecurity and IT Asset Management

It’s not enough to "know" where all your assets are. Gaining ‘visibility’ when you don’t have the ability to act on it is pointless. Download this whitepaper to learn

  • CAASM
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.