External attack surface management (EASM) refers to the processes, technology and professional services deployed to discover internet-facing enterprise assets and systems and exposures that could be exploited by malicious threat actors. EASM is useful in identifying unknown assets and providing information about the organization’s systems, cloud services and applications that are available and visible in the public domain and therefore can be exploited by an attacker/adversary. This visibility can also be extended to the organization’s subsidiaries or third parties. EASM are most commonly cloud-based products and services but can also be delivered ‘as a service’. EASM appeals to security operations functions involved with penetration testing, vulnerability management and threat hunting who want better visibility of their internet-facing assets to complement their threat and exposure management program.
The security threat intelligence products and services market refers to the combination of products and services that deliver knowledge (context, mechanisms, indicators, implications and action-oriented advice), information and data about cybersecurity threats, threat actors and other cybersecurity-related issues. The output of these products and services aims to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce the likelihood and impact of a potential compromise. Threat intelligence (TI) products and services support the different stages of a TI process life cycle. In particular, this involves defining the aims and objectives, collecting and processing intelligence originating from various sources, analyzing and disseminating it to different stakeholders within the organization, and regularly providing feedback on the entire process. These products and services support ongoing security investigations and assist in preventing future breaches by prioritizing infrastructure hardening. TI tools and services are most commonly cloud-based products and services, but can also be delivered “as a service.”
Supplier risk management solutions are advanced technology platforms designed to facilitate comprehensive supplier risk management activities. These platforms not only aid in the identification and continuous monitoring of potential risks, such as financial instability, geopolitical concerns, and compliance challenges, but also enable a thorough analysis of their holistic impact. Furthermore, they support the coordination of both operational and strategic responses to mitigate these risks effectively. Integral to end-to-end supply chain risk management, supplier risk management aims to assist organizations in mitigating prioritized risks across the entire supply ecosystem — encompassing both physical and digital domains.
The third-party risk management (TPRM) technology market offers solutions to identify, assess, manage, monitor and report on third-party risks associated with vendors, suppliers, distributors, agents, partners or other third parties. Solutions in this market can support a wide range of TPRM workflows across various risk domains. TPRM platforms in this market address the needs of a diverse range of customers and risk domains, including legal, compliance, procurement, supply chain, IT, cybersecurity and other teams that work with or provide routine oversight of third parties. Some technology solutions offer enterprise third-party risk management workflow as a feature, along with risk tiering, due diligence, risk mapping, metrics and reporting mechanisms. Other platforms may facilitate integration with risk data subscriptions, data aggregators or other subscriptions. The TPRM technology market is a complex array of solutions servicing many business functions across an enterprise. TPRM solution providers can be categorized into technology platforms and tools, or risk-domain-specific data and insights.