Ratings and Reviews 0 Ratings
Ratings and Reviews 18 Ratings
What is Exein?
Exein Core serves as an integral part of hardware, providing protection against external threats independently of cloud computing resources.
Exein IDS stands out as the world's pioneering IDS firmware designed to address supply chain exploitation and provide timely alerts.
Exein CVECheck examines firmware for vulnerabilities, facilitating their identification and subsequent remediation.
From development through execution, security measures can be implemented to resolve vulnerabilities effectively.
This solution offers robust protection and management capabilities for a diverse range of firmware types, ensuring comprehensive security throughout the entire lifecycle.
What is Criminal IP ASM?
Criminal IP's Attack Surface Management (ASM) is a cutting-edge platform driven by intelligence that seeks to constantly pinpoint, catalog, and supervise all internet-connected resources associated with an organization, including often ignored and shadow assets, thereby granting teams insight into their genuine external exposure as seen by potential attackers. This innovative solution combines automated asset identification with open-source intelligence (OSINT) techniques, enhancements via artificial intelligence, and advanced threat intelligence to uncover exposed hosts, domains, cloud services, IoT devices, and various other entry points on the internet, while also gathering evidence like screenshots and metadata, linking discoveries to known vulnerabilities and tactics used by attackers. By assessing exposures in terms of business significance and risk, ASM highlights vulnerable components and misconfigurations, delivering real-time alerts and interactive dashboards that streamline investigation and remediation processes. Moreover, this all-encompassing tool not only aids organizations in managing their security stance but also equips them to stay ahead of emerging threats by fostering a proactive security culture within their teams. Ultimately, the proactive management of attack surfaces can significantly enhance an organization's resilience against cyber risks.
Integrations Supported
Cisco CX Cloud
Criminal IP
Google Chrome
Nmap
Polarity
PolySwarm
Splunk Cloud Platform
Sumo Logic
Tenable Cloud Security
VirusTotal
Integrations Supported
Cisco CX Cloud
Criminal IP
Google Chrome
Nmap
Polarity
PolySwarm
Splunk Cloud Platform
Sumo Logic
Tenable Cloud Security
VirusTotal
API Availability
Has API
API Availability
Has API
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Pricing Information
Pricing not provided.
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
Exein
Date Founded
2018
Company Location
Italy
Company Website
www.exein.io
Company Facts
Organization Name
AI Spera
Date Founded
2017
Company Location
United States
Company Website
www.criminalip.io/products/asm/attack-surface-management
Categories and Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
IoT
Application Development
Big Data Analytics
Configuration Management
Connectivity Management
Data Collection
Data Management
Device Management
Performance Management
Prototyping
Visualization
Categories and Features
Cybersecurity
AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection