Mission Control Blog
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/677e92d2a41b8b0854ffee1e_Unified%20Device_featured%402x.png)
Unified Device creates a cohesive view of assets with advanced correlation and self-healing for simplified, actionable security insights.
- CAASM
- SecOps
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6772ca1e52d99c296b940b13_2024%20Recap_featured%402x.png)
Discover JupiterOne's 2024 milestones! From upgrading our Security Graph for faster insights to launching features like CTEM, CCM, Unified Device, and Rule Packs.
- CAASM
- CTEM
- CCM
![JupiterOne | Okta](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/67633d69651aa48b5a9726ea_J1%2BOkta_featured%402x.png)
Unlock proactive IAM security with Okta and JupiterOne, gaining real-time insights, enforcing least privilege, and reducing risks in dynamic cloud environments.
- IAM
- CAASM
![Gartner's 'How to Grow Vulnerability Management Into Exposure Management' report cover](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/676065154b5a21873831b3bf_Gartner%20VM%20to%20EM_featured%402x.png)
Explore Gartner's latest report on Exposure Management and learn how your organization can prioritize vulnerabilities and minimize exposures.
- CTEM
- Vuln Mgmt
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/673df3bce68d71b90a3bd46f_Ultimate%20CAASM%20Guide_featured%402x.png)
Discover how Cyber Asset Attack Surface Management (CAASM) is providing enhanced visibility of internal and external assets in 2025.
- CAASM
- SecOps
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/672cd40f577c647a35c7a758_CCM%20Announcement_featured.png)
CCM delivers real-time visibility, proactive risk management, and streamlined compliance for security.
- Compliance
- CCM
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/672387b912ff1e99df359aa4_J1%2BPostman_featured%402x.png)
Explore JupiterOne’s Public Postman Workspace to streamline your workflows and enhance your security operations.
- CAASM
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/670ea2eaa44e537eefdee61b_jupiterone_how-to-prioritize-vulnerabilities-by-real-business-impact.jpeg)
Vulnerability scanners flood teams with alerts, but CTEM helps prioritize based on exploitability and business impact, ensuring focus on the most critical threats.
- CTEM
- Vuln Mgmt
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6705876df1b2f4c927192186_CTEM%20101%20Cycle_featured%402x.png)
Learn how CTEM helps organizations reduce their attack surface, protect valuable assets, and stay ahead of attackers. Download our white paper to get started with CTE
- CTEM
- Vuln Mgmt
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/66fdef0f27d47487146af089_Cybersecurity%20Awareness_featured.png)
It’s Cybersecurity Awareness Month, but before you send out those animated videos and "helpful" phishing tips, take a hard look at your own practices.
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/66f5a49e816d1d3319275070_Mitigating%20Cloud%20Risks_featured.png)
JupiterOne helps organizations manage cloud permissions and prevent privilege escalation across AWS, Azure, and Google Cloud.
- CAASM
- IAM
- CSPM
![Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/66d8c80cc35169e81e0ed26e_CMDB%2BCSPM_featured.png)
There is a lot of confusion out there when it comes to cloud native IT and cloud security tools. Things have gotten rather complicated over the last few years as we
- CSPM
- CAASM
- CTEM
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/66a8e811b7506c0a705a0c17_EPSS_Top_Takeaways_featured.png)
A CISO's Top 6 Takeaways From the Cyentia Institute’s Inaugural Study of EPSS Data and Performance "A Visual Exploration of Exploitation in the Wild"
- CTEM
- Vuln Mgmt
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/66a113b817330e335e9ad33b_J1%2BFleet_featured.png)
Here’s how Fleet integrates with JupiterOne to gain comprehensive insights and enhance the security in our environment.
- GRC
- Vuln Mgmt
![Better Together: Cybersecurity Asset Management and External Attack Surface Management](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6699349fbe591b992b46e52b_CAASM%2BEASM_featured.png)
Today, we’ll dig deeper into attack surface management and explore the benefits and differences across CAASM and EASM
- CAASM
- EASM
- SecOps
- ASM
- CTEM
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/667dbfe7417d9113da253424_Gartner%20ASM_featured.png)
Discover how Gartner's latest report on Attack Surface Management can help your organization enhance cybersecurity with proactive measures and asset visibility.
