+
+

Related Products

  • Wiz
    1,439 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Orca Security
    522 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • Reflectiz
    18 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website

About

Among millions of vulnerabilities in the cloud, only a small subset paves the way for real-world attacks. Identifying this select subset is key to securing the cloud. Even the most dedicated teams reach their limit. The presence of a vulnerability on an externally exposed asset or in the KEV database does not automatically make it critical. Seamlessly onboard your cloud environment, and within moments, get a clear picture of your security landscape. Thanks to our attack chain analysis, you'll instantly know where to direct your attention. Averlon makes a deep graph analysis of your cloud across assets, network connections, access policies, and issues. Focus on assets and issues that present the most amount of risk. Averlon continuously monitors your cloud and identifies potential real-world attacks. Averlon accelerates the mean-time-to-remediate by reducing alerts into root causes and suggesting precise fixes.

About

Get the most authentic view of what’s exposed. Discover what is exposed with our black-box approach. IBM Security Randori Recon builds a map of your attack surface to find exposed assets (on-prem or cloud), shadow IT, and misconfigured systems attackers can find, but you may be missing. Unlike other ASM solutions that rely on IPv4 range scans, our unique center of mass approach enables us to find IPv6 and cloud assets others miss. Only IBM Security Randori Recon gets you on target faster – automatically prioritizing the exposed software attackers are most likely to attack first. Built by attackers to identify attackable software, only Randori Recon provides you a real-time inventory of each instance of exposed and attackable software. Going far beyond vulnerabilities, Randori Recon looks at each target in context to build a unique priority score for each target. Practice makes perfect. Go beyond scanning and improve your team by testing your defenses under real-world conditions.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations requiring a solution to identify vulnerabilities and risks in their cloud infrastructure

Audience

Companies interested in a powerful and comprehensive attack surface management solution

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Averlon
averlon.ai/

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/randori-recon

Alternatives

Alternatives

Aqua

Aqua

Aqua Security
Tenable One

Tenable One

Tenable

Categories

Categories

Integrations

Amazon Web Services (AWS)
Axonius
BitSight
Google Cloud Platform
IBM QRadar SIEM
Kubernetes
LogicHub
Microsoft Azure
Panaseer
Qualys TruRisk Platform
Rapid7 Incident Command
Salesforce
ServiceNow
Splunk Enterprise
Splunk SOAR
Tenable One

Integrations

Amazon Web Services (AWS)
Axonius
BitSight
Google Cloud Platform
IBM QRadar SIEM
Kubernetes
LogicHub
Microsoft Azure
Panaseer
Qualys TruRisk Platform
Rapid7 Incident Command
Salesforce
ServiceNow
Splunk Enterprise
Splunk SOAR
Tenable One
Claim Averlon and update features and information
Claim Averlon and update features and information
Claim IBM Security Randori Recon and update features and information
Claim IBM Security Randori Recon and update features and information