Help Center
Continuous Threat Exposure Management (CTEM)
Getting Started
Quick Start Checklist
Platform Overview
Platform Navigation
Account Settings
Events & Notifications
Accessibility Functions
Onboarding
User Management
Asset Tags
Scanning & Testing
Scanning
Internal Testing Via JumpBox
API Testing
Penetration Testing
Authenticated Testing
Licence Coverage
Mobile Application Security Testing
Scheduling Scans
Retesting
Troubleshooting Asset Blockers
Types of Asset Blockers
Asset Configuration Blocker
Licence Asset Blocker
Credentials Asset Blocker
Asset Access Blocker
Onboarding Asset Blocker
General Asset Blockers
Vulnerability Management
SLA Settings
Licence Management
Asset Creation
False Positives & Negatives
Vulnerability Risk Ratings
Generating a retest link
Attack Surface Management
What is ASM?
Creating a new Investigation
Continuous Threat Exposure Management (CTEM)
Getting Started with CTEM
CTEM: Scoping
CTEM: Discovery
CTEM: Prioritization
CTEM: Validation
CTEM: Mobilization
Integrations
API Documentation
Splunk
Microsoft
Amazon
Google
Axonius
DevOps & CI/CD
Palo Alto
DefectDojo
FreshServices
Atlassian
Cisco
ServiceNow
Slack
Salesforce
Zapier
Reporting
Scheduled Exports
Creating reports
Security Best Practices
Secure Coding Guidelines
Security Testing
Advanced Features & Customizations
CloudHook
Organization Settings
Scanning by AWS tags
Asset Prioritization
Troubleshooting & FAQs
Hosting Information
Artificial Intelligence & Machine Learning
Training & references
Application Security Posture Management
Updates & Announcements
Release Notes
Back to home
Help Center
Continuous Threat Exposure Management (CTEM)
Getting Started
Quick Start Checklist
Platform Overview
Platform Navigation
Account Settings
Events & Notifications
Accessibility Functions
Onboarding
User Management
Asset Tags
Scanning & Testing
Scanning
Internal Testing Via JumpBox
API Testing
Penetration Testing
Authenticated Testing
Licence Coverage
Mobile Application Security Testing
Scheduling Scans
Retesting
Troubleshooting Asset Blockers
Types of Asset Blockers
Asset Configuration Blocker
Licence Asset Blocker
Credentials Asset Blocker
Asset Access Blocker
Onboarding Asset Blocker
General Asset Blockers
Vulnerability Management
SLA Settings
Licence Management
Asset Creation
False Positives & Negatives
Vulnerability Risk Ratings
Generating a retest link
Attack Surface Management
What is ASM?
Creating a new Investigation
Continuous Threat Exposure Management (CTEM)
Getting Started with CTEM
CTEM: Scoping
CTEM: Discovery
CTEM: Prioritization
CTEM: Validation
CTEM: Mobilization
Integrations
API Documentation
Splunk
Microsoft
Amazon
Google
Axonius
DevOps & CI/CD
Palo Alto
DefectDojo
FreshServices
Atlassian
Cisco
ServiceNow
Slack
Salesforce
Zapier
Reporting
Scheduled Exports
Creating reports
Security Best Practices
Secure Coding Guidelines
Security Testing
Advanced Features & Customizations
CloudHook
Organization Settings
Scanning by AWS tags
Asset Prioritization
Troubleshooting & FAQs
Hosting Information
Artificial Intelligence & Machine Learning
Training & references
Application Security Posture Management
Updates & Announcements
Release Notes
Continuous Threat Exposure Management (CTEM)
Edgescan works with customers to build a continuous process & program to manage cyber risk.
Getting Started with CTEM
Is Edgescan a Continuous Threat Exposure Management (CTEM) provider?
CTEM: Scoping
What is the CTEM Scoping phase?
CTEM: Discovery
What is the CTEM Discovery phase?
CTEM: Prioritization
What is the CTEM Prioritization phase?
CTEM: Validation
What is the CTEM Validation phase?
CTEM: Mobilization
What is the CTEM Mobilization phase?