control your global internet attack surface and identify risky communication with the outside
Expanse shows you a complete, real-time view of all of your Internet-connected assets and what’s talking to them.
Global Attack Surface Monitoring
The Expanse Global Internet Intelligence Platform continuously collects and correlates petabytes of active and passive information about every device and service connected to the public Internet. Using this information, we intelligently attribute assets to specific organizations, helping them discover and protect previously unknown Internet-connected systems.
Understand what you own, what’s at risk, and how to protect your most critical assets
Global internet sensing platform
Expanse maintains a historical record of all assets connected to the Internet, who owns them, and communication between them.
Expanse analyzes and tracks Internet-connected assets and communications between them. Our Sensing Platform indexes the entire Internet, storing data about devices connected as well as communications observed between them. Using this data, Expanse can identify assets that have been abandoned or misconfigured, as well as those that may be compromised.
Global edge tracking engine
Dynamic Internet asset discovery and inventory.
Expanse classifies and tracks billions of IPs and trillions of associated network flows, looking for system information that can tie assets back to an organization. This complete, accurate view of their Internet-exposed assets serves as a single source of truth and better inform security operations and other tools.
Understand and monitor your global Internet attack surface
Your Internet-facing assets are constantly under attack from targeted and opportunistic attackers. Without a continuously updated, accurate inventory of those assets, you leave unknown or unmonitored assets exposed to threats. Edge Expander discovers and helps remediate any exposures on those assets.
With Edge Expander, security and IT operations teams have the visibility they need to reduce risk to the business by focusing remediation efforts on critical exposures and assets out of compliance with policy. Edge Expander can automatically update your asset lists and processes, providing a single source of truth about assets that are tied to your organization, including on-premise, through partners, and in cloud providers.
Understand the communication activity between your Internet-connected assets and others
Discover communication flowing between assets on your attack surface and those outside without the burden of network traffic collection, analysis, or costly infrastructure.
Edge Behavior intelligently identifies assets in your inventory that are making risky connections to out-of-policy services like Tor and BitTorrent, without needing to instrument any of your ingress or egress points. Edge Behavior passively detects communications across the global Internet, allowing security teams to discover network policy gaps and check that compliance controls are implemented properly.
Edge Expander Technical Add-on for Splunk
Our Splunk Technical Add-on allows customers to consume and access their Edge Expander data about Internet-facing assets in Splunk.
- Maximize the value of your Splunk implementation with an accurate view of all Internet-connected assets in your organization
- Create custom analytics that help you spot trends in asset activities
- Set up alerts through Splunk on Edge Expander exposure data to drive remediation
Edge Expander API
Edge Expander APIs can be used to integrate information about Internet-connected assets into existing security and asset management tools.
- Improve the accuracy of asset management tools by continuously updating information
- Reduce re-work and remediation time by automatically including asset context in ticketing systems
- Secure and monitor all of your assets by automatically sending Edge Expander asset data and context into vulnerability management tools
Attack Surface ReductionReduce business risk by controlling your attack surface and having visibility into exposures of all Internet-connected assets.
Audit and ComplianceIdentify all production, development, testing, and staging environments. Stay compliant with a complete asset inventory with no audit surprises.
Supply chain risk and business partner trackingDiscover IT security risks in your most critical suppliers and work with them to remediate exposures. Understand the IT hygiene of strategic suppliers before you decide to contract for services and know the risk you are taking on with business partners.
Mergers and AcquisitionsMake informed acquisition decisions by evaluating a target organization’s IT hygiene with a complete and unbiased assessment of their global Internet attack surface. Fact check your target’s asset list and security posture prior to completing a transaction.
Internet-facing Asset DiscoveryUnderstand pervasive provisioning problems and identify unknown assets that have been commissioned without the knowledge of IT. Gain visibility and drive asset inventory accuracy to ensure your security and IT teams are protecting all Internet-facing assets.
Public Cloud Asset DiscoveryUnderstand pervasive provisioning problems and identify unknown assets that have been commissioned without the knowledge of IT. Gain visibility and drive asset inventory accuracy to ensure your security and IT teams are protecting all Internet-facing assets.