HRO Insight blog
Please visit NelsonHall's HRO Insight blog for further updates from our analysts daily
Liz Rennie is NelsonHall's HR & Talent Transformation Research Director, with global responsibility for HR research and client support.
Nikki is a Principal Research Analyst at NelsonHall and a member of the HR Technology & Services practice. Nikki covers HR services research in the areas of Recruitment Process Outsourcing (RPO), Managed Service Programs (MSP), Total Talent, and Learning.
meet & followJeanine Crane-Thompson is a Principal Research Analyst with the HR & Talent Transformation team.
meet & followDeeAnna Warrington is a Principal Analyst with the HR & Talent Transformation team.
Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.
To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.
manage email alerts using the form below, in order to be notified via email whenever we publish new content:
Please visit NelsonHall's HRO Insight blog for further updates from our analysts daily
published on Mar 14, 2025
This NelsonHall vendor assessment analyzes Atos' offerings and capabilities in Attack Surface Management
NelsonHall’s Attack Surface Management (ASM) profile on Atos is a comprehensive assessment of Atos’ offerings and capabilities, designed for:
The report provides a comprehensive and objective analysis of Atos’ attack surface management offerings, capabilities, and market and financial strengths, including:
Atos’ attack surface management services are categorized under its consulting services, i.e. penetration services and security assessments, and CERT services, i.e. threat intelligence services including EASM.
Atos' EASM service aims to provide visibility of the client’s externally facing assets using asset discovery techniques and prioritize the security of these assets, all using third-party security tools such as Cycognito and Microsoft EASM. These EASM tools are combined with a mix of third-party vulnerability scanning tools alongside Atos' AIsaac platform, which uses a cyber mesh data lake to hold security information from third-party security tools.