Skip to main content

blog

Digital Footprint Compared to 5 Security Technologies

| Author: Sebastiaan Bosman

In this blog, we'll cover our Digital Footprint approach compared to five existing security approaches. What methods do they share? And where do they complement each other?

We'll have a look at these techniques: 

1. Asset discovery
2. Vulnerability management
3. Penetration testing
4. Red teaming
5. Supplier security governance

Each has some touch points with Digital Footprint. For this comparison, we build on our earlier explanations of the concept. In the first blog, we gave our definition and summarised what drives the need for the solution. You can read our second blog to see how Digital Footprint is positioned with regards to External Threat Intelligence. 

Want to read the entire blog? Click on the "read more" button.