Tisalabs Knowledge Base

What is a Asset?

In the context of Predictive , assets refer to the specific elements or digital entities that the Predictive cybersecurity tool can scan and assess for vulnerabilities and security risks. These assets are typically related to an organization's digital infrastructure and online presence. Here are the types of assets that are relevant for Predictive:

  • Websites: These are online platforms or webpages owned by an organization. Predictive can scan websites to identify vulnerabilities, misconfigurations, and potential threats, helping ensure the security of the online presence.
  • Web Applications: Web applications are software programs or services accessible via a web browser. Predictive can scan web applications to uncover vulnerabilities that could be exploited by attackers, safeguarding online services and sensitive data.
  • Docker Containers: Docker containers are lightweight, portable, and self-sufficient environments for running applications. Predictive can assess Docker containers for security weaknesses, ensuring the protection of containerized applications.
  • Kubernetes Clusters: Kubernetes is an open-source container orchestration platform. Predictive can scan Kubernetes clusters to discover vulnerabilities and misconfigurations within this container orchestration environment, enhancing the security of cloud-native infrastructure.

To perform a scan on an asset using Predictive user must posses a legal authority to that asset and must have an information of Domain and IP Address of the asset.

  • Domains: Domains represent website addresses (e.g., www.tisalabs.com). Predictive can scan domains to identify potential security risks associated with domain names and their configurations, helping protect an organization's online brand presence.
  • IP Addresses: IP addresses are unique numerical labels assigned to devices on a network. Predictive can assist in evaluating the security posture of IP addresses, detecting potential vulnerabilities or malicious activity that may compromise a network.

Contact Our Team

If you still can't find an answer to what you're looking for, or you have a specific question, open a new ticket and we'd be happy to help!

Contact Us