Overview

A quick overview of what's covered in the EIP Use Cases guide.

About This Guide

The Epiphany Intelligence Platform is a cyber-security exposure management system that allows organizations to understand the risks that can cause a material impact. In other words, it's trying to help you stop attackers before they reach a critical system. At its core, it allows organizations to:

  • Understand what is possible for an attacker.

  • Detect exploitable conditions within the environment.

  • Prioritize exposures for remediation.

  • Prevent material impacts.

Additionally, knowing the answers to these essential cybersecurity questions will help you understand how Epiphany will help you address your exposure management.

Scenarios

This document presents a number of real-life scenarios to give you a better understanding of how Epiphany functions and how you can use it to approach your exposure management challenges. These scenarios are focused on these areas:

  • Validate and Manage Assets in Your Environment. Epiphany finds the conditions that create risk in your organization's devices from lack of defensive controls, misconfigurations, and vulnerabilities and lets you know how an attacker might use those vulnerabilities.

  • Deep Inspection and Audit of Identity Services. Managing an identity in Epiphany is all about understanding how that identity is potentially being exposed and what that exposure means to your organization.

  • Manage Exploitability. Epiphany offers a unique view on exploitability and vulnerabilities. Epiphany can track multiple metrics about a vulnerability and correlate that with an attacker's ability to use it to create a material impact.

  • Manage Business Impact. Every business or organization has specific assets that have critical importance, as well as high, medium, or low importance. The importance of each asset can be determined based on its value to the organization or the impact its loss would have. Epiphany has tools to let you determine the relative importance of various assets and then monitors them accordingly.

  • Effectively Manage Attack Paths to Enable Better Risk Decisions. By understanding how attackers are able to take advantage of your environment's exploitability, you can understand how to take away their opportunities to cause harm.

Last updated