Here’s How It Works.

The KeyCaliber platform consumes security logs from your EDR, vulnerability scanner, firewall, IAM, and other security products, selecting the data fields that are relevant for our AI/ML and analytics.

The logs are parsed to identify all assets (network addressable instances of compute).

Assets are correlated and de-duplicated so that each unique asset has an aggregated profile of details. Asset details are then featurized for AI/ML algorithms and transformed for additional types of asset behavior analytics.

The full asset inventory is produced which includes the impact score, risk score, connections, and security coverage for each asset. With this information, the platform generates a ranked list of the most critical assets, most risky assets, most urgent vulnerabilities, and most serious alerts, presenting this data in dashboard and report form.

Connectors Include:

and more.

Finds every asset in your environment

Discovers your on-premises and cloud assets, information technology (IT) and operational technology (OT) assets, managed and unmanaged (Shadow IT) assets, by parsing your security telemetry to show you what you have, where it is, and how it’s all connected.

Scores all your assets based on their criticality to your business operations

Computes a business impact score for each asset using asset behavior analytics to determine the criticality of each asset and identify your Crown Jewels.

Calculates the cyber risk of each of your assets, business applications, and business processes

Uses the asset impact score as well as all relevant data on vulnerabilities, exploitability, coverage gaps, adjacent risk, and more to provide a risk score for each asset and then aggregate the risk for business applications and processes

Ranks everything in priority order so you know what to secure first

Prioritizes vulnerabilities, alerts, and assets with coverage gaps so that tactical teams can focus on what matters most to the organization and optimize their limited resources

Shows security coverage gaps and overlaps

Determines which security tools are covering each asset. Your inventory view shows coverage gaps that need immediate resolution and coverage overlaps where you can reduce spending.

Visualizes potential attack pathways

Maps the connections between assets so you can understand attack pathways and dependencies.