{"id":3653,"date":"2024-09-16T13:37:59","date_gmt":"2024-09-16T11:37:59","guid":{"rendered":"https:\/\/www.dsecbypass.com\/?p=3653"},"modified":"2024-09-17T11:26:56","modified_gmt":"2024-09-17T09:26:56","slug":"exaface-french-easm","status":"publish","type":"post","link":"https:\/\/www.dsecbypass.com\/en\/exaface-french-easm\/","title":{"rendered":"External Attack Surface Management (EASM) &#8211; Exaface"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||||false|false&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\">One of the current problems in IT security is <strong>the control of what a company exposes on the Internet<\/strong>: the rapid expansion of information systems and their increasing complexity make the creation and maintenance of an inventory very difficult. It is then impossible to monitor what we do not know. <\/p>\n<p style=\"text-align: justify;\"><span class=\"BxUVEf ILfuVd\" lang=\"fr\"><span class=\"hgKElc\">External attack surface management (EASM) <b>consists of mapping an organization&#8217;s public IT attack surface, inventorying vulnerabilities, misconfigurations, and leaks of sensitive information, and monitoring it on an ongoing basis so that it is constantly up to date.<\/b><\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<strong>Exaface is a French EASM solution<\/strong> designed and developed to: \u2713 Face current and future threats by providing<strong> the most comprehensive vision possible of your external attack surface<\/strong>: continuous discovery, increased monitoring, identification of risks, prioritization and remediation \u2713 Respond to <strong>data sovereignty and protection issues<\/strong> \u2713<strong> Simplify the management<\/strong> of your cyber exposure through a single tool[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: justify;\"><span><span class=\"break-words tvm-parent-container\"><span dir=\"ltr\">\/<span class=\"white-space-pre\"> <\/span>Exaface<span class=\"white-space-pre\"> <\/span>is part of an <strong>accessibility approach<\/strong> where each profile (technical, decision-maker, multi-skilled) must find relevant information in order to participate in securing the external perimeter of the company. <strong>The multiple indicators and scores present will help you make decisions<\/strong> to better reduce your <span class=\"white-space-pre\">cyber risks<\/span>.<br \/><span class=\"white-space-pre\"> <\/span><br \/>\/ Data protection and <span class=\"white-space-pre\">sovereignty<\/span><span class=\"white-space-pre\"> <\/span>being paramount aspects, <strong>the solution infrastructure is entirely self-hosted<\/strong>. Our data is also encrypted and stored only in France, Finland and Germany (EU). <br \/><span class=\"white-space-pre\"> <\/span><br \/>\/ <strong>Being an Exaface customer also means benefiting from support, advice and expertise<\/strong> on the management of your external attack surface.<br \/><span class=\"white-space-pre\"> <\/span><br \/>\u276f<span class=\"white-space-pre\"> Sammy FORGIT,<\/span><\/span> architect of the solution and main developer, draws on his 20 years of experience in the IT professions to design and build the most complete solution possible, taking into account the different constraints and needs of companies.<br \/>\u276f<span class=\"white-space-pre\"> Justin BUSSERY<\/span><\/span>, DevOps and system administrator for 4 years, then security auditor for 5 years, he combines the skills necessary to understand business constraints and address the issues of technical and executive teams. His role is central in the management of the Exaface project and he is also responsible for UX\/UI design and modeling.<br \/>\u276f<span class=\"white-space-pre\"> Vladimir TOUTAIN<\/span>, trained as an engineer and IT security consultant since 2016, he is the one who manages the security of the product and provides his expertise on the features side. <br \/><span class=\"white-space-pre\"> <\/span><br \/>Are you interested in a demo or an exchange? Contact us! <br \/><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.3&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_button button_url=&#8221;https:\/\/www.dsecbypass.com\/en\/contact\/&#8221; button_text=&#8221;CONTACT US&#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_size=&#8221;13px&#8221; button_bg_color=&#8221;#4328b7&#8243; button_border_width=&#8221;10px&#8221; button_border_color=&#8221;#4328b7&#8243; button_border_radius=&#8221;0px&#8221; button_letter_spacing=&#8221;2px&#8221; button_font=&#8221;Titillium Web|700||on|||||&#8221; background_layout=&#8221;dark&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exaface is a French EASM solution designed and developed to: \u2713 Face current and future threats by providing the most comprehensive vision possible: continuous discovery, increased monitoring, identification of risks, prioritization and remediation \u2713 Respond to issues of sovereignty and data protection \u2713 Simplify the management of your cyber exposure through a single tool<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[34],"tags":[],"class_list":["post-3653","post","type-post","status-publish","format-standard","hentry","category-blog-en"],"_links":{"self":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/comments?post=3653"}],"version-history":[{"count":10,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3653\/revisions"}],"predecessor-version":[{"id":3706,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/posts\/3653\/revisions\/3706"}],"wp:attachment":[{"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/media?parent=3653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/categories?post=3653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dsecbypass.com\/en\/wp-json\/wp\/v2\/tags?post=3653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}