Maturity is assessed against 8 criteria

 

Asset Visibility

Discovery of all assets across your organization’s extended attack surface: IT, OT, IoT, cloud, identities and applications.

Prioritization

Identification of priority exposures through the application of technical and business context.

Risk Detection

Identification of all preventable forms of risk: vulnerabilities, misconfigurations and excessive permissions.

People  |  Process

Defined roles, dedicated resources and integrated processes to support cross-domain functions. 

Data Consolidation

Aggregation, deduplication and normalization of data from disparate tools in a single data lake.

Mobilization

Targeted and efficient remediation actions using integrated and automated workflows.

Scoring Methodology

Establishment of a robust and consistent scoring methodology across risk types and attack surfaces.

Metrics  |  Reporting

Effective tracking, communication and reporting of  key performance indicators and compliance.