Audience

Companies interested in a powerful and comprehensive attack surface management solution

About IBM Security Randori Recon

Get the most authentic view of what’s exposed. Discover what is exposed with our black-box approach. IBM Security Randori Recon builds a map of your attack surface to find exposed assets (on-prem or cloud), shadow IT, and misconfigured systems attackers can find, but you may be missing. Unlike other ASM solutions that rely on IPv4 range scans, our unique center of mass approach enables us to find IPv6 and cloud assets others miss. Only IBM Security Randori Recon gets you on target faster – automatically prioritizing the exposed software attackers are most likely to attack first. Built by attackers to identify attackable software, only Randori Recon provides you a real-time inventory of each instance of exposed and attackable software. Going far beyond vulnerabilities, Randori Recon looks at each target in context to build a unique priority score for each target. Practice makes perfect. Go beyond scanning and improve your team by testing your defenses under real-world conditions.

Integrations

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/randori-recon

Videos and Screen Captures

IBM Security Randori Recon Screenshot 1
Other Useful Business Software
Gemini 3 and 200+ AI Models on One Platform Icon
Gemini 3 and 200+ AI Models on One Platform

Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Start Free

Product Details

Platforms Supported
Cloud
On-Premises
Training
Documentation
Live Online
Webinars
Support
24/7 Live Support
Online

IBM Security Randori Recon Frequently Asked Questions

Q: What kinds of users and organization types does IBM Security Randori Recon work with?
Q: What languages does IBM Security Randori Recon support in their product?
Q: What kind of support options does IBM Security Randori Recon offer?
Q: What other applications or services does IBM Security Randori Recon integrate with?
Q: What type of training does IBM Security Randori Recon provide?

IBM Security Randori Recon Product Features

Cloud Security

Intrusion Detection System
Endpoint Management
Threat Intelligence
Application Security
Encryption
Behavioral Analytics
Antivirus
Vulnerability Management
Incident Management
Two-Factor Authentication

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning