Demo of the CyCognito Platform

See the CyCognito platform in action to understand how it can help you identify, prioritize and eliminate your most critical risks. 

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024. 

The Total Economic Impact™ of The CyCognito Platform

Read The Total Economic Impact™ of The CyCognito Platform — a Forrester study. Cost Savings And Business Benefits Enabled By The CyCognito Platform. 

External Exposure & Attack Surface Management For Dummies

As your attack surface has grown to cloud infrastructures and across subsidiaries, attackers are looking for and finding unknown and unmanaged assets to serve as their entry points. 

 
GigaOm Radar for Attack Surface Management

The expansion of an organization's attack surface continues to present a critical business challenge. Download the GigaOm Radar for Attack Surface Management to get an overview of the available ASM solutions, identify leading offerings, and evaluate the best solution for you.  

Products

Optimizing Asset Management and Incident Response: CyCognito’s New Integration with ServiceNow CMDB

Ansh-Patnaik
By Ansh Patnaik
Chief Product Officer
August 21, 2024

Effective asset management and rapid incident response are crucial for maintaining cybersecurity defenses. To address these needs, and building on its previous Vulnerability Response module integration, CyCognito has announced a new certified integration with ServiceNow’s Configuration Management Database (CMDB). This integration enhances asset visibility and streamlines management, offering a significant boost to organizations’ security postures by facilitating quick assessment and response to configuration and asset changes.

The Integration

Historically, CMDB solutions have only provided visibility into internal assets and their configuration. The integration between CyCognito and ServiceNow CMDB brings end-to-end synchronization for managing an organization’s complete asset inventory. By synchronizing CyCognito assets with ServiceNow Configuration Items (CIs) in the CMDB, organizations can now automatically create, update, and delete CIs based on the status of external assets acquired through the CyCognito CMDB Integration. This dynamic synchronization ensures that the CMDB is always up-to-date with the latest asset information, facilitating quick assessment and response to configuration and asset changes.

Features and Benefits

The CyCognito CMDB Integration facilitates the periodic retrieval of external assets from the CyCognito platform and populates them into ServiceNow CMDB. It also displays the relationship between the related assets, providing a comprehensive view of the asset ecosystem.

Figure 1. CyCognito dashboard showing external assets by category within the ServiceNow console

  • Ability to configure CyCognito Integration Profile in ServiceNow: Users can set up and customize the integration to meet their specific needs.
  • Periodic Asset Retrieval: The integration fetches assets on a regular basis to ensure the CMDB remains current.
  • Detailed Asset Information: Users can view comprehensive details of the fetched assets within ServiceNow CMDB.
  • Asset Relationship Visualization: The integration displays relationships between related assets, enhancing visibility and management.
  • Configurable App Settings: Users can tune the integration by configuring various app settings to optimize performance and functionality.
  • Process Monitoring: The integration includes a process monitor to track ongoing processes and allows for the cancellation of running processes if necessary.

Enhancing Incident Response

By integrating with ServiceNow CMDB, CyCognito ensures that security teams have access to the most current information, allowing them to quickly identify and respond to potential threats. This integration is particularly beneficial in complex environments where manual asset management can be time-consuming and error-prone.

Figure 2.  CyCognito dashboard showing external assets vulnerabilities and risk ratings within the ServiceNow console

Integration in Use

One of the world’s leading global information services companies standardized with the ServiceNow ITSM platform. The main reason for the standardization was to ensure that IT and SecOps had one source of truth about their assets, risks, and management tools. Working with CyCognto to discover their external attack surface then required that CyCognito provide integration into their ServiceNow CMDB, giving them visibility to internal and external assets. The Cycognito certified integration supports the latest Service Graph architecture and incorporates an Identification and Resolution Engine (IRE) to streamline issue management and reduce ticket duplication allowing for faster resolution to the most critical issues. 

CyCognito’s latest integration with ServiceNow CMDB represents a significant step forward in enhancing both asset management and cybersecurity. By leveraging the combined strengths of these platforms, organizations can achieve greater visibility, improved management of internal and external assets, and a stronger defense against security threats.  To get started, visit the ServiceNow Store to install the CyCognito CMDB Integration application.




About the Author

Ansh-Patnaik

Ansh Patnaik

Chief Product Officer

Ansh Patnaik, Chief Product Officer at CyCognito, has over 20 years of cross functional experience in cybersecurity and data analytics. Most recently, Ansh was Director, Cloud Security Products for Google Cloud Platform, and Chief Product Officer for Chronicle, prior to the acquisition of Chronicle by Google.

Topics



Search the Blog



Featured Posts








Top Tags



CyCognito Research Report

State of External Exposure Management, Summer 2024 Edition

State of External Exposure Management, Summer 2024 Edition

Download the report now to stay ahead of emerging threats and strengthen your organization’s security posture for 2024.

O'Reilly Report

Moving from Vulnerability Management to Exposure Management

Moving from Vulnerability Management to Exposure Management

Download the report to learn about the historical trends behind the emergence of exposure management, how to develop a strategic plan and assemble a team to smoothly transition frameworks, and example tech stacks to consider for your organization.

Request a Free Scan

See Exactly What Attackers See

Get a Free Scan of Your Attack Surface

Get a free scan of your attack surface and gain valuable insight into your organization's risk posture by allowing CyCognito to discover, contextualize, and test externally exposed assets on a portion of your parent company or a single subsidiary.

Related Guides

Discover insights on application security, exposure management and other key topics below.

Learning Center Attack Surface
Understanding Attack Surface Management

The definitive guide to attack surface management. Learn everything you need to know to reduce your cyber security risk with attack surface management.

Learning Center Exposure Management
Exposure Management in Cybersecurity: Concepts and Technologies

Exposure management is a set of processes which allow organizations to assess the visibility, accessibility, and risk factors of their digital assets.

Learning Center Vulnerability Assessment
Vulnerability Assessment: Process, Challenges & Best Practices

Vulnerability assessment is the process of identifying, quantifying, and prioritizing vulnerabilities in a system.

Related Products

Explore CyCognito modules ASM, AST and EI in the resources below.

Platform > Products
Attack Surface Management

Scalable, continuous, and comprehensive testing for all external assets, all the time.

Platform > Products
Automated Security Testing

CyCognito Automated Security Testing dynamically applies payload-based testing techniques across your entire external attack surface.

Platform > Products
Exploit Intelligence

CyCognito Exploit Intelligence uses threat intelligence about attackers’ behavior and exploitability for enhanced prioritization.