App store for web apps

Find the right software and services.

WebCatalog Desktop

Turn websites into desktop apps with WebCatalog Desktop, and access a wealth of exclusive apps for Mac, Windows. Use spaces to organize apps, switch between multiple accounts with ease, and boost your productivity like never before.

Top Attack Surface Management Software - United States

Attack Surface Management (ASM) software is designed to continuously monitor networks, assets, cloud services, and other digital resources to identify, address, and remediate vulnerabilities. These tools automate various tasks and help prioritize critical threats and vulnerabilities, reducing overall risk. ASM solutions go beyond traditional code-focused vulnerability management by extending their coverage to infrastructure and other internet-facing assets. As modern applications and computing environments generate multiple potential entry points for attackers, ASM solutions aim to provide real-time insights into network and cloud assets. They detect misconfigurations, weak passwords, shadow IT, and numerous other security risks. Once vulnerabilities are identified and tracked, organizations can integrate this threat data into broader security systems, automate remediation efforts, and continuously update their defenses as new threats emerge.

Submit New App


JupiterOne

JupiterOne

jupiterone.com

JupiterOne is a cyber asset analysis platform for cybersecurity designed to continuously collect, connect, and analyze asset data so security teams can see and secure their entire attack surface through a single platform.

Recorded Future

Recorded Future

recordedfuture.com

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,800 businesses and government organizations across more than 75 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.

HostedScan

HostedScan

hostedscan.com

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or import automatically from providers, such as AWS, DigitalOcean, and Linode, with read-only access. Manage and audit risks with dashboarding and reporting.

Informer

Informer

informer.io

Informer's External Attack Surface Management (EASM) and Pen Testing platform help CISOs, CTOs and IT teams map external assets and identify vulnerabilities in real time so they can be remediated before attackers can exploit them. The Informer.io platform provides 24/7, 365 automated security monitoring that helps you assess the risks relating to known and unknown assets, so you can take immediate action to protect and secure your valuable data. Integrated pentesting enables our team of ethical hackers to enhance automated security testing using manual pentesting for a more in-depth and detailed vulnerability assessment. Combining the power of automation and manual security testing we help our clients continuously map their attack surface, manage vulnerabilities, and remediate faster. Informer is a CREST accredited company operating at the highest security testing standards with a constant push to keep innovating.

Halo Security

Halo Security

halosecurity.com

Security testing for the modern attack surface. Our agentless vulnerability scanning and discovery solutions, combined with manual penetration testing services, help thousands of organizations gain full visibility into the risk posture of their websites and applications.

Censys

Censys

censys.com

Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize, and remediate advanced threats and exposures. Censys offers the most up-to-date data available on the internet by conducting daily scans on the top 137 ports and top 1,440 ports in the cloud. Through Censys' dedicated infrastructure and leading Internet Map we scan 45x more services than the nearest competitor. Censys' platform covers key use cases like external attack surface management with >95% attribution accuracy, cloud asset discovery with vendor-agnostic cloud connectors, exposure & risk management, security framework & compliance, and monitoring of mergers & acquisition or subsidiary risk. See why the U.S. Government and over 50% of the Fortune 500 use Censys.

Maltego

Maltego

maltego.com

Maltego is the world’s most used all-in-one intelligence platform for complex cyber investigations. It has empowered over one million investigations worldwide since 2008. Maltego empowers investigators worldwide to accelerate and simplify their investigations through link analysis. It is the all-in-one tool with easy data integration in a single interface, powerful visualization and collaborative capabilities to quickly zero in on relevant information. Maltego is used by a broad audience, from security professionals and pen testers to forensic investigators, investigative journalists, and market researchers. Headquartered in Munich, Maltego has grown to over 100 employees in Germany and works with customers including the Federal Bureau of Investigations, INTERPOL, and major tech and service companies including half of the DOW 30.

