Frequently Asked Questions

Common questions about attack surface management, supply chain security, and the Preservers platform.

What is attack surface management (ASM)?

Attack surface management (ASM) is the continuous discovery, inventory, classification, and monitoring of an organization's internet-facing digital assets. It includes domains, subdomains, IP addresses, cloud instances, and third-party integrations. ASM helps security teams see their external footprint the way an attacker would, identifying exposures before they can be exploited. Preservers provides ASM with predictive intelligence and supply chain visibility.

What is supply chain security in cybersecurity?

Supply chain security in cybersecurity refers to protecting your organization from risks introduced by third-party vendors, partners, and software dependencies. It includes vendor risk assessment, continuous monitoring of supplier exposures, and identifying vulnerabilities in the software and services you rely on. Preservers offers supply chain intelligence that monitors every dependency and vendor exposure in real time.

How do I assess vendor or third-party risk?

Vendor risk assessment typically involves questionnaires, security documentation reviews, and continuous monitoring. Preservers automates this with Preserve Connect, which maps vendor attack surfaces, tracks exposures, and provides dynamic risk scoring. Unlike static questionnaires, Preservers gives you continuous visibility into how your vendors' security posture changes over time.

What makes Preservers different from traditional security tools?

Preservers provides predictive intelligence that transforms security from reactive compliance to proactive defense. Unlike traditional tools that focus on point-in-time scans, Preservers offers continuous external threat monitoring, context-aware vulnerability assessment, and supply chain intelligence. The platform anticipates threats before they materialize and reduces alert fatigue with AI-curated, high-fidelity alerts.

How quickly can Preservers be implemented?

Preservers can be deployed within a few hours, depending on your infrastructure complexity. We provide dedicated onboarding support to ensure smooth implementation. You can also request a free security posture report to see your external exposure within 24 hours without any implementation.

How do I get a security posture report?

You can request a free security posture report at preservers.io/get-security-posture. Enter your company name, website URL, and work email. Preservers will analyze your external attack surface and send a comprehensive report within 24 hours. This helps you understand your exposure before committing to the full platform.

What is the difference between ASM and vulnerability scanning?

Vulnerability scanning focuses on finding known CVEs and misconfigurations in assets you already know about. Attack surface management (ASM) first discovers what you have exposed to the internet, then assesses risk. ASM answers "what do we have?" before "what is wrong with it?" Preservers combines both: asset discovery, technology detection, and prioritized vulnerability assessment in one platform.

Does Preservers offer custom integrations?

Yes. Preservers provides custom integrations with existing security tools and workflows. The platform includes a robust REST API for deep integration with SIEM, ticketing systems, and internal tools. Preservers is designed to work alongside your current infrastructure while enhancing your security posture.

Still have questions? Get in touch with our team.