# Technical Analysis

## Epiphany Workflows

The workflows in the [*Technical Analysis*](https://docs.reveald.com/technical-documentation/epiphany-workflows/technical-analysis) section will give you a better understanding of how Epiphany functions and how to approach your exposure management challenges.&#x20;

These workflows are focused on these areas:

* [Creating an Analysis Focused Dashboard](https://docs.reveald.com/technical-documentation/epiphany-workflows/technical-analysis/create-an-analysis-focused-dashboard). Understand how to use Epiphany's customizable dashboard to quickly see the information important to your organization.&#x20;
* [Attack Path Management](https://docs.reveald.com/technical-documentation/epiphany-workflows/technical-analysis/attack-path-management). By understanding how attackers are able to take advantage of your environment's exploitability, you can understand how to take away their opportunities to cause harm
* [Identity Management](https://docs.reveald.com/technical-documentation/epiphany-workflows/technical-analysis/identity-management). Managing an identity in Epiphany is all about understanding how that identity is potentially being exposed and what that exposure means to your organization.
* [Vulnerability Management](https://docs.reveald.com/technical-documentation/epiphany-workflows/technical-analysis/vulnerability-management). Epiphany offers a unique view on vulnerabilities. Epiphany can track multiple metrics about a vulnerability and correlate that with an attacker's ability to utilize it to create a material impact.
* [Device Management](https://docs.reveald.com/technical-documentation/epiphany-workflows/technical-analysis/device-management). Epiphany finds the conditions that create risk in your organization's devices from lack of defensive controls, misconfigurations, and vulnerabilities and lets you know how an attacker might use those vulnerabilities.&#x20;