RiskProfiler

RiskProfiler

riskprofiler.io

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber risk ratings, Recon RiskProfiler for External Attack Surface Management (EASM) capabilities, Cloud RiskProfiler for Cloud Attack Surface Management (CASM) that identifies actually exposed cloud resources and prioritizes risks, and Brand RiskProfiler for brand protection. Recon RiskProfiler is an advanced EASM and CASM solution with robust integrations across major cloud providers like AWS, Azure, and Google Cloud. It delivers comprehensive visibility into external cloud resources, enabling efficient identification, assessment, and management of vulnerabilities and risks. Vendor RiskProfiler is a comprehensive Cyber Risk and Vendor Risk Management solution that delivers company cyber risk ratings while enabling efficient sending, receiving, and validation of third-party vendor security questionnaires in near real-time, facilitating seamless risk assessment and communication. Brand RiskProfiler is a comprehensive brand protection solution that detects logo abuse, monitors passive phishing, identifies typosquats, enables domain takedowns, and uncovers fake apps, safeguarding organizations' digital reputation and customer trust. Cloud RiskProfiler employs advanced based on context based enriched graph data models to pinpoint and rank actually exposed external-facing assets in the cloud. Evaluating risks through a hacker's lens, it alerts on high-risk assets, fortifying the external cloud attack surface.

Glasstrail

Glasstrail

glasstrail.com

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard and get alerts sent to your tool of choice - so you can focus on remediation. “Previously, we didn’t have the whole picture of our information security risks. With Glasstrail, we have a tool that locates vulnerabilities, tells us whether it’s a high-priority risk, and allows us to protect our data and systems. It’s a very efficient way to find risks as the intelligence built into Glasstrail does all the work.” Chief Security Officer, Teaching Council.

Cavelo

Cavelo

cavelo.com

Cavelo is an Attack Surface Management (ASM) platform, with a proactive focus on minimizing and mitigating risk before a breach occurs. Cavelo empowers MSPs to proactively reduce their customers' cyber risk and liability. Its consolidated attack surface management platform combines sensitive data and asset discovery, access management, and risk-based vulnerability management to simplify governance and compliance initiatives and risk remediation. Cavelo helps businesses proactively reduce cybersecurity risk and achieve compliance with automated data discovery, classification and reporting. Its cloud compatible data protection platform continuously scans, identifies, classifies and reports on sensitive data across the organization, simplifying compliance reporting and risk remediation.

CyCognito

CyCognito

cycognito.com

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCognito scans billions of websites, cloud applications, and APIs to identify potential vulnerabilities and critical risks. This proactive approach enables organizations to address security concerns before they can be exploited by malicious actors, thereby enhancing their overall security posture. The target audience for CyCognito includes emerging companies, government agencies, and Fortune 500 organizations, all of which face increasing threats in today's digital environment. These entities require robust security measures to protect sensitive data and maintain compliance with various regulations. CyCognito serves as an essential tool for security teams, providing them with the insights needed to understand their risk exposure and prioritize remediation efforts effectively. One of the key features of the CyCognito platform is its comprehensive scanning capability, which covers a vast range of digital assets. This extensive reach ensures that organizations can identify vulnerabilities across all their online presence, including third-party services and shadow IT. The platform's AI-driven analysis further enhances its effectiveness by automatically assessing the severity of identified risks, allowing security teams to focus on the most critical issues that could lead to significant breaches. In addition to risk discovery, CyCognito offers actionable guidance for remediation, helping organizations to implement effective security measures. The platform provides detailed insights into the nature of the vulnerabilities and suggests specific steps to mitigate them. This feature not only streamlines the remediation process but also empowers organizations to build a more resilient security framework over time. By integrating CyCognito into their cybersecurity strategy, organizations can significantly reduce their risk exposure and enhance their ability to respond to emerging threats. The platform's unique combination of extensive scanning, AI-driven risk assessment, and actionable remediation guidance positions it as a valuable asset for any organization looking to strengthen its security posture in an increasingly complex threat landscape.

ResilientX

ResilientX

resilientx.com

ResilientX Security is a fast-growing Cyber Security company that helps organizations of all sizes identify, quantify and manage their cyber risks and cyber exposure. At ResilientX, we are committed to delivering state-of-the-art security solutions to help organizations safeguard their digital assets and maintain compliance. Our First-Party and Third-Party Risk and Exposure Management platform is designed for those who take security and compliance seriously.

