+
+

Related Products

  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • Orca Security
    495 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • DXtrade
    6 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website

About

We discover and analyze all Internet assets across an organization's dynamic, distributed environment and continually monitor them for risk. See everything an adversary would. Discover all assets, including partner and third party entities. Examine asset composition and understand relationships among all entities. Monitor your infrastructure in near real time to detect changes and exposure. Associate known threats to your asset inventory. Eliminate vulnerability from exploits and misconfiguration. Develop actionable intelligence to control your environment. Integrate across your security programs to optimize risk analysis and Incident resolution. The most comprehensive understanding of your assets, driven by powerful mapping technology. Superior asset analysis for vulnerability detection, exposure assessment, and risk mitigation.

About

Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand your security and compliance status at any level. The platform ingests data from any source in the cloud or on-premises, across security, IT and business domains through out-of-the-box data connectors. It uses entity resolution to clean, normalise, aggregate, de-duplicate and correlate this data, creating a continuous feed of unified asset and controls insights across devices, applications, people, databases and accounts.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Attack surface management platform for companies wanting to discover and analyze all Internet assets

Audience

Continuous controls monitoring solution for enterprise security

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intrigue
Founded: 2019
United States
www.intrigue.io

Company Information

Panaseer
Founded: 2014
United Kingdom
panaseer.com

Alternatives

Alternatives

Tenable One

Tenable One

Tenable
Tenable One

Tenable One

Tenable
SanerNow

SanerNow

SecPod Technologies
Qualys VMDR

Qualys VMDR

Qualys

Categories

Categories

Cybersecurity Features

AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Digital Asset Management Features

Asset Categorization
Asset Library
Asset Sharing
Brand Control
Customizable Branding
File Conversion
Metadata Management
Mobile App
Reporting/Analytics
Search Within Document
Search/Filter
Version Control
Watermarking
Workflow Management

IT Asset Management Features

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Integrations

Archer
Axonius
Barracuda PhishLine
BeyondTrust Cloud Privilege Broker
Datadog
ESET Cyber Security
Flexera One
HCL BigFix
IBM Security Randori Recon
Jamf Connect
LogicMonitor
Microsoft Defender for Endpoint
Microsoft Intune
Palo Alto Networks Threat Prevention
Qualys TruRisk Platform
Snow Software
SolarWinds Access Rights Manager
Sophos Intercept X Endpoint
Tanium
Trend Micro Antivirus+ Security

Integrations

Archer
Axonius
Barracuda PhishLine
BeyondTrust Cloud Privilege Broker
Datadog
ESET Cyber Security
Flexera One
HCL BigFix
IBM Security Randori Recon
Jamf Connect
LogicMonitor
Microsoft Defender for Endpoint
Microsoft Intune
Palo Alto Networks Threat Prevention
Qualys TruRisk Platform
Snow Software
SolarWinds Access Rights Manager
Sophos Intercept X Endpoint
Tanium
Trend Micro Antivirus+ Security
Claim Intrigue and update features and information
Claim Intrigue and update features and information
Claim Panaseer and update features and information
Claim Panaseer and update features and information