- CAASM
- CTEM
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6679904dd6114ce38c2bff33_Connect%20the%20Dots_featured.png)
Discover how graph databases revolutionize threat detection in cybersecurity, enhancing visibility, risk management, and proactive security operations with JupiterOne
- Vuln Mgmt
- SecOps
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/666b16cc961aed42e4587c5b_CAASM%20vs%20CSPM_featured.png)
Comparing Cloud Security Posture Management to Cyber Asset Attack Surface Management
- CAASM
- CSPM
![CAASM and IAM to Strengthen Your Security Posture | JupiterOne](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/665f7013cad8742f8b3fbe72_IAM%20Blog%20Feature_06-2024.png)
Discover how CAASM and IAM can reduce security risks from over privileged accounts and inefficient user deprovisioning.
- IAM
- CAASM
![Paradigm shift to proactive cybersecurity | JupiterOne](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/665f735fc7f3535c89e620ba_Paradigm%20Shift%20to%20Proactive%20Cybersecurity_featured.png)
CAASM empowers proactive defense by integrating internal insights and external threat visibility, enabling prioritization of critical cybersecurity risks.
- CAASM
- CTEM
![Mitigate CVE Risks Faster with Asset Visibility](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/664640558476f2512bf480ba_Mitigate%20CVE%20Risk.png)
Discover how JupiterOne addresses critical vulnerabilities with asset inventory, relationship mapping, and actionable insights for enhanced security.
- Vuln Mgmt
![JupiterOne and watchTowr](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/66303a88cb66233d5a8e6430_J1%2BwT_partnership%402x.png)
Introducing Continuous Threat Exposure Management (CTEM) with JupiterOne and WatchTowr: A Proactive Approach to Cybersecurity
- CTEM
![Why Your Business Needs Cloud Asset Management](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/62fea78787bd6a41daabedf5_JupiterOne_Blog_cloud%2520asset-04.png)
Organizations are transitioning to the cloud faster than ever to keep up with the changing consumer and business climate. According to Gartner, by 2023, 40% of all
- CSPM
- CAASM
![JupiterOne Type and Go Search](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6532ab9f2f8d09e7ecfc8ba5_JupiterOne_Type%20and%20Go-min.gif)
JupiterOne aggregates and normalizes data from hundreds of different sources so you can identify and triage security risks easily.
![Unified Devices Matrix](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/651b15e8c4abf7566be99d4a_jupiterone_identify-and-eliminate-endpoint-device-security-gaps-unified-device-matrix.jpg)
It seems like a simple question. “Are any of our deployed user endpoint devices missing an endpoint detection and response agent?”
![Back to Basics: Why Better Asset Visibility Matters in Your Security Program](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6324f517b1723a5b2fcf0d9e_631a444acd8e18b5b36b8e8a_jupiterone_Back-to-Basics.jpeg)
At the most basic level of the Incident Response Hierarchy, security teams must know the assets they are defending.
- CAASM
![JupiterOne natural language search](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64e4cf86e3fc39c68c27e5e7_jupiterone_ai-natural-language-search.gif)
Natural language search leverages AI to bring ease of use to the forefront of the JupiterOne platform.
![Hacker Summer Camp J1 Crew](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64dbbd41c39b58be6e52a9ba_Black-Hat-2023-Crew.jpg)
Here’s our recap of Black Hat, BSides and DEFCON, otherwise known as Hacker Summer Camp 2023!
![Cloud migrations and continuous compliance](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64d66e1783e88db40745150c_jupiterone_accelerating-cloud-migrations-towards-compliance.jpg)
As companies move to the cloud, continuous compliance efforts - which may feel like an obstacle - can become an accelerator in the migration process.
- GRC
![What is SOC 2 Compliance?](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6324f51f1e795a3fcff1ba84_631b9febae181f2cca0b4954_jupiterone_soc-two-compliance.jpeg)
It's more likely today that cloud-enabled businesses need to pay attention to compliance frameworks like SOC 2 to protect themselves and their customers.
