ThreatMapper

ThreatMapper

Deepfence
+
+

Related Products

  • Wiz
    1,439 Ratings
    Visit Website
  • Criminal IP ASM
    18 Ratings
    Visit Website
  • ZeroPath
    2 Ratings
    Visit Website
  • Reflectiz
    18 Ratings
    Visit Website
  • Astra Pentest
    238 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,683 Ratings
    Visit Website
  • Aikido Security
    224 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • Chainguard
    49 Ratings
    Visit Website

About

Astelia is an attack-driven exposure management platform designed to help security and IT teams identify which vulnerabilities in their environment are truly reachable and exploitable. It maps network topology through read-only integrations and applies agentic AI to analyze the technical requirements of each vulnerability, correlating reachability and exploitability data to surface the small fraction of risks that actually matter. Instead of relying on probability-based scoring alone, Astelia provides evidence-based prioritization that helps organizations cut through massive vulnerability backlogs and focus remediation efforts where they will have the greatest impact. It also visualizes potential attack paths using graph-based models, showing exactly how an attacker could move through the network to compromise assets. In addition, it exposes coverage gaps by mapping infrastructure down to the port level, revealing unscanned assets and third-party connections.

About

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories. ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. What you cannot see, you cannot secure. ThreatMapper auto-discovers your production infrastructure. It identifies and interrogates cloud instances, Kubernetes nodes, and serverless resources, discovering the applications and containers and mapping their topology in real-time. Use ThreatMapper to discover and visualize the external and internal attack surface for your applications and infrastructure. Exploiting known vulnerabilities in common dependencies is one of the easiest ways for bad actors to gain a foothold within your infrastructure. ThreatMapper scans hosts, containers, and applications for known vulnerable dependencies, taking threat feeds from over 50 different sources.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Cybersecurity and IT security teams seeking to prioritize and remediate truly exploitable vulnerabilities across complex hybrid environments

Audience

Developers seeking a solution to scan and manage system vulnerabilities in running containers

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Astelia
United States
www.astelia.io

Company Information

Deepfence
United States
deepfence.io/threatmapper/

Alternatives

Darwin Attack

Darwin Attack

Evolve Security

Alternatives

ThreatStryker

ThreatStryker

Deepfence
Bytesafe

Bytesafe

Bitfront
Coana

Coana

Socket
Tenable One

Tenable One

Tenable

Categories

Categories

Integrations

AWS Fargate
Amazon EKS
Amazon Elastic Container Registry (ECR)
Amazon Web Services (AWS)
CircleCI
Docker
Elasticsearch
GitHub
GitLab
Google Cloud Platform
Google Security Operations (SecOps)
Jira
Kubernetes
Microsoft Azure
OpenShift Cloud Functions
Oracle Cloud Infrastructure
PagerDuty
Slack
Splunk Cloud Platform
VMware Tanzu

Integrations

AWS Fargate
Amazon EKS
Amazon Elastic Container Registry (ECR)
Amazon Web Services (AWS)
CircleCI
Docker
Elasticsearch
GitHub
GitLab
Google Cloud Platform
Google Security Operations (SecOps)
Jira
Kubernetes
Microsoft Azure
OpenShift Cloud Functions
Oracle Cloud Infrastructure
PagerDuty
Slack
Splunk Cloud Platform
VMware Tanzu
Claim Astelia and update features and information
Claim Astelia and update features and information
Claim ThreatMapper and update features and information
Claim ThreatMapper and update features and information