Per-Host API Enhancement

Date8-1-24
ScopeShield API
DescriptionShield has extended the capabilities of their API to be more functional at the host level. Users can now query a specific host to get information regarding the asset information and vulnerability information on each asset and/or identity object within a subscription.
ReferencesShield API

UI Enhancements & Workflow Updates

Date7-31-24
ScopeSubscriptions; Attack Surface Management; Internal Network; Identity Security
DescriptionShield has been making major improvements to the user interface, the charts that are shown across all modules, and implemented several workflow actions when signing up, creating subscription(s), and deploying resources. Users will notice a change in the simplicity of what is shown and how the flow of the platform works to drive more actions and retrieve the results at a faster pace.
ReferencesReporting

Shield Risk Reduction Recommendations

Date7-22-24
ScopeInternal Network
DescriptionShield now provides each subscription with dynamic recommendations that focus on reducing the most risk within each subscription. The recommendations will aggregate the most critical vulnerabilities for each subscription and provide specific instructions on how to these critical issues across the number of hosts that are affected.
ReferencesInternal Network

New Shield Scanner Deployment Method

Date7-15-24
ScopeInternal Network; Deployment
DescriptionShield released their own deployment package for the Shield vulnerability scanner. Users can now navigate to the Deployment within the Internal Network > Network-based tab to access the single script that will deploy the Shield service, install the scanner, and link the scanner to the respective subscription.
ReferencesDeployment

Shield Exposure Index

Date6-25-24
ScopeShield Exposure Index; Attack Surface Management; Internal Network; Identity Security
DescriptionShield has now released their own proprietary vulnerability scoring system that weights the most impactful threat vectors around exploitation, impact, and likelihood which augments the traditional vulnerability criticality scores.
ReferencesShield Exposure Index

Vulnerability Name Filtering

Date6-19-24
ScopeAttack Surface Management; Internal Network
DescriptionThe vulnerabilities within each module (ASM, VM, ID Security) are now filtered by the name so that organizations can view the overall count of the specific vulnerabilities, rather than viewing the total instances, which enhances the overall user experience.
ReferencesAttack Surface; Internal Network;

Reporting

Date5-7-24
ScopeReporting
DescriptionUsers now have the ability to generate reports with limited, results-based customizations. Users can navigate to the reports module and choose to export the information in full detailed reports or executive summary reports for different modules that identify information within the platform.
ReferencesReporting

Admin-Level Views

Date4-29-24
ScopeOverview
DescriptionUsers can now view all subscriptions and high-level information regarding each subscription within the Overview section within the platform. This will allow users to quickly see all of the connected agents, services, and important risks that may arise within the subscription.
ReferencesOverview

Enhanced Network Scan Configuration

Date4-17-24
ScopeScans; Scan Creation
DescriptionWithin the Scans module within the Target creation, users can now specify different configurations for performing network-based scans. Additional options, such as port lists and alive tests can be configured to perform more comprehensive and robust scans from a network perspective.
ReferencesScan Creation

Endpoint Configuration Assessment

Date4-12-24
ScopeInternal Network
DescriptionThe Shield Platform will now assess all deployed agents for secure configurations according to the Center of Internet Security’s (CIS) benchmarks for each Operating System the agent is running on. Additionally, users can export this information in CSV format from the Configurations tab within the Internal Network module or in JSON format from the Shield API.
ReferencesInternal Network; Shield Cyber API

Export Assets Feature

Date3-19-24
ScopeAttack Surface Management; Internal Network
DescriptionThe Shield Platform now allows all assets to be exported, like all vulnerabilities, in a CSV format or JSON format via the Shield Cyber API.
ReferencesAttack Surface; Internal Network; Shield Cyber API

Streamlined Service Deployment

Date3-14-24
ScopeInternal Network Agents, Internal Network Scanner, & Identity Security Service
DescriptionThe Shield platform now has a streamlined user sign-up workflow, where after account creation, users will be directed to create their first subscription, and then will be directed to start deploying the services necessary to use the Shield platform.
ReferencesDeployment

Help Documentation Platform Integration

Date3-08-24
ScopeAttack Surface, Internal Network, and Identity Security Vulnerabilities
DescriptionThe Shield Platform now has all of the documentation linked on each page. To access the documentation for a specific page, click the question mark button in the top right corner to access the specific documentation for the page you are on.
ReferencesShield Cyber Documentation

Shield’s Public Facing API

Date2-20-24
ScopeAttack Surface, Internal Network, and Identity Security Vulnerabilities
DescriptionShield now has a public facing API endpoint to retrieve results from the Attack Surface, Internal Network, and Identity Security Modules. Additionally there are endpoints that support CSV file export for all results.
ReferencesShield API Swagger; Shield API Documentation

Export Vulnerabilities Feature

Date2-15-24
ScopeAttack Surface, Internal Network, and Identity Security Vulnerabilities
DescriptionThe Shield platform now has the capability to export all vulnerabilities for each module in the form of comma separated value (CSV) files.
ReferencesAttack Surface; Internal Network; Identity Security

Network-Based Scanner Deployment

Date2-12-24
ScopeNetwork Scanner Deployment & Automation
DescriptionThe Shield network scanner can now be deployed and launched with automated scripts on a Linux-based host. This removes the need for having a separate service that needs to run alongside the Shield scanner after deployed.
ReferencesNetwork Scanner Deployment; Shield Cyber Network Scanner GitHub

External Attack Surface Scanning & Hosting

Date1-29-24
ScopeAttack Surface Scanning
DescriptionEach Shield subscription that is created now comes configured with an external attack surface scanner. With this added feature, users have the ability to configure and create scans that target their external (internet-facing) infrastructure.
ReferencesAttack Surface

Scan Creation

Date1-29-24
ScopeNetwork Scan Creation
DescriptionThe Shield Platform now has the ability to create and launch network-based scans within the Scan Creation module of the platform.
ReferencesScan Creation Documentation

Agent-Based Scanning

Date12-18-23
ScopeAgent-Based Vulnerability Scanning (Windows OS)
DescriptionThe Shield Platform can now perform vulnerability scanning via the Shield Agent. Please navigate to the Agents to manage and add new agents for each subscription.
ReferencesAgent-Based Scanning