Use Cases
This document shows how Epiphany helps organizations understand the risks that can cause a material impact, making it possible to stop attackers before they reach critical systems.
This document includes these sections:
6 Essential Cybersecurity Questions
Validate and Manage Assets and Devices in Your Environment
Scenario 1: Identify Systems With Specific Characteristics
Solution: Epiphany’s Combined Asset Inventory
Scenario 2a: Locate Systems Where Agents Need to be Installed, Fixed, or Reconfigured
Scenario 2b: Discover Devices and Agents That Were Thought to be Decommissioned but are Still in Use
Solution: Epiphany’s Rogue System Detection
Query via Set Logic in Rogue
Scenario 3: Quickly Locate Information About Devices, IP Addresses, Users and More
Solution: Epiphany’s “Explorer” Style Search Across Data Sets
Deep Inspection and Audit of Identity Services
Scenario 1: Consistently Audit Domain Administrators and Groups With Admin Rights
Solution: Use Epiphany’s Active Directory to do deep inspection of accounts and groups
Scenario 2: Manage Account Policy
Solution: Epiphany’s Active Directory Shows Stale Users and Users with Credentials that are Easily Exploitable
Effective Local Admin Rights Detail
Scenario: A Scan Shows Massive Number of Vulnerabilities That Must be Addressed
Solution: Epiphany’s Vulnerability Overview and Detail
Vulnerability Breakdown by Risk to the Organization
Vulnerability Detail
Scenario: Your Organization Needs to Know How an Adversary Can Impact Assets in a Specific Part of the Business
Solution: Epiphany’s Business Impact Matrix
Addition of Assets Into an Impact Matrix
Effectively Manage Attack Paths to Enable Better Risk Decisions
Scenario: Changes to User Permissions, Hardware, and Networking Parameters Introduce Risk and Blue Teams Work to Uncover Issues
Solution: Epiphany Provides Detailed Information about Attack Paths
Top Attack Paths Dashboard Widget
Attack Paths Prioritized by Criticality, or Optionally by Business Impact Matrix Group
Detailed Attack Path With Remediation Guidance at One Traversal Point
Recommendations Engine in Attack Path Detail
Last updated