The Intrigue Product

An Open Platform For Comprehensive Asset Discovery and Risk-based Vulnerability Assessment

The Workflow

Asset Mapping and Incident Resolution

Discover Your Assets

Nonlinear Search

Begin with known entities, or seeds, to find additional assets and map relationship. Optimize discovery across multiple, variable parameters.

Heuristic-based Scoping

Automatically determine if found assets are relevant for defined search parameters. Improve results through rules-based, learning algorithms.

Pivoting and Path Discovery

Utilize learned relationships among available data to find and analyze additional assets. Create a graph representation of the attack surface.

Identify and Assess Risk

Vulnerability Scans

Continually monitor for exposure and attacks. Assess risk across applications, network services and javascript components.

Asset Fingerprinting

Leverage deep understanding of both assets and configurations to precisely match known threats and exposures to the affected assets and apply fixes.

Change Detection

Identify all changes to the attack surface, including new, retired, and modified assets.  Evaluate all changes for potential exposure.

Integrate for Incident Resolution

Information Routing

Tag and route all detail on any exposure, along with asset information to the asset owner for issue tracking.  Ensure immediate visibility and awareness.

Incident Management

Integrate with your existing service management solution for rapid resolution.  Validate that all fixes have been implemented and vulnerability eliminated.

Automated Workflows

Define and schedule entity and threat specific tasks to automate attack surface management across the environment.

The Architecture

Proven in the Enterprise, Powered by Open Source

Intrigue Enterprise

Integrated platform for attack surface management.

Global Mapping Intelligence
Source Credential Management
Ticketing and Enterprise Integrations
Enhanced Asset and Vulnerability Discovery
Engine Orchestration & Monitoring

Intrigue Core

Open Source discovery engine for asset mapping, vulnerability identification, and misconfiguration detection

Intrigue Core
Intrigue Core
Intrigue Core
Technology Identification (Ident)
Discovery Techniques
Commercial Sources
Open Source
+250
Integrations

The Intergrations

Intrigue leverages over 250 data sources and security tools

Utilize the combined strength for optimal asset visibility, risk analysis, and threat resolution.

Azure Blob logo in black and white
Amazon Web Services logo in black and white
Cloudflare logo in black and white
42 Matters logo in black and white
Gitlab logo in black and white
Hunter.io logo in black and white
Zetalytics logo in black and white
Shodan.io logo in black and white
Apptweak logo in black and white
Google Cloud logo in black and white
SecurityTrails logo in black and white
Have I Been Pwned logo in black and white
Wordpress logo in black and white
AlienVault logo in black and white
PublicWWW logo in black and white
BuiltWith logo in black and white
Whoisology logo in black and white
Grayhat Warfare logo in black and white
GitHub logo in black and white
Spyse logo in black and white
Censys logo in black and white
Binary Edge logo in black and white
crt.sh logo in black and white
Slack logo in black and white