Skip to main content
Skip table of contents

Use cases

  • Monitoring Internet-faced systems: Scan continuously websites, public IP, domains and subdomains for vulnerabilities and misconfigurations

  • Vulnerability and remediation tracking: Identify vulnerabilities, send a full report to ticketing system, and rescan to check for remediation

  • Vulnerability assessment of internal systems: Orchestrate regular scans on a fixed perimeter and check changes (asset, vulnerability, criticality)

  • Attacker assets monitoring: Ensure readiness of teams by identifying attackers’ assets and tracking changes of their IP, domains, and web applications

  • Phishing / APT scenario preparation: Monitor early signs of targeted attacks, new domain registration, suspicious Tweets, paste, VirusTotal submissions, and phishing reports

  • Regulation and Compliance: Evaluate compliance gaps using provided scan templates

  • Penetration tests: Perform the reconnaissance steps, the full stack vulnerability assessment and the remediation checks

  • Continuous Integration / Continuous Delivery: Automation of static code analysis, external resources assessment and web application vulnerability scans

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.