A VM’s Guide to Attack Surface Management

Insights for Vulnerability Managers on Their ASM Journey

The idea of attack surface management (ASM) is not new, but how organizations and vulnerability managers (VMs) view their attack surfaces should be updated. Traditionally, IT has looked at an organization’s attack surface from the inside out, asking questions like, “What are the assets that connect to the wider internet?” and “What are our mean times to detect and respond?”

VMs should be looking from the outside in, asking questions like, “How many unknown assets are connected to my network?” and “What is my mean time to inventory every asset that can put my organization at risk?”

Download this guide to understand how:

  • Traditional methods of asset inventory are slow, manual and error-prone
  • ASM processes can help reduce a VM’s workload
  • To tackle security issues, such as exposed remote access protocols and expired certificates
Download Whitepaper

    In alignment with General Data Regulation (GDPR) guidelines we are asking for your permission to stay in touch. Please opt-in to ensure you can have access to the latest Palo Alto news, activities and insights.