<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/william-graf/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/william-graf</link><item><guid isPermaLink="false">130ce77d-484b-4ab2-8982-e1025c239afc</guid><link>https://www.ivanti.com/en-gb/blog/exposure-management-vs-vulnerability-management</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/william-graf</atom:uri></atom:author><category>Security</category><title>Exposure Management vs. Vulnerability Management: Which Delivers Real Risk Reduction?</title><description>&lt;p&gt;Vulnerability management has served organisations and the cybersecurity industry for years. It is a capable practice that has helped companies defend their attack surface and prevent threat actors from exploiting vulnerabilities.&lt;/p&gt;

&lt;p&gt;But technology and IT infrastructure have evolved. Vulnerability management no longer can meet the challenges that come with this evolution. Now, &lt;a href="https://www.ivanti.com/en-gb/exposure-management"&gt;exposure management&lt;/a&gt; is here to provide an even more holistic approach to endpoint security that covers the areas vulnerability management falls short in.&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/em_vs_vm_hero_diagram_1.png"&gt;&lt;/p&gt;

&lt;p&gt;Let’s dive into the distinctions so that you can decide how to protect your organisation.&lt;/p&gt;

&lt;h2&gt;What is vulnerability management?&lt;/h2&gt;

&lt;p&gt;Vulnerability management is a cybersecurity practice that includes continuous and proactive identification, assessment, prioritisation and remediation of vulnerabilities hackers can use to infiltrate your organisation.&lt;/p&gt;

&lt;p&gt;However, it’s important to note that there are two different types of vulnerability management:&lt;/p&gt;

&lt;table&gt;
	&lt;tbody&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Legacy vulnerability management &lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;&lt;strong&gt;Risk-based vulnerability management &lt;/strong&gt;&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
		&lt;tr&gt;
			&lt;td&gt;
			&lt;p&gt;Involves attempting to remediate as many vulnerabilities as possible. This often results in substantial effort and unrealistic expectations for success while presenting a false sense of security.&lt;/p&gt;
			&lt;/td&gt;
			&lt;td&gt;
			&lt;p&gt;An evolved vulnerability management practice that accounts for risk in vulnerability prioritisation. This allows organisations to patch the critical vulnerabilities that pose a real-world threat, protecting your organisation from threat actors while also ensuring a strong security posture and effectively managing resources.&lt;/p&gt;
			&lt;/td&gt;
		&lt;/tr&gt;
	&lt;/tbody&gt;
&lt;/table&gt;

&lt;p&gt;A &lt;a href="https://www.ivanti.com/en-gb/products/risk-based-vulnerability-management"&gt;risk-based vulnerability management&lt;/a&gt; approach goes beyond legacy vulnerability management, providing your organisation with the following benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Continuously monitors vulnerabilities for proactive security.&lt;/li&gt;
	&lt;li&gt;Identifies actively exploited exposures.&lt;/li&gt;
	&lt;li&gt;Enables effective remediation efforts.&lt;/li&gt;
	&lt;li&gt;Reduces risk.&lt;/li&gt;
	&lt;li&gt;Assists organisations with reaching compliance.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;While risk-based vulnerability management covers a lot of bases, it still doesn’t offer the holistic approach to cybersecurity that organisations need to stay safe and secure. That’s where exposure management comes into the picture.&lt;/p&gt;

&lt;h2&gt;What is exposure management?&lt;/h2&gt;

&lt;p&gt;Exposure management is an evolving cybersecurity practice that provides comprehensive visibility across your entire attack surface. It allows IT and Security teams to identify exactly where your organisation may be exposed while including risk-based prioritisation, remediation and more. Exposure management focuses on maintaining an organisation’s self-determined &lt;a href="https://www.ivanti.com/blog/risk-appetite" target="_blank" rel="noopener"&gt;risk appetite&lt;/a&gt;. Therefore, it encompasses four stages:&lt;/p&gt;

&lt;p&gt;&lt;img alt="graphic of 4 circles" src="https://static.ivanti.com/sites/marketing/media/images/blog/2026/01/em_vs_vm_hero_diagram_2.png"&gt;&lt;/p&gt;

