• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
External Attack Surface Management

External Attack Surface Management Reviews and Ratings

What is External Attack Surface Management?

External attack surface management (EASM) refers to the processes, technology and professional services deployed to discover internet-facing enterprise assets and systems and exposures that could be exploited by malicious threat actors. EASM is useful in identifying unknown assets and providing information about the organization’s systems, cloud services and applications that are available and visible in the public domain and therefore can be exploited by an attacker/adversary. This visibility can also be extended to the organization’s subsidiaries or third parties. EASM are most commonly cloud-based products and services but can also be delivered ‘as a service’. EASM appeals to security operations functions involved with penetration testing, vulnerability management and threat hunting who want better visibility of their internet-facing assets to complement their threat and exposure management program.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of RiskProfiler
RiskProfiler
Logo of Intruder
Intruder
Logo of Infinity Platform
Infinity Platform
For 50M-1B USD Companies
Logo of RiskProfiler
RiskProfiler
Logo of Darkivore
Darkivore
Logo of CyCognito Platform
CyCognito Platform
For Asia/Pacific
Logo of RiskProfiler
RiskProfiler
Logo of Infinity Platform
Infinity Platform
Logo of CyCognito Platform
CyCognito Platform
Integration & Deployment
Logo of RiskProfiler
RiskProfiler
Logo of watchTowr Platform
watchTowr Platform
Logo of Hadrian
Hadrian

Product Listings

Filter by

Products 1 - 20 of 91
Sort by
Logo of Microsoft Defender External Attack Surface Management

Microsoft Defender External Attack Surface Management

By Microsoft

4.3
(152 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of RiskProfiler

RiskProfiler

By RiskProfiler

5
(96 Ratings)

RiskProfiler is a centralized cybersecurity platform that helps organizations manage external risks and protect digital assets effectively. Using AI, machine learning, and proprietary algorithms, RiskProfiler provides unified visibility into external-facing assets like domains, IPs, and DNS records. It prioritizes remediation by categorizing assets based on criticality and analyzing exposures with real-time threat intelligence. Continuous scans identify vulnerabilities, outdated software, shadow IT, and unmanaged assets to strengthen security posture.

The platform includes Dark Web Intelligence to analyze malicious activities on the dark web, monitor sensitive data breaches, address compromised accounts, and uncover counterfeit and unauthorized product listings. Its Physical Threat Intelligence solution provides real-time geographic threat visualization, enabling organizations to proactively assess risks such as natural disasters and social-political issues across business locations.

Show More Details
Logo of Halo Security

Halo Security

By Halo Security

4.6
(95 Ratings)

Halo Security is an external attack surface management platform, offering asset discovery, risk and vulnerability assessment, and manual penetration testing services in a unified dashboard. Led by experienced penetration testers and veterans of the cybersecurity industry, Halo Security is dedicated to bringing the attacker’s perspective to the modern organization.

Show More Details
Logo of Falcon Surface

Falcon Surface

By CrowdStrike

4.6
(85 Ratings)

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details
Logo of Cortex Xpanse

Cortex Xpanse

By Palo Alto Networks

4.5
(77 Ratings)

Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.

Show More Details
Logo of CyCognito Platform

CyCognito Platform

By CyCognito

4.6
(39 Ratings)

CyCognito solves one of the most fundamental business problems in cybersecurity: seeing how attackers view your organization, where they are most likely to break in, what systems and assets are at risk and how you can eliminate the exposure. Founded by national intelligence agency veterans, CyCognito has a deep understanding of how attackers exploit blind spots and a path of least resistance. Based in Palo Alto, CyCognito serves a number of large enterprises and Fortune 500 organizations.

Show More Details
Logo of Mandiant Advantage Attack Surface Management

Mandiant Advantage Attack Surface Management

By Google (Mandiant)

4.2
(32 Ratings)

Mandiant specializes in providing services in dynamic cyber defense, threat intelligence and incident response.

Show More Details
Logo of Darkivore

Darkivore

By Potech

4.8
(31 Ratings)

Founded in 2002, Potech operates primarily in the fields of Information & Technology and Cybersecurity. With a broad range of cybersecurity services and products, Potech supports a variety of global sectors.

