Epiphany Intelligence Platform Overview
The Epiphany Intelligence Platform is a cybersecurity exposure management system that helps organizations understand the risks that can cause a material impact. In other words, it helps stop an attacker before it reaches a critical system. At its core, Epiphany helps organizations to:
Understand what is possible for the attacker.
Detect exploitable conditions within the environment.
Prioritize exposures for remediation.
Prevent material impacts.
An organization’s exposure has attributes that can be measured by a technical system, which is why measuring exposure attributes is the method preferred by Epiphany. These measurable attributes are:
Scope. What, or how many things are exposed because of the exposure. For example, the number of systems.
Cause. What technical condition is creating the exposure? For example, a misconfiguration or vulnerability.
Impact. What will occur if the attacker successfully uses this path? For example, a critical server is compromised.
Resistance. How difficult is it for the attacker to carry out the attack? This is the amount of effort that is required to start or continue the attack.
Epiphany uses these attributes to prioritize the actions you can take as an organization to protect the organization in the most impactful way.
The Big Picture
Epiphany's tools provide:
Good coverage around security (security controls, points of friction).
A point-in-time of the state of privileged access and boundaries (identity).
Network access and traffic flow boundaries (network).
Baselines around the current state of vulnerability.
These things solve problems in their lane but do not work together to provide you with a true picture of your biggest risk. Epiphany aggregates data across these and other sources, performs analysis using its revolutionary artificial intelligence and methodologies to give your teams the ability to:
Assess material risk.
Prioritize remediation of issues.
Monitor and gain visibility of changes to security posture due to ever constant changes in environments.
Consolidate and validate data from across multiple data sources (providing a source of truth).
This guide will show you how to perform the steps necessary to carry out the objectives to minimize your risk.
Epiphany's Solutions
Epiphany includes a number of solutions to help you monitor and address your data security concerns.
Consolidated Asset Inventory
Epiphany uses normalization features to consolidate data across multiple sources to provide a more comprehensive picture of all assets. While this is not meant to be a configuration management database, it provides you a single source where inventory can be validated and queried.
Rogue System Detection
Ensuring that the security and management controls you have invested in are deployed successfully is a difficult and moving target. Rogue system detection leverages normalized data across integration points to identify systems that do not have the necessary agents.
Search and Exploration
As a data aggregator, Epiphany provides you the ability to ask questions and gain insights across all your different data sets. This is unlike traditional inventory search features in that it will allow you to search against the complete dataset. For example, you may be able to identify user accounts with weak passwords or systems with vulnerabilities, but it is not as easy (or possible) to identify systems used by users with weak passwords that are a part of a specific business impact matrix. Traditionally, this required cross referencing data and custom developed systems.
Prioritized Attack Paths
Epiphany uses algorithms to identify the areas of material risk, then prioritizes them based on several factors such as exploitability and how important the attacker’s objective is to the critical function of the organization.
Remediation Steps
In addition to prioritizing the risks to an organization, several remediation recommendations are provided along attack paths. Your team can take targeted action with minimal investment in timely investigation on how to fix the problems.
Critical Asset Classification
To ensure that you are focusing on the most dangerous risks to your organization, you need context. Epiphany allows organizations to group and categorize systems based on their functions within the business, criticality, and relationships to each other. This is then used to alter the focus of the path optimization algorithms to account for assets deemed important to your business.
Organizational Vulnerability
Epiphany highlights the prioritization of your vulnerabilities by outlining the number of vulnerabilities found in your organization, then showing you the vulnerabilities that need to be addressed to mitigate the material risks found in attack paths. This operates as a continuous, prioritized working list for those responsible for managing vulnerabilities.
Ticket Tracking
Ephipany has a ticket system you use to assign tasks to people. It includes a dashboard you can use to see the number of open tickets by priority, type, or status, along with a wealth of other information to help you understand and manage your organization's activity.
Dashboards
Epiphany gives you a quick and easy view into your organization’s most dangerous risks and vulnerabilities using dashboards. You can create dashboards by selecting from Epiphany’s large collection of dashboard components to create a customized view into the risk information that’s most important to you and your organization. To see the dashboard components, see the section Dashboards in Epiphany Tools.
Last updated