&lt;p&gt;Like risk-based vulnerability management, exposure management helps prioritise which vulnerabilities and exposures should be addressed first based on real-world risk, but it goes further by factoring in what is most relevant to your specific business. This cybersecurity approach ensures that the highest-risk exposures are remediated proactively, before they can be exploited by attackers.&lt;/p&gt;

&lt;h2&gt;Exposure management vs. vulnerability management: What’s the difference?&lt;/h2&gt;

&lt;p&gt;Exposure management represents the next evolution beyond traditional vulnerability management. While vulnerability management primarily focuses on identifying and addressing weaknesses in servers and endpoints, exposure management expands this scope by delivering complete visibility across the entire attack surface.&lt;/p&gt;

&lt;p&gt;In terms of key differences, these include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Exposure management is designed for newer types of assets: Modern IT environments have grown increasingly complex, now including assets such as Software-as-a-Service (SaaS) applications, IoT devices, cloud infrastructure and more. Exposure management is designed to account for these &lt;a href="https://www.ivanti.com/en-gb/products/external-attack-surface-management"&gt;newer kinds of assets&lt;/a&gt;, ensuring IT and security teams can identify risks wherever they exist in the organisation. By doing so, exposure management provides a comprehensive understanding of all potential entry points. This empowers organisations to manage and reduce risk more effectively than ever before.&lt;/li&gt;
	&lt;li&gt;Exposure management understands the reality and champions a risk appetite approach: Again, vulnerability management is centred around patching vulnerabilities. While risk-based vulnerability management provides risk prioritisation and remediation orchestration, the practice doesn’t acknowledge the fact that it’s not realistic for an organisation to patch every vulnerability. The term risk appetite is an organisation’s self-determined measurement of how much risk it is willing to accept. This is a significantly more realistic approach that rallies the organisation together to achieve shared KPIs to measure success consistently across teams.&lt;/li&gt;
	&lt;li&gt;Exposure management goes beyond CVEs and CVSS: Vulnerability management focuses primarily on &lt;a href="https://www.ivanti.com/blog/common-vulnerability-scoring-system-cvss" target="_blank" rel="noopener"&gt;common vulnerabilities and exposures (CVEs)&lt;/a&gt;. While CVEs are an important target for most organisations, they are not the only catalysts that threat actors can use to cause damage to your organisation. Hackers can still leverage the following exposures (that vulnerability management doesn’t cover) to infiltrate your organisation:&lt;/li&gt;
	&lt;li&gt;Misconfigurations.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-gb/products/application-security-posture-management"&gt;Application security&lt;/a&gt; issues.&lt;/li&gt;
	&lt;li&gt;IT system policies.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-gb/products/app-control-and-privileged-management"&gt;Privileged access controls&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Tying it back to the holistic approach, exposure management covers all these modern assets. Furthermore, vulnerability management is heavily reliant on the Common Vulnerability Scoring System (CVSS) for remediation prioritisation. While CVSS is a solid measurement for severity, it provides an effective risk-adjusted perspective.&lt;/p&gt;

&lt;p&gt;Risk is an important factor to keep in mind since it includes whether a vulnerability has been exploited, if it has ties to ransomware/malware or is currently trending. Not factoring risk creates a false sense of urgency with CVSS, causing IT and security teams to waste time and resources on vulnerabilities that are not truly urgent.&lt;/p&gt;

&lt;h2&gt;How to safeguard your organisation&lt;/h2&gt;

&lt;p&gt;Now that we have covered the differences between exposure management and vulnerability management, it’s time to leverage the advantages that exposure management provides. Learn how Ivanti’s &lt;a href="https://www.ivanti.com/en-gb/exposure-management"&gt;exposure management&lt;/a&gt; portfolio can elevate your IT and security teams.&lt;/p&gt;
</description><pubDate>Thu, 29 Jan 2026 13:00:01 Z</pubDate></item><item><guid isPermaLink="false">9c623c33-3f66-4658-a5b5-28435d6f9760</guid><link>https://www.ivanti.com/en-gb/blog/understanding-external-attack-surface-management</link><atom:author><atom:name>William Graf</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/william-graf</atom:uri></atom:author><category>Security</category><title>Understanding External Attack Surface Management: How It Works and Why It’s More Critical Than Ever</title><description>&lt;p&gt;Attack surfaces can expand without your organisation even realising it. And, lacking visibility into your external-facing assets and the vulnerabilities they may contain can lead to significant security risks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/products/external-attack-surface-management"&gt;External attack surface management (EASM)&lt;/a&gt; is a cybersecurity approach designed to safeguard your external assets and strengthen your organisation's overall security posture. It does this by providing full visibility into these assets (and associated vulnerabilities) that could be exploited by threat actors.&lt;/p&gt;

