Red Sift ASMRed Sift
|
||||||
Related Products
|
||||||
About
Censys Attack Surface Management (ASM) continually uncovers unknown assets ranging from Internet services to cloud storage buckets, and comprehensively checks all of your public-facing assets for security and compliance problems regardless of where they’re hosted. Cloud services enable companies to be innovative and agile, but they also scatter security risks across hundreds of cloud projects and accounts that span dozens of providers. Exacerbating the problem, non-IT employees regularly spin up unmanaged cloud accounts and services, creating blind spots for security teams. Censys ASM provides you with comprehensive security coverage of your Internet assets regardless of their location and account. Censys continually uncovers unknown assets ranging from Internet services to storage buckets, provides you with an inventory of all public-facing assets, uncovers egregious security problems, and supercharges your existing security investment.
|
About
Red Sift ASM (formerly Hardenize) provides a managed service that combines automated internet asset discovery with continuous network and security monitoring.
Internet Asset Discovery
Multiple sources of information feeds our custom search engine to help you find your websites. Background searches find new properties that belong to you and automatically add them to your inventory.
Host and Network Monitoring
We continuously monitor your entire network perimeter with fresh data updated daily. We combine scanning of domains, hostnames, and IP addresses.
Certificate Inventory and Expiration Monitoring
We monitor your certificates and notify if they're about to expire. Crucially, we also monitor the certificates of third-party services, helping you avoid problems via dependencies and services you don't control directly.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Enterprises in need of an attack surface management solution to uncover unknown assets from Internet services to cloud storage buckets
|
Audience
Organizations interested in a powerful third-party risk management and attack surface management platform.
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationCensys
Founded: 2017
United States
censys.io/product/
|
Company InformationRed Sift
Founded: 2015
United Kingdom
redsift.com/pulse-platform/asm
|
|||||
Alternatives |
Alternatives |
|||||
|
||||||
|
||||||
Categories |
Categories |
|||||
Network Security Features
Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning
|
||||||
Integrations
Axonius
Blink
Dropzone AI
EclecticIQ
Faraday
Google Cloud Platform
Jira
Microsoft Azure
Nmap
Polarity
|
Integrations
Axonius
Blink
Dropzone AI
EclecticIQ
Faraday
Google Cloud Platform
Jira
Microsoft Azure
Nmap
Polarity
|
|||||
|
|