# Products

Third-party products comprise one of the most common attack vectors for threat actors. Well known and with documented exploits, most third-party tools, if not well patched, offer an easy mechanism to enter your internal network.

We identify over 1500 common technologies and manually escalate any discovered with publicly known vulnerabilities. Product discovery is performed by analyzing all exposed Ports, sending requests to them, and analyzing the responses for common patterns and fingerprints these technologies are known to respond with.

EASM Products page
EASM Products page

# Accessing the Products page

Select (or hover over) EASM in the side navigation and then select Products to display the Products page.

EASM Products navigation
EASM Products navigation

# Filtering the Products page and viewing details

  1. Select the Filter icon Filter icon to narrow the Products table results.

  2. Select anywhere in a Product table row to display the Product details page in the right side slide out drawer in a condensed display.

    Product Details page

    The Product Details page includes the product name, the discovery chain, a table of instances and locations of that product, and website and CPE information.