Resources

Learn how Socotra used JupiterOne to achieve full asset visibility, streamline compliance, and secure operations during rapid growth and expansion.
- CAASM
- Compliance

An American financial services company achieves collaborative vulnerability management and asset management that actually works, using a risk-based approach to managing its asset ecosystem with a centralized view of its environment.
- Vuln Mgmt

Learn how Okta has turned security into a business enabler by bringing secure-by-design products to market quickly.
- IAM
- CAASM

Mercury Financial established complete cyber asset visibility across 130 integrations within one week.
- GRC
- CAASM
- Vuln Mgmt

With JupiterOne, Indeed gained a holistic view of all its asset relationships and attack surface alongside a broad cloud migration.
- CAASM
- Vuln Mgmt
- CSPM
- IR

Learn how LiveIntent uses JupiterOne daily to secure thousands of ephemeral devices and a highly dynamic workload in AWS.
- IR

See how Blend simplified a major acquisition, cyber asset management, and continuous compliance with the JupiterOne platform.
- CSPM

Auth0 achieved end-to-end cloud security. monitoring and a complete understanding of 3rd party risks using JupiterOne.
- SecOps
- IAM
- Vuln Mgmt

Learn how Codoxo became healthcare compliant in two months at a price point suitable to its business size and resources.
- GRC

Databricks deployed JupiterOne and started discovering critical data within an hour of deployment.
- IR
- Vuln Mgmt

Aver drastically reduced the time and effort to assemble detailed attack surface reports and complete post-breach analysis.
- CAASM

Gartner® latest report provides strategies to prioritize vulnerabilities and reduce exposures.
- CTEM
- Vuln Mgmt

Learn how JupiterOne's CTEM solution enhances cybersecurity with asset visibility, attack surface discovery, exposure prioritization, and automated responses.

Cyentia's "A Visual Exploration of Exploitation in the Wild" study covers insights for using EPSS data to manage and prioritize vulnerabilities in your environment.
- CTEM

The 2023 State of Cyber Assets Report revealed nearly 600% annual growth in vulnerable cloud attack surface and 133% growth in cyber assets over the 2022 report.

It’s not enough to "know" where all your assets are. Gaining ‘visibility’ when you don’t have the ability to act on it is pointless. Download this whitepaper to learn
- CAASM

In this paper from the JupiterOne research and development and data science teams, we'll discuss the early findings from our ongoing attack surface research, pose ope
- CAASM

JupiterOne commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may real
- SecOps
- CAASM
- CSPM
- IR

This 30 page research report details key cybersecurity coverage gaps and how organizations plan to improve their security posture. Download using the form below.
- CAASM
- SecOps

In this first-ever SCAR report, we analyzed over 370 million cyber assets, findings, and policies across almost 1,300 organizations to better understand today’s cyber
- CAASM

JupiterOne has partnered up with BreakFree Solutions, a leading provider of practical cloud, DevOps, and automation professional services to enterprise organizations.
- SecOps

These 6 steps and tactics will move you into the fast-lane when it comes to delivering better products by helping you create a DevSecOps culture.
- SecOps

Efficient security operations and prompt detection of breaches are critical for limiting the impact bad actors can have on your business. Download our ebook and learn
- CAASM

Whether you invest in tools to automate and accelerate the security review process or you do it manually, these 8 plays will help you methodically create and submit
- SecOps

In this workbook, we dive into each area to ensure your team is prepared for proactive security using a DevSecOps mindset. Then, our blueprint will help set the found
- SecOps

If one bad apple can spoil the entire bunch, do you analyze a subset of the bunch to find the bad apple, or do you look across the whole population? How might this
- SecOps

The digital age forced an evolution of the term "asset." Physical assets still exist, but cloud and digital transformation added complexity that extends beyond the
- CAASM

Enrique Salem, Partner at Bain Capital and JupiterOne CEO Erkang Zheng discuss best practices to approaching cybersecurity at board meetings based on years of experie
- SecOps

This collection of stories from experienced security leaders and practitioners details the major business problems they experienced when implementing cybersecurity
- CAASM
- SecOps

In this collection of stories, 19 cybersecurity experts offer a unique look at cybersecurity that addresses the technical, interpersonal, and strategic aspects of th
- CAASM
- SecOps
- CSPM

Written by Sounil Yu, and with forewords by security industry luminaries Dan Geer and Wendy Nather, the Cyber Defense Matrix eBook helps practitioners, vendors, and
- SecOps
- CAASM
- CSPM

In this webinar, we’ll discuss how CAASM provides crucial visibility and control over roles, permissions, and configurations.
- CAASM

Dive into Cyentia's latest research, covering limitations of traditional vuln management methods like CVSS, and providing insights on integrating EPSS into SecOps.
- CTEM

Sean Catlett and James Mountifield look at how organizations migrating to the cloud can use continuous compliance as an accelerator to the process.
- GRC

Lead researcher Jasmine Henry, along with Security Automation Architect Kenneth Kaye, will share the most surprising takeaways from this year’s State of Cyber Assets
- CAASM
- CSPM

The inaugural Cyber Defense Matrix Conference was held in February 2022 and featured a variety of presentations, case studies, and hands-on workshops.

The security awareness training market is expected to be worth over $10 billion annually by 2027. Does all of this spending translate into reduced risk, or does it re
- CAASM
- SecOps

In this virtual fireside chat, our guest Forrester Senior Analyst Erik Nost will join hosts Cisco Security Director of Product Crystal Storar, and JupiterOne CEO Erka
- CAASM
- IR
- Vuln Mgmt
- GRC

In this 2023 security predictions session, each panelist will present their #1 cybersecurity prediction for the coming year and defend their prediction to the group.

Policy-as-code is an essential step towards software-driven security governance. This approach is one of the most effective methods of managing the security and
- SecOps
- GRC

From his role advising various public and private boards, Enrique Salem, Partner at Bain Capital, has listened to his fair share of CISO discussions in the boardroom.
- SecOps

Learn how the Cyber Defense Matrix serves as an easy-to-memorize mental model that helps us navigate the cybersecurity technology landscape to find the capabilities
- CAASM
- SecOps

In this first ever SCAR report, we analyzed over 370 million cyber assets, findings, and policies across almost 1,300 organizations to gain a better understanding of
- CAASM

Sounil Yu and Aaron Jahoda discuss how to address modern security needs and build not a resilient, but an “antifragile” enterprise by implementing the DIE security mo
- SecOps

With a US economic recession looming, tech layoffs hitting the news, and security incidents continuing to climb at record rates, it’s a tough time to be a CISO.
- SecOps

Join Latha Maripuri, CISO at Uber, and Erkang Zheng, CEO and Founder at JupiterOne as they consider novel ways to attract, train, and retain talent as well as modern
- SecOps
- CAASM

Discover the most critical and exploitable vulnerabilities, prioritize with asset context based on business impact and receive a recommended remediation plan.
- CTEM

A unified view of all cyber assets, across cloud, on-premises, and hybrid environments. Map and visualize asset relationships to see vulnerabilities and their impact.
- CAASM

Getting the answers to key questions is one of the greatest challenges facing security, IT, and DevOps teams today. These questions can be answered using JupiterOne.
- CAASM
- SecOps
- GRC
- Vuln Mgmt
- IR

Learn how to put in place real security for your AWS environment, with minimal resources, to protect the confidentiality, integrity, availability and privacy
- SecOps

It’s not enough to "know" where all your assets are. Gaining ‘visibility’ when you don’t have the ability to act on it is pointless. Download this whitepaper to learn
- CAASM
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.