External Recon

Highlight external attack surfaces and expose easy entry points—so you can
strengthen defensive perimeters and improve your security posture.

Increase Visibility From Port to Port

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua. Lorem ipsum dolor sit amet, consetetur sadipscing elitr. Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam voluptua.

Hackers are constantly looking for low-hanging fruit. Don’t make it easy for them to break in.

External Recon monitors for potential exposures caused by open ports connected to remote desktop services, shadow IT and more—so you can identify tactical opportunities to improve your external security posture.

Find Easy Targets By highlighting open ports from services like RDP/RDS, SMB (Windows File Sharing), SQL server databases and more, you can uncover potential entry points before attackers do.
Scan with Context Powered by Huntress and leveraging Shodan.io, each scanned IP address includes protocol and port numbers, the last time it was queried by Huntress and (when available) the service running on a particular port.
Secure Customers With scans for each of your protected environments, you can assess new and existing customers to define acceptable risk levels and introduce appropriate controls where needed.
Identify Changes With regular scans and updates, you can identify any configuration changes or unexpected activity that may otherwise go unnoticed.

Secure Your Perimeter

By organizing this data in a central location, External Recon helps you highlight important focus areas and identify ways to reduce external attack surfaces. 

While any open port can be an attack surface, they’re sometimes required to provide necessary services to an organization. External Recon provides visibility so you can ensure that ports are open in a secure and appropriate manner—a critical step in protecting your customers.

1.14.21-External-Recon-FINAL

Get In Touch With Us

Looking to connect with a member of the Huntress team?
Contact Us