+
+

Related Products

  • Wiz
    1,106 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Orca Security
    495 Ratings
    Visit Website
  • Criminal IP
    17 Ratings
    Visit Website
  • A10 Defend Threat Control
    32 Ratings
    Visit Website

About

Get the most authentic view of what’s exposed. Discover what is exposed with our black-box approach. IBM Security Randori Recon builds a map of your attack surface to find exposed assets (on-prem or cloud), shadow IT, and misconfigured systems attackers can find, but you may be missing. Unlike other ASM solutions that rely on IPv4 range scans, our unique center of mass approach enables us to find IPv6 and cloud assets others miss. Only IBM Security Randori Recon gets you on target faster – automatically prioritizing the exposed software attackers are most likely to attack first. Built by attackers to identify attackable software, only Randori Recon provides you a real-time inventory of each instance of exposed and attackable software. Going far beyond vulnerabilities, Randori Recon looks at each target in context to build a unique priority score for each target. Practice makes perfect. Go beyond scanning and improve your team by testing your defenses under real-world conditions.

About

Unleash a new level of end-to-end protection from identity-based attacks. Collapse enterprise silos and unify identities across Active Directory and Entra ID. Evaluate your identities using risk scoring to locate the riskiest ones that require attention. Use step-by-step prioritization to rapidly close security gaps with the highest likelihood of identity-based exploits. Identities are the new perimeter, compromised identities are at the center of nearly every successful cyberattack. By exposing and closing the security gaps where identity-based exploits thrive, Tenable Identity Exposure strengthens your security posture and confidently prevents attacks before they occur. Tenable Identity Exposure continuously validates your Active Directory and Entra ID environments for weaknesses, misconfiguration, and activity that can lead to damaging attacks. Integrating deep identity context into the Tenable One exposure management platform can further help you see risky toxic combinations.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies interested in a powerful and comprehensive attack surface management solution

Audience

Companies requiring a solution to manage and solve identity-based exposures

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/randori-recon

Company Information

Tenable
Founded: 2002
United States
www.tenable.com/products/identity-exposure

Alternatives

Alternatives

Tenable One

Tenable One

Tenable
Tenable CIEM

Tenable CIEM

Tenable
Quantum Armor

Quantum Armor

Silent Breach

Categories

Categories

Integrations

IBM QRadar SIEM
Tenable One
Active Directory
Axonius
LogicHub
Microsoft Entra ID
Panaseer
Phantom
Qualys TruRisk Platform
Rapid7 Incident Command
ServiceNow
Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR

Integrations

IBM QRadar SIEM
Tenable One
Active Directory
Axonius
LogicHub
Microsoft Entra ID
Panaseer
Phantom
Qualys TruRisk Platform
Rapid7 Incident Command
ServiceNow
Splunk Cloud Platform
Splunk Enterprise
Splunk SOAR
Claim IBM Security Randori Recon and update features and information
Claim IBM Security Randori Recon and update features and information
Claim Tenable Identity Exposure and update features and information
Claim Tenable Identity Exposure and update features and information