Frequently Asked Questions

Shield dashboard highlighting critical network information.

Attacker-centric vulnerabilitiy management

Go beyond CVEs and view your network like an attacker. Take action on the most critical risks on your most critical assets.
Book a demo
Shield dashboard highlighting critical network information.

Attacker-centric vulnerabilitiy management

Go beyond CVEs and view your network like an attacker. Take action on the most critical risks on your most critical assets.
Book a demo

What is Continuous Exposure Management?

Shield's Continuous Exposure Management identifies and prioritizes security exposures like vulnerabilities, misconfigurations, and credential issues, focusing on preventing potential attack paths.

What are the shortcomings of traditional vulnerability management?

Traditional vulnerability management mainly identifies known vulnerabilities. Shield addresses this gap by also detecting misconfigurations and credential issues, offering a comprehensive security assessment.

What security gaps are addressed by Shield beyond CVEs?

Shield addresses security gaps beyond CVEs by focusing on misconfigurations, identity exposures, and other potential security weaknesses, providing a more complete view of cybersecurity risks.

Can Shield track changes in IT environments?

Shield continuously monitors IT environments, detecting new vulnerabilities, misconfigurations, and security gaps as they arise, ensuring up-to-date security posture management.

What inspired Shield's creation?

The creation of Shield was motivated by our co-founders, Teddy and Michael, experience in penetration testing. They recognized the limitations of existing vulnerability management solutions in providing a thorough, context-driven analysis of network exposures.

What is the difference between Continuous Exposure Management and vulnerability management?

Continuous Exposure Management offers a broader, strategic approach to cybersecurity, proactively identifying and addressing potential threats before exploitation, beyond just patching known vulnerabilities.

Does Shield find traditional vulnerabilities?

Yes, Shield identifies traditional vulnerabilities (CVEs) and extends its detection to include misconfigurations and credential issues, offering a more thorough security assessment.

Why is Continuous Exposure Management important?

Continuous Exposure Management is crucial for staying ahead of emerging cyber threats, proactively identifying and addressing security issues before they lead to attacks.

How does Shield prioritize threats and exposures?

Shield uses a combination of CVSS, EPSS, CISA KEV, and our proprietary threat library to evaluate and rank threats, focusing remediation on exposures that pose the greatest risk to critical assets.

How is Shield priced?

Shield offers volume-based pricing based on the number of assets being protected. For precise pricing, please contact our team directly through the 'Book a demo' link.

Is Shield multi-tenant?

Yes, Shield is designed for Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs), featuring a multi-tenant architecture. This allows service providers to manage multiple client environments efficiently, under one unified platform, ensuring security management is streamlined and scalable.

Does Shield integrate with existing tools and infrastructure?

Shield is designed for seamless integration with a broad range of existing security tools and IT infrastructure. This flexibility ensures that MSPs and MSSPs can incorporate Shield into their service offerings without disrupting existing workflows or systems.

Does Shield offer support and training for MSPs and MSSPs?

Shield provides comprehensive support and training resources tailored to the needs of MSPs and MSSPs. This includes dedicated technical support, training materials, and resources designed to help service providers maximize the value of Shield for their clients.

Scalability: handling small to large enterprises?

Shield is scalable, designed to accommodate the security needs of small businesses to large enterprises. This scalability ensures MSPs and MSSPs can offer a consistent level of service across clients of varying sizes and complexities.

Starting with Shield is simple, fast, and free.

Book a demo