News

NSFOCUS was Selected as a Representative Provider of Gartner® “Innovation Insight: Adversarial Exposure Validation in China”

  • None--securityboulevard.com
  • published date: 2025-06-24 00:00:00 UTC

None

<p>SANTA CLARA, Calif., June 24, 2025 – Recently, Gartner released the 2025 “Innovation Insight: Adversarial Exposure Validation in China”¹, NSFOCUS was selected as a Representative Provider for its adversarial exposure validation (AEV) capability in the<a href="https://nsfocusglobal.com/products/continuous-threat-exposure-management/"> continuous threat exposure management</a> (CTEM) service.</p><h2>Why has ASM become a pain point for enterprises?</h2><div class="wp-block-image"> <figure class="aligncenter size-large is-resized"><a href="https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps.png"><img fetchpriority="high" decoding="async" src="https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps-1024x941.png" alt="" class="wp-image-26196" width="512" height="471" srcset="https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps-1024x941.png 1024w, https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps-300x276.png 300w, https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps-768x706.png 768w, https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps-196x180.png 196w, https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps-150x138.png 150w, https://nsfocusglobal.com/wp-content/uploads/2023/09/ctemsteps.png 1072w" sizes="(max-width: 512px) 100vw, 512px"></a></figure> </div><p><strong>Asset data is scattered and lacks a unified </strong><strong>asset account</strong></p><p>Enterprise assets are scattered in various systems, and their comprehensiveness, accuracy and real-time performance are difficult to guarantee. The security department needs to sort out a unified network asset management account.</p><div class="code-block code-block-12 ai-track" data-ai="WzEyLCIiLCJCbG9jayAxMiIsIiIsMV0=" style="margin: 8px 0; clear: both;"> <style> .ai-rotate {position: relative;} .ai-rotate-hidden {visibility: hidden;} .ai-rotate-hidden-2 {position: absolute; top: 0; left: 0; width: 100%; height: 100%;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback, .ai-list-block, .ai-list-block-ip, .ai-list-block-filter {visibility: hidden; position: absolute; width: 50%; height: 1px; top: -1000px; z-index: -9999; margin: 0px!important;} .ai-list-data, .ai-ip-data, .ai-filter-check, .ai-fallback {min-width: 1px;} </style> <div class="ai-rotate ai-unprocessed ai-timed-rotation ai-12-1" data-info="WyIxMi0xIiwyXQ==" style="position: relative;"> <div class="ai-rotate-option" style="visibility: hidden;" data-index="1" data-name="VGVjaHN0cm9uZyBHYW5nIFlvdXR1YmU=" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://youtu.be/Fojn5NFwaw8" target="_blank"><img src="https://securityboulevard.com/wp-content/uploads/2024/12/Techstrong-Gang-Youtube-PodcastV2-770.png" alt="Techstrong Gang Youtube"></a></div> <div class="clear-custom-ad"></div> </div></div> <div class="ai-rotate-option" style="visibility: hidden; position: absolute; top: 0; left: 0; width: 100%; height: 100%;" data-index="1" data-name="QVdTIEh1Yg==" data-time="MTA="> <div class="custom-ad"> <div style="margin: auto; text-align: center;"><a href="https://devops.com/builder-community-hub/?ref=in-article-ad-1&amp;utm_source=do&amp;utm_medium=referral&amp;utm_campaign=in-article-ad-1" target="_blank"><img src="https://devops.com/wp-content/uploads/2024/10/Gradient-1.png" alt="AWS Hub"></a></div> <div class="clear-custom-ad"></div> </div></div> </div> </div><p><strong>Lack of external attack surface management</strong><strong> (EASM)</strong></p><p>The Internet exposure has increased, the asset types are numerous and wide-ranging, and there is a lack of monitoring and mapping management of exposed assets, making it difficult to timely detect changes in external assets and locate internal assets.</p><div class="code-block code-block-15" style="margin: 8px 0; clear: both;"> <script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-2091799172090865" crossorigin="anonymous" type="3753301e5992af797ab441a3-text/javascript"></script> <!-- SB In Article Ad 1 --> <ins class="adsbygoogle" style="display:block" data-ad-client="ca-pub-2091799172090865" data-ad-slot="8723094367" data-ad-format="auto" data-full-width-responsive="true"></ins> <script type="3753301e5992af797ab441a3-text/javascript"> (adsbygoogle = window.adsbygoogle || []).push({}); </script></div><p><strong>Massive risks cannot be prioritized</strong></p><p>As the business develops and expands, the number of assets and new vulnerabilities is growing exponentially. Prioritizing risks has become a new problem that enterprises must face.</p><p><strong>Risk offline closed-loop efficiency is low</strong></p><p>The risk closed loop is not connected with the existing IT process system of the enterprise, resulting in difficulty in combining security work with daily operation and low disposal efficiency.</p><p>In response to the above pain points, NSFOCUS has proposed CTEM solution that covers all assets, vulnerabilities, and sensitive data based on vulnerability management, through internal and external asset mapping, continuous assessment and verification, and closed-loop operation.