Insights (Technologies tab)

Use the External Attack Surface > Insights > Technologies tab to view the technology stacks used by assets that EASM is monitoring. The Technologies tab provides you with insights into various technologies utilized by your organization, enhancing your ability to manage and understand the threats.

For a workspace, you can filter the number of vulnerable technologies, technologies that can be exploited, and the number of technologies with advisories. There is an All Workspaces view but it is limited to only Insights and user cannot open assets/exposures/technologies tabs in this view. If you only want to see data for a specific workspace that you are a member of, select it from the Workspace list at the top.

When you add a seed, Ivanti’s internet exposure scanner will assess that seed’s attack surface, and the associated asset and exposure information appears on this page. Each seed that you add can only belong to a single workspace.

External Attack Surface pages in Ivanti Neurons does not display data initially. You must first provide Manage Seeds to your organization's presence on the internet.

At the top of the page are your Technologies key performance indicators:

  • Total Technologies, provide the total number of technologies used in the selected workspace.

  • Technologies with Vulnerabilities, provide the total number of vulnerable technologies.

  • Technologies with Exploit Risks, provide the total number of exploitable technologies.

  • Technologies with Security Advisories, provide the total number of vulnerable technologies with security advisories issued.

  • Technologies with Ransomware provide the total number of vulnerable technologies with ransomware risks.

Selecting a blue number in an indicator applies a filter in the Technologies list so it shows only those items. Select the filter button on a column header to see its selectable filters.
The column chooser button to the left of the search field lets you select the columns which are visible.

Quick Filters at the top of the table provide additional filtering based on data gathered from your assets. The available selections within a quick filter depend on what EASM has detected in your assets. Quick filters work in combination with column filters.

Use the Export button to export the exposures list to Excel (.xslx) or text (.csv). Any column filters that are applied will also apply to the export.

Viewing Technology Details

Selecting a technology in the list displays the details page for that technology. This page provides extensive information on this technology:

  • Version – Version of the technology being used.

  • Technology Category - Libraries, third-party software, hosting technologies, and other relevant technologies.

  • Threats - Lists the threats associated with the technology.

  • Security advisories available – Displays ‘Yes’ if there are any advisories.

  • First seen – The start date from when the technology is used in the workspace.

  • Last seen - The day the technology was last used in the workspace.