
FAQ's
Got a question? You’ll find clear, straightforward answers to the most common queries here.
Asset Discovery FAQ's
What is asset discovery in relation to attack surface management?
Asset discovery is the process of identifying every internet-facing system tied to your organisation. This includes IP addresses, domains, infrastructure services, web services and cloud services, giving you a complete picture of your external footprint. If you don't know what you have on your network, how can you protect against it?
Why is asset discovery important for security teams?
Unknown or unmanaged assets are prime entry points for threat actors. Asset discovery eliminates blind spots by offering proactive identification and structure to your external footprint. With full visibility restored, teams can act before any overlooked assets become a gateway into your digital environment.
How does automated asset discovery work?
Automated bespoke tools like GARi continuously scan internet-wide data, cloud environments, domain services and employed technologies to reveal accurate and detailed information related to your environment. This enhancement replaces conventional manual approaches and simplifies the process of keeping asset inventories accurate.
What types of assets can be discovered?
GARi can uncover everything from domains and IP addresses to cloud buckets, including unidentified assets, abandoned assets and exposed services.
Does my organisation need asset discovery?
If your organisation runs online services or relies on cloud infrastructure, the answer is yes. Asset discovery makes sure nothing slips through the cracks and reinforces strong governance and fast response.
How does asset discovery support attack surface management?
Discovery is the foundation of effective attack surface management (ASM). Without knowing what exists, you cannot manage and prioritise risk or secure vulnerable assets. Discovery feeds context directly into your ASM workflows.
What are the benefits of automating asset discovery?
Automation keeps your inventories accurate and removes unnecessary manual work. It gives you instant visibility for newly discovered assets, improving response speed and strengthening your view of the entire attack surface.
FAQs – Threat Intelligence
What is Threat Intelligence in attack surface management?
Threat intelligence in attack surface management is the integration of real-world adversary data into continuous discovery and monitoring platforms, assisting in risk prioritisation and proactive defence against cyber threats.
Why is threat intelligence important for my organisation?
Threat intelligence is important for your organisation as it helps to predict, anticipate, detect and prioritise cyber threats, before they can be successfully exploited, adding proactive countermeasures to combat data theft, loss or damage to underlying services and technologies that support your business.
How does threat intelligence work?
Threat intelligence is a collaborative collection of data sources from across the globe which acts as a central information hub for targeted business sectors and industries, it also details newly identified attack vectors, security weaknesses and tactics, techniques and procedures (TTP) employed by threat actors based off collated real-time intelligence data gathered from technology vendors and partners.
Does my organisation need threat intelligence?
Threat intelligence provides insights into otherwise unnoticed weaknesses and misconfigurations, it provides analytics from multiple sources relating to threat actor activity, targeted business sectors, new security weaknesses and vendor notifications and updates.
How does education and awareness support attack surface management?
Threat intelligence supports attack surface management through contextualisation of exposure and weaknesses, in conjunction with providing adversary simulation relating to tactics, techniques and procedures employed by threat actors. This aids in creating broader insight into attack chaining and methods which could be used to target your business.
What are the benefits of threat intelligence?
-
Proactive Defence
-
Operational Continuity
-
Insight into industry specific TTP’s
-
Improved Incident Response
-
Strategic Decision Making
-
Enhanced Cyber Resilience
Technical Vulnerability Management FAQ's
What is asset discovery in relation to attack surface management?
Technical vulnerability management (TVM) in Attack Surface Management (ASM) is the process of identifying, assessing, prioritising, and remediating security weaknesses across an organisation’s exposed digital assets.
Why is technical vulnerability management important for security teams?
Technical vulnerability management (TVM) is important to security teams as it reduces the overall risk and impact posed to an organisation’s digital environment. It provides identification, clarity, risk prioritisation and proactive mitigation, whilst supporting incident response readiness and prevention of asset breaches and data loss.
How does automated technical vulnerability management work?
Automated technical vulnerability management works by firstly conducting a preliminary assessment of all of your assets configurations and current states, following this low-overhead checks are performed continuously against your estate to identify any changes to your assets or security posture. Once a change or weakness has been identified through continuous monitoring, in-depth scans are then performed and populated within your RMI GARi dashboard.
What types of vulnerabilities can be discovered?
RMI GARi performs a number of vulnerability checks, which facilitate the identification of the following vulnerability types: See here
​
​
Does my organisation need technical vulnerability management?
Your organisation will benefit from technical vulnerability management to proactively identify, assess, and remediate security weaknesses before they can be exploited by attackers. In today’s evolving threat landscape, a structured vulnerability management program helps maintain a strong security posture by continuously monitoring systems, prioritising risks based on impact, and ensuring timely patching or mitigation.
What are the benefits of automating technical vulnerability management?
Technical vulnerability management supports attack surface management (ASM) by identifying, prioritising and remediating weaknesses, resulting in a reduction for susceptibility to past, current and upcoming cyber-attacks and their associated exploits. Vulnerability management ensures assets are continuously assessed for misconfigurations, outdated software, and exploitable flaws. By integrating technical vulnerability management scanning and risk-based prioritisation into the ASM lifecycle, organisations can not only visualise their attack surface but actively reduce it.
What are the benefits of automating asset discovery?
Automating technical vulnerability management enables accurate discovery and inventory of assets, while continuously identifying issues and proactively alerting you to potential risks before they become problems.
FAQs – Education & Awareness (EA)
What is education and awareness in relation to attack surface management?
Education and awareness is the human-centric layer, which complements the technical controls and services within your estate, aiding employees and teams in understanding, identifying, responding and reducing both virtual and physical exposure which attackers could exploit.
Why is education and awareness important for businesses?
Education and security awareness are critical for businesses because human error remains one of the leading causes of security breaches. Even the most advanced technical defences can be undermined by a single employee being subject to a phishing email, using weak passwords or mishandling sensitive data. By fostering a culture of security awareness, organisations empower their workforce to recognise threats, follow best practices, and respond appropriately to incidents. Furthermore, regular training helps employees stay informed about evolving cyber risks, compliance obligations and acceptable use, reducing the likelihood of costly breaches and downtime.
How does education and awareness work?
RMI GARi offers a bespoke phishing simulation platform which stands apart from competitors, by offering a fully customisable experience with access to in-built templates, customisable templates, trained domains, false-positive detection, leaked credential checks, data breach reconnaissance, enhanced behavioural analytics and both in-depth and executive reporting.
Does my organisation need education and awareness?
Organisations needs education and awareness testing and training as in the digital business landscape people are both your greatest asset and your most vulnerable attack vector. No matter how advanced your technical defences are, a single click on a phishing link, a reused password or an accidental data leak can result in significant compromise.
How does education and awareness support attack surface management?
Education and awareness plays a crucial role in supporting attack surface management (ASM) by reducing the number of human-driven vulnerabilities that expand an organisation’s risk and exposure, by providing simulating phishing attacks and reinforcing lessons learned with interactive training material.
What are the benefits of education and awareness?
Training empowers your employees to recognise threats, understand their role in protecting sensitive data and your business, in addition to adopting security conscious behaviours as part of their daily routines. It also reinforces compliance with regulatory requirements and reduces the risk of costly incidents caused by human error.
