Intrigue
You can't fix what you can't see.

Gain Unparalleled Visibility of your Cloud and IT Assets Today.
Intrigue enables IT and Security teams with an in-depth and actively updated inventory of systems, applications, and other relevant assets.
GET STARTED NOW

Gain visibility of your digital assets and prevent exposures.

Domain
Domains
Domain
Hosts
Software
Web Applications
Network Services
Network Services
Certificates
Certificates
Cloud Apps
Cloud Apps

Gain Third Party Visibility

Using a vast array of OSINT sources and the power of the core engine's graph discovery, Intrigue provides unparalleled external asset visibility.

Intrigue uses link analysis technology to identify third party links and relationships, allowing security teams to gain visibility of third-party risk.

Improve Cyber Hygiene

Intrigue helps security teams identify assets that are no longer used, but still present a risk to the organization.

Identify Vulnerabilities

Intrigue makes it simple to identify exposed vulnerabilities in application stacks and their underlying hosts. Vulnerability information can be easily exported for vulnerability management teams.

Prevent Shadow IT

Unmanaged systems and networks are a reality for most organizations, forcing security teams to scramble to find and document these assets. Intrigue can help identify and track down the owners of unmanaged systems and applications.

Discover Assets

Vulnerability Intelligence

DB
Exposed Database Services
Gears
Exposed TCP/UDP Services
Floppies
Obsolete Libraries
Vulnerable Application Stacks
Vulnerable Application Stacks
Associated Third Parties
Associated Third Parties

Why Intrigue

Attack surface is no longer limited to domain records and IP address ranges. Cloud infrastructures, 3rd party networks and applications are making attack surface progressively more difficult to manage.

Enterprise teams need intelligent mechanisms to discover and secure their public presence and to keep track of unmanaged and exposed assets.

How It Works

Intrigue routinely collects publicly available perimeter information based on open source intelligence.

Intrigue emulates actions of a security researcher by interactively mapping publicly-facing systems, exposed services, and applications. Starting with 'seed' information, like a domain name, Intrigue uses over 60 unique modules to build an intelligent knowledge graph of visible enterprise assets, their applications, misconfigurations, and vulnerabilities.

Our customers can manage the accuracy of the reports by supplying private 'seed' information and filtering out inaccurate associations. They also benefit from advanced assessment plugins not available to the public, which take further steps to uncover information valuable to potential attackers.

Monitor and Defend Your Digital Frontier
Start by reviewing searching for and reviewing intelligence we have pre-collected on companies, and create an account to obtain access to private details for your own organization.
Get Started