Asset Management Feature

Discover, Monitor, and Secure Your Assets

Automatically discover, import, or manually create assets to build a centralised, actionable view of your organisation’s infrastructure with our Asset Management tool.
See Plans & Pricing
Asset Management Feature hero image

Build an accurate inventory of your assets

Asset management is a critical area of any security program. It involves the discovery, import, and manual creation of assets to build a centralised, actionable view of your organisation’s infrastructure. This process enhances decision-making across your security operations.

Create and Manage Assets

Create and Manage Assets

Easily create and manage assets with detailed information about each asset, its impact on your organisation, and assign them to groups for easier management.

You can easily select the type of asset you want to create, such as a hostname, domain, or IP address.

See Assets at a Glance

See Assets at a Glance

The Assets page provides a view of all assets across your organisation. You can filter and sort assets by various criteria, such as type, group, and risk score, to easily identify high-value assets and potential risks.

View individual asset details, including associated vulnerabilities, risk scores, and contextual information.

Quickly manage your organisational assets, understand the security posture of each asset and make informed decisions about remediation efforts.

Actionable Insights

Actionable Insights

Gain actionable insights into your security operations with the asset inventory, enabling you to track vulnerabilities and prioritise remediation efforts based on the criticality of each asset.

Easily identify high-value assets, track vulnerabilities associated with specific assets, and prioritise remediation efforts based on the criticality of each asset.

Risk Scoring and Contextual Information

Risk Scoring and Contextual Information

The risk scoring system provides a clear understanding of the potential impact of your assets, allowing you to focus on the most critical issues first.

Risk scores are calculated based on various factors, including severity, impact, maximum severity, and maximum impact.

With this information we provide a normalised risk score that is easy to understand and prioritise. This risk score includes all vulnerabilities associated with each asset.

Automated Asset Discovery

Attack Surface Center provides automated asset discovery capabilities through DNS, WHOIS, and other sources, allowing you to quickly identify and import assets from various sources. This includes network devices, servers, applications, and cloud resources. By automating asset discovery, you can ensure that your asset inventory is always up-to-date and accurate.

This feature allows you to gather additional information about your assets without actively probing them, providing a more complete view of your infrastructure.

  • Subdomain Discovery: Automatically discover subdomains associated with your assets, helping you identify potential attack surfaces.
  • IP Address Enumeration: Gather information about IP addresses associated with your assets.
  • Domain email enumeration: Identify email addresses associated with your domains, which can be useful for social engineering assessments.
  • Email security checks: Perform security checks on domains to identify the presence of SPF, DKIM, and DMARC records, which can help prevent email spoofing and phishing attacks.
  • DNS Enumeration: Automatically gather DNS records associated with your assets, including A, CNAME, MX, and TXT records.
  • WHOIS Lookups: Retrieve WHOIS information for domains and IP addresses, including registration details and contact information.
  • Certificate Transparency: Identify new assets through analysis of public certificate transparency logs, which can reveal newly issued SSL/TLS certificates associated with your domains.

Import from External Sources

Consolidate asset information from multiple sources by importing assets from vulnerability scanners and other security tools. Our platform integrations also support AWS, GitHub, and other third-party services, allowing you to import assets directly from these platforms.

  • Vulnerability Scanners: Import assets from popular vulnerability scanners.
  • Custom Imports: Utilise our custom file format to import assets from any source, including spreadsheets and CSV files.

Ready to take control of your asset management?

Sign up to the Attack Surface Center today and experience the benefits of streamlined asset management and enhanced security operations.