Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ThreatLocker Reviews & Ratings
    464 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    11 Ratings
    Company Website
  • A10 Defend Threat Control Reviews & Ratings
    32 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • Hoxhunt Reviews & Ratings
    4,064 Ratings
    Company Website
  • ActiveBatch Workload Automation Reviews & Ratings
    347 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    397 Ratings
    Company Website
  • NINJIO Reviews & Ratings
    390 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • TruGrid Reviews & Ratings
    64 Ratings
    Company Website

What is Microsoft Defender External ASM?

Microsoft Defender External Attack Surface Management provides a detailed overview of the attack surface that is publicly accessible for your organization, while also revealing previously unnoticed resources to strengthen your security efforts. By utilizing a centralized platform, you can examine your organization's web applications, dependencies, and infrastructure all within a single, cohesive interface, which simplifies the process of managing security. This enhanced visibility allows security and IT teams to discover overlooked resources, evaluate risks with greater precision, and address potential threats more effectively. You have the ability to observe your constantly changing global attack surface in real time, which offers a deep understanding of your organization's assets that are exposed to the internet. Additionally, a clear and searchable inventory provides network teams, security experts, and incident responders with verified details about vulnerabilities, risks, and exposures, covering everything from hardware components to specific application features. Such a comprehensive strategy not only identifies weaknesses but also fosters a proactive approach to defending against cyber threats, ensuring that your organization remains resilient in the face of evolving risks. Ultimately, this tool equips your teams with the knowledge and resources necessary to stay one step ahead of potential cyber incidents.

What is Intrigue?

We thoroughly identify and evaluate each Internet asset within the dynamic and decentralized framework of an organization, vigilantly monitoring them for any potential threats. This process allows us to gain a comprehensive understanding of what an attacker might be able to see. We reveal all assets related to partners and third-party organizations, enabling a thorough analysis of their composition and the relationships among all involved parties. By maintaining a near real-time watch over your infrastructure, we can swiftly identify any changes or vulnerabilities that arise. Additionally, we correlate known threats with your asset database to pinpoint and rectify weaknesses resulting from exploits and configuration mistakes. This leads to the generation of actionable intelligence, empowering you to manage your environment with greater effectiveness. Our solution seamlessly integrates with your existing security measures, enhancing both risk assessment and incident management capabilities. Consequently, this approach delivers an unmatched comprehension of your assets, driven by cutting-edge mapping technology. Moreover, you will benefit from superior asset evaluations focused on identifying vulnerabilities, assessing exposure, and minimizing risk, all while ensuring that your defenses remain resilient against emerging threats. Ultimately, our methodology represents a significant advancement in safeguarding your organization's digital landscape.

Media

Media

Integrations Supported

Axonius
Kroll Cyber Risk
Microsoft Azure

Integrations Supported

Axonius
Kroll Cyber Risk
Microsoft Azure

API Availability

Has API

API Availability

Has API

Pricing Information

$0.011 per asset per day
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Microsoft

Date Founded

1975

Company Location

United States

Company Website

azure.microsoft.com/en-us/products/defender-external-attack-surface-management/

Company Facts

Organization Name

Intrigue

Date Founded

2019

Company Location

United States

Company Website

www.intrigue.io

Categories and Features

Popular Alternatives

Popular Alternatives

Trend Vision One Reviews & Ratings

Trend Vision One

Trend Micro
Tenable One Reviews & Ratings

Tenable One

Tenable