Resources

Get the latest thoughts from analysts and JupiterOne Champions on how to level up your security program.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Indeed securely transitions to AWS with JupiterOne
November 28, 2022
Case Study
Indeed securely transitions to AWS with JupiterOne

In 2020, the Indeed leadership team saw an opportunity to innovate and mandate a company-wide strategy: Indeed would migrate its business infrastructure from data centers into a cloud-first environment. The goal was to transition to a 100% multi-cloud environment to better scale and support their changing business and customer needs.

  • CAASM
  • Vuln Mgmt
  • CSPM
  • IR
Robinhood achieves continuous monitoring across vulnerabilities and assets with JupiterOne
September 21, 2022
Case Study
Robinhood achieves continuous monitoring across vulnerabilities and assets with JupiterOne

Daniel leads the company’s asset and attack surface management program. His team is actively responsible for securing all cloud resources, physical devices, and SaaS applications that process sensitive financial and customer data across the online brokerage.

  • Vuln Mgmt
LiveIntent secures thousands of ephemeral devices daily with JupiterOne
September 19, 2022
Case Study
LiveIntent secures thousands of ephemeral devices daily with JupiterOne

Sean Cooper joined LiveIntent three years ago to help build out their security program. As the company grew, and the security challenges evolved, Sean found that the security team needed better visibility into their environment and a better process for managing incident responses, audits, and day-to-day security operations.

  • IR
Blend Case Study
August 1, 2022
Case Study
Blend simplifies major acquisition and continuous compliance with JupiterOne

Blend is a cloud-first company that facilitates lending. They work to bring simplicity and transparency to financial services in an effort to make the world’s financial resources more accessible.

  • CSPM
Auth0 improves SecOps capability with JupiterOne
July 6, 2022
Case Study
Auth0 improves SecOps capability with JupiterOne

The Auth0 Identity Platform, a product unit within Okta, helps enterprise companies solve the most complex and large-scale identity use cases with its extensible and developer-friendly solution.

  • SecOps
  • IAM
  • Vuln Mgmt
Esper achieves compliance and grows security at scale with JupiterOne
June 30, 2022
Case Study
Esper achieves compliance and grows security at scale with JupiterOne

Esper’s founding team believes in a fundamental truth: every engineering project starts with infrastructure. Esper’s cloud-native DevOps platform incorporates the functionality cloud developers love, re-imagined for edge devices.

  • GRC
  • SecOps
Codoxo tackles compliance on a tight budget
May 5, 2022
Case Study
Codoxo tackles compliance on a tight budget

Codoxo recognized the breadth of JupiterOne and became healthcare compliant, and built their future security program components using the JupiterOne platform.

  • GRC
How Databricks achieved greater asset visibility
April 28, 2022
Case Study
How Databricks achieved greater asset visibility

The first requirement for any tool Adam Youngberg, Kishore Fernando, and the security engineering team at Databricks adds must enable the company to maintain the highest level of security.

  • IR
  • Vuln Mgmt
How Aver achieves streamlined, reliable threat modeling
March 23, 2022
Case Study
How Aver achieves streamlined, reliable threat modeling

Proactively assessing your organization’s vulnerability to threats requires piles of spreadsheets, dozens of hours poring over cloud security groups, and assembling snapshots of your entire environment.

  • CAASM
Modern Visibility for Cybersecurity and IT Asset Management
May 3, 2021
Report & eBook
Report
Modern Visibility for Cybersecurity and IT Asset Management

It’s not enough to "know" where all your assets are. Gaining ‘visibility’ when you don’t have the ability to act on it is pointless. Download this whitepaper to learn

  • CAASM
Build a Virtually Air-gapped Secure Environment in AWS
February 16, 2021
Report & eBook
Report
Build a Virtually Air-gapped Secure Environment in AWS

Download this whitepaper to learn how to put in place real security for your AWS environment, with minimal resources, to protect the confidentiality, integrity, avail

  • SecOps
A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface
October 27, 2022
Report & eBook
Report
A Tacky Graph and Listless Defenders: Looking Beneath the Attack Surface

In this paper from the JupiterOne research and development and data science teams, we'll discuss the early findings from our ongoing attack surface research, pose ope

  • CAASM
318% ROI and a Reduced Attack Surface: The Total Economic Impact of JupiterOne
September 19, 2022
Report & eBook
Report
318% ROI and a Reduced Attack Surface: The Total Economic Impact of JupiterOne

JupiterOne commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may real

  • SecOps
  • CAASM
  • CSPM
  • IR
Security Hygiene and Posture Management Survey, 2021
November 1, 2021
Report & eBook
Report
Security Hygiene and Posture Management Survey, 2021

This 30 page research report details key cybersecurity coverage gaps and how organizations plan to improve their security posture. Download using the form below.

  • CAASM
  • SecOps
The 2022 State of Cyber Assets Report
April 1, 2022
Report & eBook
Report
The 2022 State of Cyber Assets Report

In this first-ever SCAR report, we analyzed over 370 million cyber assets, findings, and policies across almost 1,300 organizations to better understand today’s cyber

  • CAASM
High-Velocity Cloud Security at Scale
July 1, 2020
Report & eBook
eBook
High-Velocity Cloud Security at Scale

JupiterOne has partnered up with BreakFree Solutions, a leading provider of practical cloud, DevOps, and automation professional services to enterprise organizations.

  • SecOps
6 Steps to Creating a DevSecOps Culture
September 1, 2020
Report & eBook
eBook
6 Steps to Creating a DevSecOps Culture

These 6 steps and tactics will move you into the fast-lane when it comes to delivering better products by helping you create a DevSecOps culture.

