Technical Analysis
Epiphany use cases fall into five categories. They are summarized below, with more detail in the next sections.
Last updated
Epiphany use cases fall into five categories. They are summarized below, with more detail in the next sections.
Last updated
The workflows in the section will give you a better understanding of how Epiphany functions and how to approach your exposure management challenges.
These workflows are focused on these areas:
. Understand how to use Epiphany's customizable dashboard to quickly see the information important to your organization.
. By understanding how attackers are able to take advantage of your environment's exploitability, you can understand how to take away their opportunities to cause harm
. Managing an identity in Epiphany is all about understanding how that identity is potentially being exposed and what that exposure means to your organization.
. Epiphany offers a unique view on vulnerabilities. Epiphany can track multiple metrics about a vulnerability and correlate that with an attacker's ability to utilize it to create a material impact.
. Epiphany finds the conditions that create risk in your organization's devices from lack of defensive controls, misconfigurations, and vulnerabilities and lets you know how an attacker might use those vulnerabilities.