Footprint is an AI-driven, cloud-agnostic, multi-tenant vulnerability management platform designed to enable Managed Service Providers to deliver Accessible, Affordable, and Actionable cybersecurity services to their customers.

By using supervised Machine Learning on our global attack and threat-intelligence databases, Footprint can accurately rate risks and issue immediate alerts and recommendations to prevent potential cyber-attacks. The platform can also recommend protective measures automatically. Through our AI engine, the platform will learn from the users’ interactions and recommendations and improve its process through regression methods.

How it works

Build your initial Footprint customer

Start with an initial set of entry points such as IP address ranges (CIDR format ), public exposed URLs or FQDNs domain names, email addresses, or any other DNS entries. We will discover any related assets using reconnaissance algorithms such as DNS probing, WHOIS queries, web crawling, and port scanning. Newly discovered assets will be suggested to be added to your Customer Footprint. We will only scan assets in your Footprint.

Vulnerability Analysis

Immediately after adding an asset to your Customer Footprint, we will start scanning it using multiple techniques and scan engineers. After port scanning the open ports will be scanned for running apps and the specific exploit payloads will be run against the specific service. This includes OS detections, Service Detection, SSL checks, authentication checks, CVE exploitation, CCE discovery, etc. Once new apps are identified they will be added to your CF. Internal Scanners (VM/Docker Appliance) or Dedicated Software Agents (Installed on the machine or inside an AD) can be deployed to gain more visibility into internal assets.

Contextual Reporting

Technical and Business Contexts are generated automatically by grouping applications based on their purpose in the Customer’s Organization. Manual contexts can also be created by Administrators. Custom Business Impacts can be influenced based on the customer’s BIA in order to influence risk impact. The risk impact is also influenced by threat Intelligence information such as public exploits in the wild targeting and identified vulnerability. CVRs (Custom Vulnerability Reports) cover both Business and Technical relevant information.

Continuous Monitoring

Scanning jobs will run automatically according to the predefined schedule. Administrators can customize how default scans are being run (which ports are affected and how often a scan is run). Customer Vulnerability Reports (CVRs) are automatically updated once a change is detected in the Customer’s Footprint. Users can subscribe to notifications for new vulnerabilities or periodic updates with a specific frequency. A footprint update can be generated by an update in the global threat feed (such as a new CVE on the existing Footprint) or an update inside the Customer’s Footprint itself: such as a new open port inside the firewall, an application update fixing an already-identified vulnerability or generating a new one.

See for yourself what
CODA Footprint can do to accelerate your business growth

Explore how CODA Footprint can streamline your cybersecurity-related operations, enhance productivity and efficiency across the entire business so you can become more profitable.