- GRC
![JupiterOne release announcement](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64c183b44a5fe1cd8e832e63_DeviceQueryCollector_BlogImage.png)
JupiterOne is releasing new functionality to better support customers' hybrid and on-premises devices and infrastructure along with new AI-powered search options.
![AWS JupiterOne integration depth](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64b5ae61b4e9bd6a0e381b63_jupiterone_add-depth-to-insights-with-jupiterone-aws-integration-suite.jpg)
Explore related assets, segment your data, and drill into your AWS environment with JupiterOne to get prescriptive with alerts and remediation.
![Jamf for JupiterOne](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64ad5d9298a85c862e51ffed_jupiterone_streamline-mac-endpoint-management-with-jupiterone-integration-jamf.jpg)
Discover how the Jamf integration for JupiterOne enriches visibility with Mac device information and ownership.
![The 3 Biggest Challenges of Cyber Asset Management and How to Solve Them](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64e8b82fe473a69977e8aa73_jupiterone_identify-cyber-assets-managements-top-3-challenges-and-how-to-solve-them.jpg)
Cyber asset management is vital to a secure and resilient digital infrastructure. Learn about its top challenges and how to overcome them.
- CAASM
![Difference between CNAPP and ASM](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/649dcb2cd9b916951c61bbf7_understanding-differences-CNAPP-and-ASM.jpg)
Learn how these similar but different solutions can work together and create a more cyber-resilient environment.
- CAASM
![Top 5 - Cyber asset management solution](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/649b1e4b62035e5fa7b381bb_jupiterone_top-5-things-to-consider-when-selecting-a-cyber-asset-management-solution.jpg)
Finding the right cyber asset management solution takes work. Ask these five questions to find the solution that's fit for your business.
- CAASM
![Attack Surface Management vs Vulnerability Management](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6303dccd6c85f5b579f02e9b_jupiterone_attack-surface-management-vs-vulnerability-management-03.png)
Attack surface management and vulnerability management often overlap but are both vital to an organization’s cybersecurity posture.
- CAASM
- Vuln Mgmt
![LGBTQ proud to be an ally](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/647dfc9205257777bfa12a79_jupiterone-the-moment-i-became-an-ally.jpg)
JupiterOne VP of Marketing Rebecca Sanda shares her story behind becoming an LGBTQ Ally and the inclusive employee culture at JupiterOne.
![Buying a DSPM solution](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6476234a93d9a43ffb34a05a_jupiterone_shopping-for-data-security-posture-management-dspm.jpg)
When are Data Security Posture Management tools useful and how can JupiterOne be used for basic DSPM functions?
![2022 and 2023 State of Cyber Assets Reports](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64677c9a6297b4779dffb8f9_jupiterone_2022-and-2023-state-of-cyber-assets-comparison.jpg)
The 2023 SCAR report builds in some important contextual analysis of the findings, including company size breakdowns and CSP adoption details.
![Why IT teams should use JupiterOne](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6463b40ed9c575ab4be2f3b0_why-it-teams-should-be-using-jupiterone-part-3.jpg)
JupiterOne can assist many functions within your IT department, including one very visible and important team: Help Desk Support.
![12 cyber resilience questions](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/645e46128d32296525d253b7_jupiterone_12-cyber-resilience-questions-csuite-board.jpg)
Cyber resilience starts with knowing which questions the organization should answer, across all levels, from the front lines to the Board of Directors.
![Power of problem solving](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/645a574b26e1b798e69e2bee_jupiterone_the-power-of-problem-solving_jim-grundner.jpg)
Problem solving is at the core of what we do, from building a better product to helping our customers solve the most challenging cybersecurity and business problems.
![RSAC 2023 Recap](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6453c7021a992143e6bec625_jupiterone_rsa-conference-2023-recap.jpg)
RSA Conference 2023 has come and gone. There's quite a bit to come away with from the event - here are some of the things we learned here at JupiterOne.
![2023 State of Cyber Assets Report](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6451124ce819283c92b6d3e1_jupiterone-state-of-cyber-assets-report-2023-harnessing.jpg)
Take a look at some of the key facts and considerations from the 2023 State of Cyber Assets Report.
