- Developers to view changes in the attack surface resulting from their applications
- IT Pros to evaluate aggregate attack surface changes by LOB applications
- IT security auditors to identify risk related to attack surface during threat risk assessments
- IT security incident responders to better understand the state of securable objects on a system during investigations
Read more and download from here.