</p><h2>NSFOCUS CTEM: Implementation plan from exposure to governance</h2><div class="wp-block-image"> <figure class="aligncenter size-full"><a href="https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1.jpg"><img decoding="async" loading="lazy" width="800" height="505" src="https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1.jpg" alt="" class="wp-image-30061" srcset="https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1.jpg 800w, https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1-300x189.jpg 300w, https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1-768x485.jpg 768w, https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1-285x180.jpg 285w, https://nsfocusglobal.com/wp-content/uploads/2024/08/CTEM-Methodology-1-150x95.jpg 150w" sizes="auto, (max-width: 800px) 100vw, 800px"></a></figure> </div><p><strong>Scenario-based asset management</strong></p><p>NSFOCUS CTEM provides multi-dimensional asset management capabilities from the attacker’s perspective. By integrating internal and external data, companies can fully understand asset exposure and avoid security blind spots. For example, the solution supports monitoring of internal assets, shadow assets, Internet exposure threats, data leakage and other scenarios to ensure comprehensive and accurate asset management.</p><p><strong>Multi-source data integration</strong></p><p>NSFOCUS CTEM supports the access and integration of multi-source security data, including active scanning engines, passive traffic engines, EASM, BAS, penetration testing, CMDB, and third-party vendor security products. After data scrubbing and consolidation, it provides comprehensive analysis capabilities to help enterprises extract valuable security information from massive data.</p><p><strong>Intelligent risk assessment and convergence</strong></p><p>NSFOCUS CTEM uses deep learning to evaluate the priority of vulnerabilities and achieve continuous assessment and dynamic convergence of risks. Through vulnerability scanning, threat intelligence analysis and attack simulation, enterprises can quickly identify high-risk assets and take targeted protective measures.</p><h2>CTEM core value</h2><p><strong>Establish a unified asset </strong><strong>account</strong><strong> to improve asset visibility</strong></p><p>NSFOCUS CTEM accesses internal asset systems and Internet mapping data, uses traffic protocol analysis technology to passively identify assets, comprehensively sorts out customers’ internal and external network assets, and establishes a detailed asset account through comprehensive asset collection and analysis, which can clearly see the risk status of global assets.</p><p><strong>Accurate risk identification and positioning to </strong><strong>optimize</strong><strong> attack surface management</strong></p><p>NSFOCUS CTEM conducts a comprehensive assessment from multiple dimensions such as assets, vulnerabilities, weak passwords, non-compliant configurations and external attack surfaces to understand enterprise security risks. With the help of advanced vulnerability priority assessment methods, it guides users to track the mitigation status of key assets and key vulnerabilities, perform indicator operations, and present the results of security management work.</p><p><strong>Build a dynamic operating system to promote continuous improvement</strong></p><p>NSFOCUS CTEM has built a dynamic asset sorting and risk operation system that encourages organizations to continuously review and improve their own security practices, allowing users to clearly understand corporate asset risks, effectively close the loop for repair, and continuously accumulate corporate knowledge base in the process to improve risk operation capabilities.</p><div class="wp-block-image"> <figure class="aligncenter size-large"><a href="https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings.png"><img decoding="async" loading="lazy" width="1024" height="597" src="https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-1024x597.png" alt="" class="wp-image-26553" srcset="https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-1024x597.png 1024w, https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-300x175.png 300w, https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-768x448.png 768w, https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-1536x896.png 1536w, https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-2048x1194.png 2048w, https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-309x180.png 309w, https://nsfocusglobal.com/wp-content/uploads/2023/10/CTEM-Offerings-150x87.png 150w" sizes="auto, (max-width: 1024px) 100vw, 1024px"></a></figure> </div><p>When enterprises are in the stage of upgrading from traditional vulnerability management to closed-loop attack surface management, they need to invest more resources and cross-departmental collaboration to support complex security scenarios. NSFOCUS will continue to expand the adapter access capabilities and large language model application scenarios of the CTEM platform to guarantee enterprise security.</p><p>Gartner® does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p><p>GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved.</p><p>The post <a rel="nofollow" href="https://nsfocusglobal.com/nsfocus-was-selected-as-a-representative-provider-of-gartner-innovation-insight-adversarial-exposure-validation-in-china/">NSFOCUS was Selected as a Representative Provider of Gartner® “Innovation Insight: Adversarial Exposure Validation in China”</a> appeared first on <a rel="nofollow" href="https://nsfocusglobal.com/">NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.</a>.</p><div class="spu-placeholder" style="display:none"></div><p class="syndicated-attribution">*** This is a Security Bloggers Network syndicated blog from <a href="https://nsfocusglobal.com/">NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.</a> authored by <a href="https://securityboulevard.com/author/0/" title="Read other posts by NSFOCUS">NSFOCUS</a>. Read the original post at: <a href="https://nsfocusglobal.com/nsfocus-was-selected-as-a-representative-provider-of-gartner-innovation-insight-adversarial-exposure-validation-in-china/">https://nsfocusglobal.com/nsfocus-was-selected-as-a-representative-provider-of-gartner-innovation-insight-adversarial-exposure-validation-in-china/</a> </p>