&lt;p&gt;In this article, we’ll walk you through how EASM works, the risks involved with overlooking your external attack surfaces, the benefits as well as where EASM sits in the broader practice of exposure management.&lt;/p&gt;

&lt;h2&gt;How external attack surface management works&lt;/h2&gt;

&lt;p&gt;EASM is the practice of identifying and managing your external-facing assets (e.g., websites, APIs, etc.) to prevent security breaches. Additionally, the process includes &lt;a href="https://www.ivanti.com/en-gb/blog/attack-surface-discovery"&gt;identifying attack surface gaps&lt;/a&gt; that can expose&amp;nbsp;your organisation to cybersecurity risks.&lt;/p&gt;

&lt;p&gt;EASM helps fight unwanted expansion of your attack surface through visibility, enabling your organisation to stay up to date on your potential vulnerabilities. Leveraging EASM provides the following benefits:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Additional source of discovery and asset visibility.&lt;/li&gt;
	&lt;li&gt;Curbs cloud sprawl and shadow IT.&lt;/li&gt;
	&lt;li&gt;Reduces AI-powered phishing tactics.&lt;/li&gt;
	&lt;li&gt;Analyses and prioritises exposures.&lt;/li&gt;
	&lt;li&gt;Detects data leakage.&lt;/li&gt;
	&lt;li&gt;Reduces phishing and social engineering attacks.&lt;/li&gt;
	&lt;li&gt;Adheres to regulatory compliance requirements.&lt;/li&gt;
	&lt;li&gt;Extend your vendor risk management by providing external risk perspective of third-party vendors.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;EASM involves multiple key stages, including Discovery, Assessment, Prioritisation, Reporting and Remediation.&lt;/p&gt;

&lt;h3&gt;Discovery&lt;/h3&gt;

&lt;p&gt;As mentioned above, EASM involves monitoring your external attack surface to identify those assets to both catalogue them and uncover vulnerabilities that could lead to a hacker infiltrating your organisation.&lt;/p&gt;

&lt;p&gt;It doesn’t involve an invasive scan. Rather, it involves a passive crawl of your external attack surface, and all you need is a URL to start the process. EASM solutions, for example, use public data in combination with security intelligence.&amp;nbsp; The assets that make up your external attack surface include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Web servers.&lt;/li&gt;
	&lt;li&gt;DNS servers.&lt;/li&gt;
	&lt;li&gt;IoT devices.&lt;/li&gt;
	&lt;li&gt;Network edge devices.&lt;/li&gt;
	&lt;li&gt;Application servers.&lt;/li&gt;
	&lt;li&gt;Certificates.&lt;/li&gt;
	&lt;li&gt;Cloud-based tools.&lt;/li&gt;
	&lt;li&gt;Shadow IT.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Learn more: &lt;a href="https://www.ivanti.com/en-gb/blog/attack-surface-discovery"&gt;How to Identify Your Organization’s Attack Surface&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;Assessment&lt;/h3&gt;

&lt;p&gt;Thorough and continuous assessment is essential to understand your organisation's risk landscape and effectively prioritise remediation efforts. At this stage, your organisation evaluates whether the assets identified during the discovery process are in use and if they are harbouring vulnerabilities. EASM solutions do this by identifying publicly disclosed security weaknesses, outdated software versions and more.&lt;/p&gt;

&lt;p&gt;By examining these assets for vulnerabilities and other potential security risks, you gain crucial insights into your security posture.&lt;/p&gt;

&lt;h3&gt;Prioritisation&lt;/h3&gt;

