7 ASM – Attack Service Management
7 ASM is a system for mapping and identifying vulnerabilities and potential threats to the IT environment. The service helps organizations gain a continuous overview of their digital attack surface, identify risks, and create the ability to act proactively. The system provides an overview of the IT environment from a hacker's perspective.
Main features
- Continuous monitoring: The system monitors the IT environment in real time to detect new vulnerabilities, threats, and anomalies. This includes both internal and external assets, cloud services, and third-party integrations.
- Vulnerability analysis: Identifies and prioritizes vulnerabilities based on risk and likelihood of exploitation. The system uses threat intelligence and industry databases to respond quickly to new threats.
- Incident management: When incidents are detected, the organization has access to an incident response team that can act quickly, both with technical measures and communication support internally and externally. (Requires 7 IRT as a service or higher)
- The service offers clear dashboards and regular reports on security status, incidents, and recommended actions. This is summarized in a security score that measures against KPIs of approved levels for each component.
- By constantly analyzing and adjusting security settings, the risk of incidents is minimized.
Examples of areas of application
- Monitoring of the entire digital environment, including clouds, endpoints, and external services.
- Identification of unknown or unsanctioned resources.
- Support for compliance with regulations such as NIS2, GDPR, and ISO.
- Basis for risk and safety reports to management and the board.
Delivery and support
The service is delivered as a cloud-based solution with 24/7 monitoring and access to security experts. Onboarding and integration are smooth with the support of specialists.