  • SecOps
Gain Visibility Into Your Environment
November 1, 2020
Report & eBook
eBook
Gain Visibility Into Your Environment

Efficient security operations and prompt detection of breaches are critical for limiting the impact bad actors can have on your business. Download our ebook and learn

  • CAASM
Security Review Playbook
December 1, 2020
Report & eBook
eBook
Security Review Playbook

Whether you invest in tools to automate and accelerate the security review process or you do it manually, these 8 plays will help you methodically create and submit

  • SecOps
SaaS Security Program Blueprint
February 1, 2021
Report & eBook
eBook
SaaS Security Program Blueprint

In this workbook, we dive into each area to ensure your team is prepared for proactive security using a DevSecOps mindset. Then, our blueprint will help set the found

  • SecOps
Sampling vs Population Based Analysis for Security
May 1, 2021
Report & eBook
eBook
Sampling vs Population Based Analysis for Security

If one bad apple can spoil the entire bunch, do you analyze a subset of the bunch to find the bad apple, or do you look across the whole population? How might this

  • SecOps
The IT Asset Revolution
July 1, 2021
Report & eBook
eBook
The IT Asset Revolution

The digital age forced an evolution of the term "asset." Physical assets still exist, but cloud and digital transformation added complexity that extends beyond the

  • CAASM
Boardroom Conversations on Security
August 23, 2021
Report & eBook
eBook
Boardroom Conversations on Security

Enrique Salem, Partner at Bain Capital and JupiterOne CEO Erkang Zheng discuss best practices to approaching cybersecurity at board meetings based on years of experie

  • SecOps
Modern Cybersecurity: Tales from the Near-Distant Future
December 9, 2021
Report & eBook
eBook
Modern Cybersecurity: Tales from the Near-Distant Future

This collection of stories from experienced security leaders and practitioners details the major business problems they experienced when implementing cybersecurity

  • CAASM
  • SecOps
Reinventing Cybersecurity
May 3, 2022
Report & eBook
eBook
Reinventing Cybersecurity

In this collection of stories, 19 cybersecurity experts offer a unique look at cybersecurity that addresses the technical, interpersonal, and strategic aspects of th

  • CAASM
  • SecOps
  • CSPM
The Cyber Defense Matrix
February 10, 2022
Report & eBook
eBook
The Cyber Defense Matrix

Written by Sounil Yu, and with forewords by security industry luminaries Dan Geer and Wendy Nather, the Cyber Defense Matrix eBook helps practitioners, vendors, and

  • SecOps
  • CAASM
  • CSPM
Sorry, but no items could be found.
Security Policy As Code
September 3, 2021
Video & Webinar
Webinar
Security Policy As Code

Policy-as-code is an essential step towards software-driven security governance. This approach is one of the most effective methods of managing the security and

  • SecOps
  • GRC
Security Conversations: Board Presentations, Metrics, and Visibility in Modern Security
October 1, 2021
Video & Webinar
Webinar
Security Conversations: Board Presentations, Metrics, and Visibility in Modern Security

From his role advising various public and private boards, Enrique Salem, Partner at Bain Capital, has listened to his fair share of CISO discussions in the boardroom.

  • SecOps
Navigating the Complex Cybersecurity Landscape with the Cyber Defense Matrix
February 1, 2022
Video & Webinar
Webinar
Navigating the Complex Cybersecurity Landscape with the Cyber Defense Matrix

Learn how the Cyber Defense Matrix serves as an easy-to-memorize mental model that helps us navigate the cybersecurity technology landscape to find the capabilities

  • CAASM
  • SecOps
The Most Surprising and Impactful Findings From The 2022 SCAR Report
June 1, 2022
Video & Webinar
Webinar
Webinar: The Most Surprising and Impactful Findings From The 2022 SCAR Report

In this first ever SCAR report, we analyzed over 370 million cyber assets, findings, and policies across almost 1,300 organizations to gain a better understanding of

  • CAASM
Making Cloud Security 'antifragile' with the DIE security model
July 22, 2022
Video & Webinar
Webinar
Webinar: Making Cloud Security 'antifragile' with the DIE security model

Sounil Yu and Aaron Jahoda discuss how to address modern security needs and build not a resilient, but an “antifragile” enterprise by implementing the DIE security mo

  • SecOps
CISO's Guide to Security Strategy During a Recession
August 5, 2022
Video & Webinar
Webinar
CISO's Guide to Security Strategy During a Recession

With a US economic recession looming, tech layoffs hitting the news, and security incidents continuing to climb at record rates, it’s a tough time to be a CISO.

  • SecOps
The Modern Take on Security Skills Scarcity and the Technology Landscape
June 6, 2022
Video & Webinar
Webinar
The Modern Take on Security Skills Scarcity and the Technology Landscape

Join Latha Maripuri, CISO at Uber, and Erkang Zheng, CEO and Founder at JupiterOne as they consider novel ways to attract, train, and retain talent as well as modern

  • SecOps
  • CAASM
JupiterOne Smart Search
This is some text inside of a div block.
Datasheet
JupiterOne Smart Search

JupiterOne created Smart Search to enable your teams to discover, understand, and act on your asset relationships with our graph-based and data-driven approach.

  • CAASM
JupiterOne Cyber Asset Management
This is some text inside of a div block.
Datasheet
JupiterOne Cyber Asset Management

JupiterOne Cyber Asset Management helps you gain visibility into your entire cyber asset inventory before tackling real security issues. Our data-driven graph-based

  • CAASM
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.
  • This is some text inside of a div block.