Software Alternatives, Accelerators & Startups

Top 9 Attack Surface Management Products in Cyber Security

The best Attack Surface Management Products within the Cyber Security category - based on our collection of reviews & verified products.

Censys Shodan runZero Axonius Cyberpion/Threat Intelligence Platforms Cobalt Strike CyCognito ZoomEye Thingful

Summary

The top products on this list are Censys, Shodan, and runZero. All products here are categorized as: Attack Surface Management. Software and tools focused on protecting computer systems, networks, and data from digital attacks, unauthorized access, and other online threats. One of the criteria for ordering this list is the number of mentions that products have on reliable external sources. You can suggest additional sources through the form here.
  1. 1
    Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.
    Pricing:
    • Freemium
    • Free Trial

    #Web Application Security #Security #Monitoring Tools 13 social mentions

  2. 2
    Shodan is the world's first search engine for Internet-connected devices.

    #Web Application Security #Security #Monitoring Tools 92 social mentions

  3. runZero provides a single source of truth for exposure management across your total attack surface.
    Pricing:
    • Open Source
    • Freemium
    • Free Trial
    • $5000.0 (500 assets)

    #Monitoring Tools #Network Security #Vulnerability Scanner 5 social mentions

  4. Cyber security asset management to see and secure all

    #Productivity #Tech #Cyber Security

  5. Computer and Network Security

    #Cyber Security #Security & Privacy #Vulnerability Intelligence

  6. Advanced threat tactics for penetration testers.

    #Web Application Security #Security #Vulnerability Scanner

  7. NOTE: CyCognito has been discontinued.
    Proactive attack surface protection that prevents breaches. See your risks as attackers do. Know what to fix first. Remediate faster. Spend Less

    #Security #Vulnerability Scanner #Cyber Security

  8. Network mapping service

    #Web Application Security #Security #Vulnerability Scanner

  9. Search engine for the Internet of Things

    #Web Application Security #Security #Vulnerability Scanner

Related categories

Recently added products

If you want to make changes on any of the products, you can go to its page and click on the "Suggest Changes" link. Alternatively, if you are working on one of these products, it's best to verify it and make the changes directly through the management page. Thanks!