Scrut Automation

Scrut Automation

scrut.io

Scrut is a one-stop shop for compliance. Scrut is an automation platform that 24/7 monitors and collects evidence of an organisation’s security controls while streamlining compliance to assure audit readiness. Our software provides the fastest solution for achieving and maintaining SOC 2, ISO 27001, HIPAA, PCI, or GDPR compliance in a single place so that you can focus on your business and leave compliance to us. Scrut handles all the infosec compliance standards and internal SOPs in a single-window dashboard. Scrut automatically maps the evidence to applicable clauses across multiple standards while eliminating redundant and repetitive tasks – saving your money and time.

Edgio

Edgio

edg.io

Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrated application and media solutions, provide a single platform for the delivery of high-performing, secure web properties, and streaming content. Through this fully integrated platform and end-to-end edge services, companies can deliver content quicker and more securely, boosting overall revenue and business value. All services run at the edge of our private, global network with 250 Tbps of bandwidth capacity. We process 5% of all web traffic and are rapidly growing. Edgio is trusted and relied on by TD Ameritrade, Plus500, Solvay Bank, Yahoo, Shoe Carnival, Canadian Hockey League, World Champion Fantasy, Mars Wrigley, Coach, and Kate Spade.

Brandefense

Brandefense

brandefense.io

Brandefense is a proactive digital risk protection solution for organizations. Our AI-driven technology constantly scans the online world, including the dark, deep and surface web, to discover unknown events, automatically prioritize risks and deliver actionable intelligence you can use instantly to improve security.

SOCRadar

SOCRadar

socradar.io

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). SOCRadar enables organizations to maximize the efficiency of their SOC teams with false-positive free, actionable, and contextualized threat intelligence.

ThreatMon

ThreatMon

threatmon.io

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cutting-edge solution combines Threat Intelligence, External Attack Surface Management, and Digital Risk Protection to identify vulnerabilities and provide personalized security solutions for maximum security. Threatmon identifies the distinctive nature of each business and provides bespoke solutions that cater to its specific needs. With real-time monitoring, risk scoring, and reporting, Threatmon's Attack Surface Mapping feature helps businesses make informed decisions about their security. Threatmon's big data processing technology identifies potential long-term threats and provides timely preventive measures to protect companies from future attacks. With nine different modules, Threatmon uses advanced technologies and the expertise of cybersecurity professionals to help companies shift from a reactive to a proactive approach. Join the growing number of organizations that trust Threatmon to protect their digital assets and safeguard their future.

Pentera

Pentera

pentera.io

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. Its customers include Casey's General Stores, Emeria, LuLu International Exchange, IP Telecom PT, BrewDog, City National Bank, Schmitz Cargobull, and MBC Group. Pentera is backed by leading investors such as K1 Investment Management, Insight Partners, Blackstone, Evolution Equity Partners, and AWZ. Visit https://pentera.io/ for more information.

Cymulate

Cymulate

cymulate.com

Cymulate is a leading Security Validation Platform based on the industry's most comprehensive and user-friendly Breach and Attack Simulation technology. We empower security teams to continuously test and harden defenses in a dynamic threat landscape by taking the view of the attacker. Cymulate deploys within an hour, integrating with a vast tech alliance of security controls, from EDR, to email gateways, web gateways, SIEM, WAF and more across on-prem, Cloud and Kubernetes environments. Customers see increased prevention, detection and improvement to overall security posture from optimizing their existing defense investments end-to-end across the MITRE ATT&CK® framework. The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and are constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies.

Intruder

Intruder

intruder.io

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation advice on a continuous basis, by customizing the output of multiple industry-leading scanners using the expert advice of our in-house security team.

Cyble

Cyble

cyble.ai

Cyble is one of the fastest-growing threat intelligence provider. Cyble provides the fastest and most comprehensive coverage across adversaries, infrastructure, exposure, weaknesses, and targets. Cyble empowers governments and enterprises to safeguard their citizens and infrastructure by providing critical intelligence in a timely manner and enabling rapid detection, prioritization, and remediation of security threats through its advanced capabilities for data analysis, expert insights, and automated processes.

Detectify

Detectify

detectify.com

Complete External Attack Surface Management for AppSec & ProdSec teams, Start covering your external attack surface with rigorous discovery, 99.7% accurate vulnerability assessments, and accelerated remediation through actionable guidance, all from one complete standalone EASM platform.

© 2025 WebCatalog, Inc.