Key offerings from Potech include DARKIVORE, a DRP and CTI platform for vulnerability and threat neutralization; TACIVOAR, a technology for complete control of IT and Cloud infrastructures; and OCTIVORE, a scalable SIRP to promptly respond to security threats and can work harmoniously with any SIEM solution.

The group incorporates specialized entities with concentrations on cybersecurity consulting, IT governance, training, academic research, innovation, cybersecurity technology development, software development, and managed services, amongst others. Potech is ISO 9001 and ISO 27001 certified and committed to maintaining these high international standards.

Show More Details
Logo of Bitsight Cyber Risk Intellligence

Bitsight Cyber Risk Intellligence

By Bitsight

4.4
(30 Ratings)

Bitsight provides global cyber risk intelligence by leveraging advanced AI to empower organizations with precise insights derived from an extensive external cybersecurity dataset. With more than 3,400 customers and 65,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface.

Bitsight proactively uncovers security gaps across infrastructure, cloud environments, digital identities, and third- and fourth-party ecosystems. From security operations and governance teams to executive boardrooms, Bitsight provides the unified intelligence backbone required for confidently managing cyber risk to address exposures before they impact performance.

Show More Details
Logo of Intruder

Intruder

By Intruder

4.7
(24 Ratings)

Intruder helps lean security teams proactively uncover and fix weaknesses by unifying attack surface management, cloud security and continuous vulnerability scanning in one intuitive platform. With compliance-ready reports and actionable results prioritized by severity and exploit likelihood, Intruder helps 3,000+ customers focus on fixing what matters. Integrating seamlessly with AWS, Azure, Google Cloud, Slack, Jira and more, Intruder makes exposure management simple, effective and scalable for growing teams.

Show More Details
Logo of Infinity Platform

Infinity Platform

By Check Point Software Technologies

4.8
(21 Ratings)

Check Point Software Technologies Ltd. is a company that offers cyber security solutions to governmental and business entities around the world. The company's solutions are designed to safeguard against a variety of cyber threats including malware and ransomware. With Check Point's multilevel security architecture, dubbed 'Infinity Total Protection with Gen V advanced threat prevention', cloud, network, and mobile devices of businesses are protected. Additionally, Check Point provides a comprehensive and easy-to-manage control security management system.

Show More Details
Logo of Group-IB Attack Surface Management

Group-IB Attack Surface Management

By Group-IB

4.6
(16 Ratings)

Group-IB, based in Singapore, specializes in the provision of services aimed at the detection and prevention of cyberattacks, identification of online fraud, high-tech crime investigations, and safeguarding of intellectual property. The company has Threat Intelligence and Research Centers situated in Dubai, Singapore and Amsterdam. The firm leverages its experience of almost two decades in cybercrime investigations, coupled with extensive hours of cybersecurity incident response. The company also plays an instrumental role in global investigations in collaboration with international law enforcement bodies such as Europol and Interpol. Group-IB's operation integrate its knowledge in cyber intelligence with a spectrum of advanced software and hardware solutions targeted to monitor and impede cyberattacks. The firm is driven by its mission to offer its clients continual security in cyberspace through the development and application of forward-thinking solutions and services.

Show More Details
Logo of Recorded Future Attack Surface Intelligence

Recorded Future Attack Surface Intelligence

By Recorded Future

4.4
(16 Ratings)

Recorded Future, the world's largest threat intelligence company, offers a comprehensive Intelligence Cloud platform. It provides end-to-end intelligence, ranging from adversaries and infrastructure to targets. The tool indexes the internet, including open and dark web as well as technical sources, offering real-time visibility into an expanding attack surface and threat landscape. This helps enterprises reduce risk and drive their business securely with speed and confidence. Though headquartered in Boston, Recorded Future has its offices and employees spread globally. It assists a vast range of businesses and governmental organizations with real-time, unbiased and actionable intelligence.

