Technical Analysis
Epiphany use cases fall into five categories. They are summarized below, with more detail in the next sections.
Epiphany Workflows
The workflows in the Technical Analysis section will give you a better understanding of how Epiphany functions and how to approach your exposure management challenges.
These workflows are focused on these areas:
Creating an Analysis Focused Dashboard. Understand how to use Epiphany's customizable dashboard to quickly see the information important to your organization.
Attack Path Management. By understanding how attackers are able to take advantage of your environment's exploitability, you can understand how to take away their opportunities to cause harm
Identity Management. Managing an identity in Epiphany is all about understanding how that identity is potentially being exposed and what that exposure means to your organization.
Vulnerability Management. Epiphany offers a unique view on vulnerabilities. Epiphany can track multiple metrics about a vulnerability and correlate that with an attacker's ability to utilize it to create a material impact.
Device Management. Epiphany finds the conditions that create risk in your organization's devices from lack of defensive controls, misconfigurations, and vulnerabilities and lets you know how an attacker might use those vulnerabilities.
Last updated