The Leading Internet Intelligence Platform for Threat Hunting and Attack Surface Management.
Censys empowers security teams with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats.
About censys
Censys, Inc.™ is the leading cyber intelligence platform for threat hunting and attack surface management. Founded in 2017 in Ann Arbor, Michigan, Censys provides organizations with the world's most comprehensive real-time visibility into global networks and devices. Customers such as Google, Cisco, Microsoft, Samsung, the Swiss Army, the United States Department of Homeland Security, the U.S. Cybersecurity & Infrastructure Security Agency and over 51% of the Fortune 500 rely on the company's exposure management solution to gain real-time, contextual visibility into their internet and cloud assets.
Product- & Function Overview
The basis of the Censys Internet Intelligence platform is our data. Founded as ZMap, Censys offers its own map of the internet, updated daily with comprehensive coverage for rapid threat detection.
Based on this data, the Censys Internet Intelligence Platform offers two functions:
Censys Attack Surface Management
ASM empowers organizations with the critical information they need to detect, monitor and understand their digital attack surface in real time. This information empowers security teams to identify, prioritize and remediate advanced threats and vulnerabilities. The risk analysis is updated daily and provided in a user-friendly dashboard format. The Censys ASM solution provides the ability to generate helpful risk status reports for management and is compatible with many third-party software tools
Censys Search
Censys Search is the industry leader in Internet scanning technology, providing the largest, most comprehensive and up-to-date data set of Internet information in the world. Censys Search is a powerful search and analysis tool specifically designed to improve the security of networks and Internet-connected devices. It enables organizations and security professionals to gain comprehensive insight into cyber infrastructure and uncover potential vulnerabilities, while Search also gives users access to the world's largest certificate database and historical data on all Internet-connected devices.
Use scenarios
Attack Surface Management Use scenarios
- External attack surface management
- Cloud asset detection
- Threat and risk management
- risk analysis
- Mergers and acquisitions
Search Use scenarios
- Threat detection
- Incident investigation/ forensic work
- Identification of suspicious infrastructures
- Intrusion detection
- Detection of compromised hosts
- Signatures for the detection of security tools
Unique Selling Points
-
Industry-leading scanning technology
With the most advanced scanning infrastructure and techniques deployed across three continents and seven Tier 1 ISPs, Censys provides the most comprehensive and up-to-date view of hosts and services on the global Internet and services on the global Internet.
-
Comprehensive port coverage
By scanning all available 65K ports and cloud services daily, Censys provides the most comprehensive view of services running on hosts, enabling security analysts to better identify risks and detect threats.
-
Automatic log detection
Censys performs analysis to identify protocols regardless of port assignment. This allows security analysts to detect obfuscated threats, such as SSH running on a non-standard port to avoid detection.
-
Access to detailed historical data
Historical Internet intelligence data enables retrospective research and insight into the evolution of TTP (Tactics, Techniques and Procedures), which is critical for security professionals to create detection signatures and prevent future breaches. This data provides a clear understanding of Internet behavior over time and allows companies and organizations to prepare for potential attacks.
-
Structured data and advanced search functions
Unsere robusten Datenerfassungs- und taktischen Suchfunktionen mit über 1.000 analysierten und
indizierten Feldern ermöglichen es Sicherheitsexperten, ausgefeilte Suchlogiken zu erstellen, um Bedrohungen besser zu erkennen, Muster zu identifizieren und Trends im Internet zu verstehen
Technology Partnerships
• Atlassian Jira
• AWS
• Azure
• Microsoft Sentinel
• Cisco Webex Teams
• Google Cloud / GCP
• Microsoft Teams
• Qualys VMDR
• ServiceNow ITSM
• Slack
• Splunk Cloud&Splunk Enterprise
• Tenable VM Atlassian Jira
• AWS
• Azure
• Microsoft Sentinel
• Cisco Webex Teams
• Google Cloud / GCP
• Microsoft Teams
• Qualys VMDR
• ServiceNow ITSM
• Slack
• Splunk Cloud&Splunk Enterprise
• Tenable VM
References
• Swiss Armed Forces
• German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik)
• German Telekom Security
• Swiss Life
• Porsche Digital
• and many more
Certifications
- Censys licenses can be purchased for 1, 3 or 5 year.
- There is no need to install hardware.
- Setup, configuration and implementation (including integration) are chargeable services provided directly by the Censys integration team.
- Pricing information available on request.
Vendor support
Censys Gold-Support
- Includes a dedicated customer success team and ticket options via email (
This email address is being protected from spambots. You need JavaScript enabled to view it. ). - Ticketing options via email and 24/7 chat channels.
- Start-up training session for new customers included. Book as live or recorded version.
- Pricing information on request.
Impact of the technology
on security, compliance, TCO & optimization of resources
- Overall improved visibility of digital attack surfaces, threats and risks
- Less false alarms
- Reduced time to detection
- Improved efficiency through automation and focus
- A large number of integrations that allow Censys to be easily integrated into existing security processes.
Censys Community
In the Censys Community, you can explore innovative features, engage in helpful conversations and become part of a dynamic network that fosters collaboration and growth.