+
+

Related Products

  • Astra Pentest
    211 Ratings
    Visit Website
  • Aikido Security
    106 Ratings
    Visit Website
  • Wiz
    1,059 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    67 Ratings
    Visit Website
  • Chainguard
    42 Ratings
    Visit Website
  • Criminal IP
    13 Ratings
    Visit Website
  • Reflectiz
    14 Ratings
    Visit Website
  • ManageEngine Endpoint Central
    2,343 Ratings
    Visit Website
  • NINJIO
    393 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,109 Ratings
    Visit Website

About

Simplify the security assessment process with hosted vulnerability scanners. From attack surface discovery to vulnerability identification, actionable network intelligence for IT & security operations. Proactively hunt for security weakness. Pivot from attack surface discovery to vulnerability identification. Find security holes with trusted open source tools. Get access to tools used by penetration testers and security professionals around the world. Hunt vulnerabilities from the attackers perspective. Simulating real world security events, testing vulnerabilities and incident response. Discover the attack surface with tools and open source intelligence. Protect your network with improved visibility. Over 1 million scans performed last year. Our vulnerability scanners have been launching packets since 2007. Fixing security issues requires you find them. Identify the issue, re-mediate the risk and test again to be sure.

About

Intelligent Discovery helps you manage your AWS security with ease. Our industry-leading AWS vulnerability scanning and remediation tool allows you to quickly identify potential threats—without slowing down your infrastructure. Stay ahead of attackers looking for exploitable weaknesses by proactively identifying, resolving, and mitigating security threats through a user-friendly interface. Automate Security Auditing, Security Log Management, Customize Controls and so much more! Consolidated capacity, cost, and volume tools are in an evolving and scaling environment without impacting production or breaking the bank. As an organization grows, so does the management complexity of compliance. Defined organizational rule sets and customization expedite compliance. Consistent and frequent security logs, inventory, and change log monitoring bring inventory management into a consolidated interface.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

IT security teams wanting a vulnerability scanner solution to simplify their security assessment processes and operations

Audience

Companies that use AWS seeking a solution to improve their operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

$10 per month
Free Version
Free Trial

Pricing

$199 per month
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Hacker Target
Founded: 2009
Australia
hackertarget.com

Company Information

Ldaptive
Founded: 2014
United States
www.intelligentdiscovery.io

Alternatives

Alternatives

OUTSCAN

OUTSCAN

Outpost24
Acunetix

Acunetix

Invicti Security

Categories

Categories

IT Asset Management Features

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
Inventory Management
IT Service Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Integrations

Amazon Web Services (AWS)
Drupal
Joomla!
Microsoft SharePoint
Nmap
OpenVAS
Stripe
StrongDM
Wappalyzer
WordPress

Integrations

Amazon Web Services (AWS)
Drupal
Joomla!
Microsoft SharePoint
Nmap
OpenVAS
Stripe
StrongDM
Wappalyzer
WordPress
Claim Hacker Target and update features and information
Claim Hacker Target and update features and information
Claim Intelligent Discovery and update features and information
Claim Intelligent Discovery and update features and information