Reach Security Quarterly Product Update 1Q2025

February 10, 2025

2 minute read

This past quarter, Reach Security delivered a series of powerful updates to help organizations unlock the full potential of their security tools and maintain a strong security posture. With these enhancements, security teams can better measure, manage, and optimize their defenses, all while reducing risk and improving operational efficiency.

Drill into Capability utilization by vendor and license and understand maturity.

Understand capability consumption across all policies to get a holistic picture of your CrowdStrike Falcon deployment‘s maturity and drill into recommendations on a per policy basis.

Licensing and Compliance Management

We introduced new features to simplify how teams track licensing and align with compliance frameworks:

  • Capabilities View: Gain instant visibility into how your licensed security capabilities are utilized across the entire stack. Each feature is now categorized as “Not in Use,” “In Use,” or “Optimized” based on Reach’s threat-informed recommendations.
  • Compliance Alignment: Automatically map your security configurations to frameworks like ISO27001, NIST CSF, and SOC 2. This vendor-agnostic functionality identifies gaps and actionable steps to achieve compliance across tools like Okta, Microsoft Conditional Access, SentinelOne, CrowdStrike, and Cortex XDR.
  • Operational Insights: Dive deeper into feature usage and compliance gaps, with access to guided remediation workflows such as ticket creation, deployment guides, and automated staging options.

User Impact Evidence

Balancing security improvements with user experience is a key challenge that every organization faces. Reach now provides user impact metrics alongside control recommendation, starting with Okta:

  • Data-Driven Insights: Evaluate how proposed changes will affect users, including those in critical roles, using a 90-day log data analysis from Okta.
  • Faster Adoption: Clear metrics make it easier to gain stakeholder buy-in, speed up change approvals, and reduce the manual effort needed to assess potential impacts.

Threat Evidence

To help teams better understand the real-world impact of their security configurations, we launched enhanced threat evidence analytics:

  • Threat-Informed Defense: Correlate policy recommendations with real-world attack data, such as risky authentication attempts flagged for unusual locations or behaviors.
  • Tailored Defenses: This enables you to prioritize controls that address specific threat scenarios and reduce exposure.

Additional Updates

  • Export Tools Rationalization Assessments: Teams can now export the continuous assessments to CSV, simplifying collaboration and data analysis across departments.
  • Executive Group Customization: Customize executive tracking definitions to align with your organization’s unique hierarchy and naming conventions. This improves risk profiling for leadership teams.
  • Compare All Policies: Compare Reach’s recommendations against every possible policy in your EDR tool’s deployment, understanding where there are gaps or pitfalls incapability consumption.

Why These Updates Matter

  • Improved Visibility: Consolidate insights across tools for a unified view of your security posture.
  • Actionable Automation: Implement guided remediations that save time and mitigate risks, with clear insights into user impact.
  • Optimized Investments: Maximize the effectiveness of your security tools without adding complexity, ensuring measurable risk reduction.

As security threats continue to evolve, Reach remains committed to delivering solutions that help organizations strengthen their defenses and get the most value out of their security stack. Stay tuned for more updates as we continue to enhance our platform.

Join us on our next webinar to learn more about these new capabilities and see a demo of Reach.

Getting Started with Reach

To join the community of customers enjoying the benefits of Reach and learn more about how it can transform your security posture, visit: