Staging server. Your account won't work here. Build: dev@Dec/03-11:58
Hardenize has joined Red Sift! Find out more in our blog post.

Blog

Welcome to the Hardenize blog. This is where we will document our journey as we make the Internet a more secure place and have some fun and excitement along the way.

21 Mar
2024

Announcing Technologies V1

by Billy McDiarmid

“What’s running on our assets?” is often the next question our customers ask once they’ve successfully built an inventory of their domains, hosts, certificates, IP addresses, and cloud resources that is kept up to date continuously and automatically. To help our customers answer this, we’re delighted to announce Technologies V1 which is available now at no additional charge to paying customers.

The frameworks, libraries, and services used in websites today are wide ranging in scope. Whether it’s the languages used to build the application, or the advertising, payment processing, and content management systems used to run a business, the technologies used adds another layer of complexity to the attack surface. Security teams should have visibility of this as, and knowing what is being used where is a critical part of identifying exposure as part of the scoping stage of a CTEM programme.

  • It aids precise identification of where the risk in your estate could be, making it easier to manage the risks that come from existing and new vulnerabilities.
  • Understanding the technologies used supports adherence with your compliance requirements. Having an inventory of software being used to deliver services is an essential part of frameworks and regulations like NIST, NIS2, HIPAA, and PCI-DSS.
  • Visibility of the technologies that are used helps with the decision making that’s required when a security analyst is triaging and prioritising coming from the attack surface. It will also speed up response times.

During our assessment process, if HTTP or HTTPS is found on a host, then our headless browser will detect then display the web page itself and the technologies, libraries and third-party services used on it. We find technologies in more than 100 different categories. The technology found and the category will be displayed on the host assessment, and has also been added to the downloadable PDF assessment.