&lt;p&gt;Once vulnerabilities are identified, the next step is to determine which ones to address first based on their risk to your organisation. Since it’s often impractical to remediate every vulnerability, &lt;a href="https://www.ivanti.com/en-gb/blog/vulnerability-prioritization-guide"&gt;risk scoring methods&lt;/a&gt; help you assess the urgency and impact of each exposure. This allows your security teams to focus on the most critical issues, streamlining the remediation process and ensuring that resources are allocated effectively.&lt;/p&gt;

&lt;h3&gt;Reporting and remediation&lt;/h3&gt;

&lt;p&gt;The next stage in EASM is to report on these risks and begin remediation. EASM solutions enable you to generate comprehensive reports that offer an overview of your external attack surface, along with detailed breakdowns of critical vulnerabilities. These reports are invaluable for communicating the nature and urgency of potential threats, helping stakeholders understand the importance of prompt remediation and informing decisions.&lt;/p&gt;

&lt;h2&gt;The risks involved with not monitoring your external attack surface&lt;/h2&gt;

&lt;p&gt;&lt;img alt="Central gray circle labeled &amp;quot;Attack Surface&amp;quot; surrounded by four colored circles labeled &amp;quot;Shadow IT,&amp;quot; &amp;quot;Cloud-Based Tools,&amp;quot; &amp;quot;Supply Chain Partners,&amp;quot; and &amp;quot;IoT Devices,&amp;quot; each with relevant icons, illustrating different factors that expand an organization’s attack surface." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-attack-surface.png"&gt;&lt;/p&gt;

&lt;p&gt;If your organisation does not have full knowledge of the external attack surface, you risk having unknown or unmonitored assets or misconfigurations that open you up to attack, resulting in reputational damage, financial loses and more.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The lack of visibility into shadow IT, misconfigured or forgotten services allows for easy entry points for attackers. &lt;a href="https://www.computerweekly.com/news/366558437/Shadow-IT-use-at-Okta-behind-series-of-damaging-breaches" rel="noopener" target="_blank"&gt;According to Computer Weekly&lt;/a&gt;,&amp;nbsp; identity and access management company Okta was exposed to multiple security breaches due to shadow IT.&lt;/p&gt;

&lt;p&gt;Furthermore, these assets are visible to anyone on the internet. It doesn’t require any special skills for someone to obtain this information about your external attack surface, meaning it is straightforward for a threat actor to gain access to your organisation if you don’t enact proper measurements.&lt;/p&gt;

&lt;p&gt;Now that you have an overview of external attack surface management, it’s important to understand that it’s just one part of your larger attack surface, which is where &lt;a href="https://www.ivanti.com/glossary/exposure-management" target="_blank" rel="noopener"&gt;exposure management&lt;/a&gt; comes into play.&lt;/p&gt;

&lt;h2&gt;How EASM plays into exposure management&lt;/h2&gt;

&lt;p&gt;&lt;img alt="Side-by-side columns titled &amp;quot;Exposure Assessment&amp;quot; in purple and &amp;quot;Exposure Remediation&amp;quot; in red. Under &amp;quot;Exposure Assessment&amp;quot; are boxes labeled Visibility, Aggregation and Prioritization, Cyber Asset Discovery and Inventory, Proactive Self-Healing, External Attack Surface Management (EASM), Risk-Based Vulnerability Management (RBVM), and Vulnerability Intelligence. Under &amp;quot;Exposure Remediation&amp;quot; are boxes labeled Mobilization, Remediation, IT Service Management (ITSM), Proactive Self-Healing, and Remediation." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-ivanti-exposure-management.png"&gt;&lt;/p&gt;

&lt;p&gt;Exposure management focuses on asset visibility, exposure aggregation, risk-based prioritisation and remediation of exposures. It’s a comprehensive cybersecurity practice that helps organisations define their risk appetite and keep levels within acceptable bounds.&lt;/p&gt;

&lt;p&gt;EASM is just one part of exposure management (visibility, as shown in the graphic above).&amp;nbsp; In cybersecurity, you can’t protect what you can’t see. So, let Ivanti help you get full visibility into your external attack surface with &lt;a href="https://www.ivanti.com/en-gb/products/external-attack-surface-management"&gt;Ivanti Neurons for EASM&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 02 Dec 2025 15:06:33 Z</pubDate></item></channel></rss>