Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » How Gartner’s New Categories Help Manage Impact
Global Security

How Gartner’s New Categories Help Manage Impact

AdminBy AdminAugust 27, 2024No Comments5 Mins Read
CTEM in the Spotlight
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


CTEM in focus

Want to know what’s new and best in SecOps for 2024? The recently published Gartner Hype Cycle for Security Operations report takes important steps to organize and evolve the field of Continuous Threat Exposure Management, also known as CTEM. This year’s report includes three categories in this area: infection management, infection assessment platforms (EAPs) and adversarial infection verification (AEV).

These category definitions are intended to provide some structure to the changing landscape of exposure management technologies. Pentera, listed as a sample provider in the newly defined category, AEV is playing a key role in expanding the adoption of CTEM with an emphasis on safety verification. Below is our take on the CTEM-related product categories and what they mean for security business leaders.

The industry is maturing

Created by Gartner in 2022, CTEM provides a structured approach to continuously assess, prioritize, validate, and remediate the impact of an organization’s attack surface, enabling enterprises to mobilize responses to the most critical risks. The structure it creates helps make the ever-growing attack surface manageable.

A recent reorganization of the categories aims to help businesses identify the security vendors best suited to support Implementation of CTEM.

Threat exposure management is a common set of technologies and processes used to manage threat exposure under the direction of the CTEM program. It includes two new CTEM-related categories described below.

Vulnerability Assessment and Vulnerability Prioritization technology capabilities have been combined into one new category, Exposure Assessment Platforms (EAPs). EAP aims to optimize vulnerability management and improve operational efficiency, no doubt why Gartner gave this category a high preference rating.

Meanwhile, Adversarial Exposure Validation (AEV) combines breach and attack simulation (BAS) with automated pentesting and Red Teaming into one new feature that focuses on providing continuous, automated proof of exposure. AEV is expected to gain major market growth due to its ability to test cyber resilience from a adversarial perspective, challenging an organization’s IT defenses with real-world attack techniques.

What do EAPs offer?

A few things, but for starters they make you less dependent on CVSS scores to prioritize vulnerabilities. While an indicator is useful, that’s all it is, an indicator. A CVSS score does not indicate how exploitable a vulnerability is in the context of your specific environment and threat landscape. The data presented in EAP settings is much more contextualized with threat and asset importance information. It delivers insights in a way that supports action, not oceans of data points.

This additional contextualization also means that vulnerabilities can be labeled in terms of business risk. Need to fix a poorly configured device that no one ever uses and isn’t connected to anything? EAPs help focus efforts on vulnerabilities that aren’t just exploitable, but actually lead to business-critical assets, either for their data or business continuity.

The value of AEV?

While EAPs use scans and data sources to provide exposure context, they are limited to theoretical data analysis without actual evidence of exploitable attack paths. And this is where the AEV comes in, it confirms the exposure from the enemy’s point of view. AEV involves running adversarial attacks to find out what security holes are actually exploitable in your particular environment and how far an attacker would go if they were exploited.

In short, AEV takes threats from the playbook to the playing field.

But there are other benefits; this makes managing the red team much easier. Red teams need a unique set of talents and tools that are difficult to develop and acquire. Having an automated AEV product to handle many red team tasks helps lower that barrier of entry, giving you a more than decent base from which to build.

AEV also helps make a large attack surface more manageable. Relieving the burden on security staff, automated test runs can be run regularly, consistently, and across multiple locations, allowing any willing red team to focus only on priority areas.

Where the brutal goes

It’s not all a bed of roses, there are some thorns that companies need to trim in order to realize the full potential of their threat management initiatives.

When it comes to EAP, it’s important to think beyond compliance and CVSS. A mental shift from viewing assessments as tick-box activities is required. In this limited context, vulnerabilities are listed as isolated threats, and you end up missing the difference between knowing that vulnerabilities exist and prioritizing those vulnerabilities based on their exploitability and potential impact.

For AEV, one challenge is finding the right technology solution that will cover all the bases. Although many vendors offer attack simulation and/or automated penetration testing, they are generally considered separate functions. Security teams that want to validate both the true effectiveness of their security controls and the true exploitability of security vulnerabilities may choose to implement multiple products individually.

The Going Get Proactive

The evolution of the CTEM framework since its introduction two years ago indicates a growing recognition of the critical need for proactive risk mitigation thinking. The new categorization introduced in Hype Cycle reflects the growing maturity of products in this space, supporting the CTEM operation.

When it comes to the AEV category, our recommendation is to use a solution that will seamlessly integrate BAS and penetration testing capabilities, as this is not a common feature for most tools. Look for agentless technologies that closely replicate attacker methods and ease operational requirements. This unique combination ensures that security services can continuously test their security posture with real relevance.

Learn more about how Pentera is used as an important element of any CTEM strategy, enabling enterprises to maintain a robust and dynamic security posture that is constantly tested against the latest threats.

For more information on Continuous Threat Exposure Management (CTEM), join us at the XPOSURE 2024 Summitheld by Pentera, and capture Gartner® 2024 Hype Cycle for Security Operations the report

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025

Think what your IDP or CASB covers the shadow? These 5 risks prove differently

June 9, 2025

Openai prohibits chatgpt accounts used by Russian, Iranian and Chinese hacking groups

June 9, 2025

Operation malicious network supply software gets to NPM and Pypi ecosystems, focusing on millions worldwide

June 8, 2025

Extension of the malicious browser has infected 722 users across Latin America since the beginning of 2025

June 8, 2025

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

CISA adds flaws of Erlang SSH and RoundCube to famous exploited directory vulnerabilities

June 10, 2025

More than 70 organizations in several sectors aimed at Chinese Cyber ​​Spying Group

June 9, 2025

Two different botnets exploit the vulnerability of the WAZUH server to launch attacks based on peaceful

June 9, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.