Show More Details
Logo of Assetnote Continuous Security Platform

Assetnote Continuous Security Platform

By Searchlight Cyber (Assetnote)

4.4
(15 Ratings)

Assetnote is a platform that offers effective mapping and continuous monitoring solutions for an organization's external attack surface. Its operations involve the use of advanced reconnaissance techniques in both the web and mobile channels. Additionally, the platform also provides continuous security analysis, providing businesses with essential insight and control over their changing exposure. This ensures that enterprises maintain awareness of potential vulnerabilities and can efficiently manage their security posture.

Show More Details
Logo of Censys Attack Surface Management

Censys Attack Surface Management

By Censys

4.5
(13 Ratings)

Censys is an Internet Intelligence Platform for Threat Hunting and Attack Surface Management. Censys wields large internet datasets and an extensive certificate database in combination with integration capabilities with various cloud providers to offer an up-to-date view of the internet. That view informs the foundation for Censys Attack Surface Management (ASM), a solution that helps monitor and protect your external assets. Censys’ mission is to be the one place to understand everything on the internet.

Show More Details
Logo of F5 Distributed Cloud Web App Scanning

F5 Distributed Cloud Web App Scanning

By F5

4.6
(13 Ratings)
Show More Details
Logo of watchTowr Platform

watchTowr Platform

By watchTowr

5
(13 Ratings)

The watchTowr Platform is a platform providing Preemptive Exposure Management technology by combining Proactive Threat Intelligence with External Attack Surface Management (EASM). The company aims to identify high-impact vulnerabilities by streamlining the process of large attack surface examination. The platform leverages advanced technology and combines it with extensive experience in offensive security and red teaming, acting as a persistent adversarial presence in the cyber space.

Show More Details
Logo of Hadrian

Hadrian

By Hadrian

4.9
(11 Ratings)

Gain complete control of your external attack surface with Hadrian's dynamic asset discovery, continuous penetration testing and AI threat prioritization. Hadrian provides the hacker perspective so that organizations can proactively manage their threat exposure. The hacker perspective is essential when assessing and prioritizing security risks as it is the most accurate representation of the true threat to an organization. Hadrian's autonomous platform in reveals exploitable vulnerabilities in real-time by assessing threats across your entire digital attack surface continuously. The solution automatically validates results, removing false positives and prioritizing the most critical risks. Workflow acceleration tools streamline and automate remediation cutting the mean time to response and minimizing the window of exposure.

Show More Details
Logo of CTM360

CTM360

By CTM360

4.8
(10 Ratings)

CTM360 is a unified external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surface, Deep & Dark Web Monitoring, Security Ratings, Third Party Risk Management and Unlimited Takedowns. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360.

Show More Details
Logo of Detectify Platform

Detectify Platform

By Detectify

4.4
(10 Ratings)

Detectify provides advanced application security testing for evolving attack surface coverage. Appsec teams use Detectify to expose how attackers can exploit their internet-facing applications. The Detectify platform automates continuous real-world, payload-based attacks fuelled by its global community of ethical hackers into its own engines, exposing critical weaknesses before it's too late.

Show More Details

Gartner Research

Gartner Peer Insights 'Voice of the Customer': External Attack Surface Management

Top Trending Products

Cyble VisionInfinity PlatformRiskProfilerIONIX Attack Surface ManagementIntruderCheck Point Infinity External Risk ManagementFalcon SurfaceCensys Attack Surface ManagementCortex XpanseCloudSEK BeVigil

Popular Product Comparisons

Falcon Surface vs Microsoft Defender External Attack Surface ManagementCortex Xpanse vs Falcon SurfaceMandiant Advantage Attack Surface Management vs Microsoft Defender External Attack Surface ManagementCyCognito Platform vs Microsoft Defender External Attack Surface ManagementCortex Xpanse vs Microsoft Defender External Attack Surface ManagementFalcon Surface vs Mandiant Advantage Attack Surface ManagementHalo Security vs Microsoft Defender External Attack Surface ManagementCortex Xpanse vs Mandiant Advantage Attack Surface Management

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2025 Gartner, Inc. and/or its affiliates.

All rights reserved.