Help Center
Continuous Threat Exposure Management (CTEM)
Getting Started
Quick Start Checklist
Platform Overview
Platform Navigation
Account Settings
Events & Notifications
Accessibility Functions
Onboarding
User Management
Asset Tags
Scanning & Testing
Scanning
Internal Testing Via JumpBox
API Testing
Penetration Testing
Authenticated Testing
Licence Coverage
Mobile Application Security Testing
Scheduling Scans
Vulnerability Management
SLA Settings
Licence Management
Asset Creation
False Positives & Negatives
Vulnerability Risk Ratings
Generating a retest link
Attack Surface Management
What is ASM?
Creating a new Investigation
Continuous Threat Exposure Management (CTEM)
Getting Started with CTEM
CTEM: Scoping
CTEM: Discovery
CTEM: Prioritization
CTEM: Validation
CTEM: Mobilization
Integrations
API Documentation
Splunk
Microsoft
Amazon
Google
Axonius
DevOps & CI/CD
Palo Alto
DefectDojo
FreshServices
Atlassian
Cisco
ServiceNow
Slack
Salesforce
Zapier
Reporting
Scheduled Exports
Creating reports
Security Best Practices
Secure Coding Guidelines
Security Testing
Advanced Features & Customizations
CloudHook
Organization Settings
Scanning by AWS tags
Asset Prioritization
Troubleshooting & FAQs
Hosting Information
Artificial Intelligence & Machine Learning
Training & references
Updates & Announcements
Release Notes
Back to home
Help Center
Continuous Threat Exposure Management (CTEM)
Getting Started
Quick Start Checklist
Platform Overview
Platform Navigation
Account Settings
Events & Notifications
Accessibility Functions
Onboarding
User Management
Asset Tags
Scanning & Testing
Scanning
Internal Testing Via JumpBox
API Testing
Penetration Testing
Authenticated Testing
Licence Coverage
Mobile Application Security Testing
Scheduling Scans
Vulnerability Management
SLA Settings
Licence Management
Asset Creation
False Positives & Negatives
Vulnerability Risk Ratings
Generating a retest link
Attack Surface Management
What is ASM?
Creating a new Investigation
Continuous Threat Exposure Management (CTEM)
Getting Started with CTEM
CTEM: Scoping
CTEM: Discovery
CTEM: Prioritization
CTEM: Validation
CTEM: Mobilization
Integrations
API Documentation
Splunk
Microsoft
Amazon
Google
Axonius
DevOps & CI/CD
Palo Alto
DefectDojo
FreshServices
Atlassian
Cisco
ServiceNow
Slack
Salesforce
Zapier
Reporting
Scheduled Exports
Creating reports
Security Best Practices
Secure Coding Guidelines
Security Testing
Advanced Features & Customizations
CloudHook
Organization Settings
Scanning by AWS tags
Asset Prioritization
Troubleshooting & FAQs
Hosting Information
Artificial Intelligence & Machine Learning
Training & references
Updates & Announcements
Release Notes
Continuous Threat Exposure Management (CTEM)
Edgescan works with customers to build a continuous process & program to manage cyber risk.
Getting Started with CTEM
Is Edgescan a Continuous Threat Exposure Management (CTEM) provider?
CTEM: Scoping
What is the CTEM Scoping phase?
CTEM: Discovery
What is the CTEM Discovery phase?
CTEM: Prioritization
What is the CTEM Prioritization phase?
CTEM: Validation
What is the CTEM Validation phase?
CTEM: Mobilization
What is the CTEM Mobilization phase?