![RSA Conference Top 5 Booths](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/644fbeb80213345c6a64d41c_jupiterone_top-5-most-creative-booths-at-rsa-conference.jpg)
The JupiterOne team spent some time checking out the most creative booths on the 2023 RSA Conference floor and came back with a top-5 list of their favorites.
![Attack surface growth exceeds security teams](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64495144abb25fca9083e9f5_jupiterone_attack-surface-growth-2023.jpg)
The growing gap between team growth and attack surface, evident in the 2023 State of Cyber Assets Report (SCAR), drives teams to secure resources at scale.
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6446a70c633c154d6fe258bf_justj1ai_compressed.gif)
JupiterOne AI is an artificial intelligence-powered, self-service experience harnessing the power and usability of AI/ML.
![Alex Dyer - Secureworks](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/643d64dfb5baeeed48c3c012_how-secureworks-observes-unobservable-assets-across-aws-organization.jpg)
Secureworks' Alex Dyer demonstrates how his company uses JupiterOne to monitor and manage AWS Organizations across an enterprise environment.
- CAASM
![Microsoft Azure vulnerable permissions](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/643981a41fcf7fa7aacc5e54_jupiterone_new-toxic-combination-of-default-and-common-configurations-in-azure.jpg)
JupiterOne can help organizations understand the impact of a recently discovered issue in Microsoft Azure that could lead to unauthorized access and possible attacks.
- Vuln Mgmt
![State of Cyber Assets Report](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6430836feb8313eefee81dcc_jupiterone_second-annual-state-of-cyber-assets-report-reveals-growth-in-cyber-asset-value-scale.jpg)
The annual State of Cyber Assets Report (SCAR) analyzes data from organizations using JupiterOne to better understand today’s cybersecurity landscape.
![JupiterOne at the center of Cybersecurity Mesh Architecture](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6430203180fab51faa2c8f0b_jupiterone_understanding-and-accelerating-cybersecurity-mesh-architecture.png)
Enterprises seeking to employ Cybersecurity Mesh Architecture can turn to JupiterOne as an invaluable CSMA accelerator and enabler.
![Does security awareness training work?](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/642f1e9e631033d536b02e38_jupiterone_security-debate-recap_do-security-awareness-programs-work.png)
Does cybersecurity awareness training work? Security leaders Sounil Yu and Juliet Okafor debate the question.
![Cyber Defense Matrix Conference](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6418b4d7e589b651f5a751c2_map-cybersecurity-gaps-cyber-defense-matrix.png)
Adrian Sanabria, a practitioner with more than 20 years of experience, shared his use case for The Cyber Defense Matrix - visualizing breaches and incidents.
- IR
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/641c7412ed30aa0d1973e714_why-it-teams-should-be-using-jupiterone-part-2.jpg)
Continuing with lessons learned from Part 1 and the recent Automox deployment at JupiterOne, we look at how to use JupiterOne to simplify endpoint software deployment
![JupiterOne CRO Paul Forte](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/641b0b0055bf872792b2af29_welcome-paul-forte_2.jpg)
Technology sales and customer success veteran Paul Forte joins JupiterOne as its new Chief Revenue Officer.
![The Cybersecurity Defense Matrix](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/6418b4d7e589b651f5a751c2_map-cybersecurity-gaps-cyber-defense-matrix.png)
The Cyber Defense Matrix provides a framework to organize your security data and identify your cybersecurity gaps.
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64064282cba18742d930331f_Screen%20Shot%202023-03-06%20at%208.46.46%20AM.png)
Streamline operations with the new Tines’ workflow automation integration in JupiterOne
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/64011287137e3b6344d12cf3_Artboard%201%20copy%2090%20(1).png)
With the rise of open source software comes the rise of vulnerabilities in code dependencies. To find and fix these issues, there are three key questions to answer.
![](https://cdn.prod.website-files.com/6285b9c0f95b5ea1e88356db/63f53e5dccff047bf17fd23f_jupiterone_blog_unauthorized%20member.png)
We recently had a situation at JupiterOne which triggered curiosity in members of our security team. A Google Group, used as a distribution list, had a surprise membe
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.
- This is some text inside of a div block.