icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading CyCognito External Attack Surface and Risk Management Add-On
SHA256 checksum (cycognito-external-attack-surface-and-risk-management-add-on_140.tgz) bc69916407491e24f7f4400e5ca18b71678b7708a42281295c45cac7532b3e24 SHA256 checksum (cycognito-external-attack-surface-and-risk-management-add-on_130.tgz) 2bf8a1c133b8f7537f544eab3f1aff5c650b46d9c922ed0680a49f7082613f0e SHA256 checksum (cycognito-external-attack-surface-and-risk-management-add-on_120.tgz) d56c8d1471f7f376eff39f993ea6e80fa97ae074a28a4b1e74b271bd4320d26c SHA256 checksum (cycognito-external-attack-surface-and-risk-management-add-on_110.tgz) e0b98a4bc0d116a545b3edf6ac22df5fc9422392e90f6e2e22e1b1e0fd58ba38 SHA256 checksum (cycognito-external-attack-surface-and-risk-management-add-on_100.tgz) 0b38128e1eefe29ab92f2e538cf8b7b85874ac65ebf9ca04975e7f85b0389fb3
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

CyCognito External Attack Surface and Risk Management Add-On

Splunk Cloud
Overview
Details
Together, CyCognito and Splunk empower companies to take control of external risk and attack surface management by identifying critical security risks and correlating them with events seen within the Splunk platform. With CyCognito’s attacker’s perspective combined with features like Splunk’s Risk-Based Alerting, security teams can detect and react to more threats while drastically reducing the number of false positives they experience.

Integrating asset and vulnerability data from CyCognito into Splunk automatically sends the highest risk issues to the Splunk SIEM. Dashboards provide security teams across the organization visibility into external risks they may not have otherwise known existed. Security Operations teams can easily be alerted to these new threats – complete with step-by-step exploitation instructions to validate risk, safe sandbox to simulate attacks, and indicators of compromise (IOCs) – and use integrated features to decrease your MTTR, ensuring your enterprise is protected from future attacks.

The Challenge

You’re faced with adapting to a dynamic threat landscape, evolving adversary tactics, advanced threats and evolving business demands — and your existing security technologies can’t keep up.

To meet these new challenges and reduce mean-time-to-detect, modern security teams need data-driven capabilities,
contextual business-centric insights, and timely and accurate threat detection techniques. Security teams can more quickly detect, investigate, and respond to attacks when all their machine data is centralized and utilized.

At CyCognito, we believe all cyber risk is business risk - we empower security teams to see their attack surface the way attackers do and work with partners that make identifying and fixing the most critical security issues seamless.

The Solution

Together, CyCognito and Splunk empower companies to take control of external risk and attack surface management
by identifying critical security risks and correlating them with events seen within the Splunk platform. With CyCognito’s attacker’s perspective combined with features like Splunk’s Risk-Based Alerting, security teams can detect and react to more threats while drastically reducing the number of false positives they experience.

Integrating asset and vulnerability data from CyCognito into Splunk automatically sends the highest risk issues to the Splunk SIEM. Dashboards provide security teams across the organization visibility into external risks they may not have otherwise known existed. Security Operations teams can easily be alerted to these new threats – complete with step-by-step exploitation instructions to validate risk, safe sandbox to simulate attacks, and indicators of compromise (IOCs) – and use integrated features to decrease your MTTR, ensuring your enterprise is protected from future attacks.

Key features of CyCognito External Risk Management

  • Graph business and asset relationships – Find all of your exposed assets and easily determine which business unit or team owns them
  • Provide business context with evidence – Evaluate risk by determining the business purpose and data residing in each asset, complete with automated comprehensive evidence empowering validation and satisfying auditor requirements
  • Continuous multi-factor security testing at scale – Automatically detect risk and validate potential attack vectors across your entire external IT ecosystem: SaaS, subsidiaries, interconnected third-parties, and event IaaS
  • Security issue identification and prioritization – Commercial-grade vulnerability scanning, pen test maneuvers, DAST (dynamic application security testing), weak credentials, authentication bypass, configuration issues and more identifies top issues and the path to remediating them
  • Faster remediation – Close the window of attack in days versus months, which reduces breach likelihood

Key Benefits of the CyCognito App for Splunk

  • Tightly integrated solution feeds relevant, context rich data into Splunk Enterprise, using features like risk-based alerting to provide faster, more precise threat detection and response
  • Pre-built dashboards provide visibility and access to your externally facing assets and vulnerabilities
  • Advanced search features help to pinpoint issues contributing to organizational risk and exposure
  • Contextualized, enhanced alerts for external assets
  • Automated workflows using Splunk alerts can be triggered from changes to your external attack surface

Release Notes

Version 1.4.0
Nov. 28, 2024
  • Migrated to Splunk add-on builder v4.2.0
  • Updated the Splunk SDK version to 2.0.2
Version 1.3.0
April 3, 2024
  • Added support for collecting 'Resolved issues' and 'Removed assets' data. Edit the existing inputs to reflect the changes.
  • Migrated the TA with the Splunk add-on builder v4.1.4
Version 1.2.0
Feb. 22, 2024
  • Enhanced field extractions
Version 1.1.0
Oct. 10, 2023

Migrated to Splunk add-on builder v4.1.3

Version 1.0.0
Sept. 22, 2022

Version 1.0.0

  • Added support for data collection of CyCognito Issues and Assets.
  • Added Risk based Alerting correlation searches to identify risky events of CyCognito Issues and Assets.

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.