+
+

Related Products

  • Criminal IP ASM
    18 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • Reflectiz
    15 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • Predict360
    18 Ratings
    Visit Website
  • Orca Security
    495 Ratings
    Visit Website
  • NINJIO
    415 Ratings
    Visit Website
  • DXtrade
    6 Ratings
    Visit Website
  • Criminal IP
    15 Ratings
    Visit Website

About

We discover and analyze all Internet assets across an organization's dynamic, distributed environment and continually monitor them for risk. See everything an adversary would. Discover all assets, including partner and third party entities. Examine asset composition and understand relationships among all entities. Monitor your infrastructure in near real time to detect changes and exposure. Associate known threats to your asset inventory. Eliminate vulnerability from exploits and misconfiguration. Develop actionable intelligence to control your environment. Integrate across your security programs to optimize risk analysis and Incident resolution. The most comprehensive understanding of your assets, driven by powerful mapping technology. Superior asset analysis for vulnerability detection, exposure assessment, and risk mitigation.

About

Notus integrates with a wide range of data sources to deliver continuous, unified asset visibility, enabling actionable insights for critical remediation. Identify all devices, software, and configurations with existing tools. Focus on the most critical vulnerabilities first. Stay informed of changes and emerging threats. Uncover vulnerabilities and misconfiguration. Ensure that security considerations are addressed throughout the asset and software lifecycles. Track software usage, prevent violations, and optimize costs. continuous. Streamline issue resolution by assigning tasks to relevant teams. Conducting manual cybersecurity asset inventories is labor-intensive, often carried out around 12 times annually. Despite this effort, you still won't achieve an up-to-date, consolidated view of your entire environment. By using Notus, the process of managing cybersecurity asset inventories becomes straightforward and instantaneous.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Attack surface management platform for companies wanting to discover and analyze all Internet assets

Audience

Enterprises searching for a solution to streamline their cyber asset attack surface management operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Intrigue
Founded: 2019
United States
www.intrigue.io

Company Information

Notus
Founded: 2023
United Kingdom
www.notuscyber.com

Alternatives

Alternatives

Tenable One

Tenable One

Tenable
Qualys VMDR

Qualys VMDR

Qualys

Categories

Categories

Integrations

Alibaba Cloud
Cisco CX Cloud
CrowdStrike Falcon
CyberArk Conjur
Delinea Secret Server
Forcepoint DLP
GitHub
Lansweeper
Microsoft Intune
Microsoft System Center Operations Manager (SCOM)
Microsoft Teams
Nexpose
Palo Alto Networks DNS Security Service
Qualys VMDR
Rapid7 InsightVM
Splunk Cloud Platform
Trellix Endpoint Security (HX)
Trend Micro Deep Security
Tufin
VMware vSphere

Integrations

Alibaba Cloud
Cisco CX Cloud
CrowdStrike Falcon
CyberArk Conjur
Delinea Secret Server
Forcepoint DLP
GitHub
Lansweeper
Microsoft Intune
Microsoft System Center Operations Manager (SCOM)
Microsoft Teams
Nexpose
Palo Alto Networks DNS Security Service
Qualys VMDR
Rapid7 InsightVM
Splunk Cloud Platform
Trellix Endpoint Security (HX)
Trend Micro Deep Security
Tufin
VMware vSphere
Claim Intrigue and update features and information
Claim Intrigue and update features and information
Claim Notus and update features and information
Claim Notus and update features and information