Defend What Your Attacker Sees
What is the risk profile of your network on IPv6?
Product
We use empirical analysis, or direct observations of the network, to obtain “ground” truth about your network exposure and risks on IPv6 and IPv4, even if you’ve already deployed state-of-the art tools.

How is protecting your
network on IPv6 different?

Monitoring

Brute force - host discovery methods cannot scale to IPv6 due to the size of IPv6.

Stateless Address Autoconfiguration (SLAAC)

Devices self assign IPv6 addresses and automatically obtain global connectivity.

Network Address Translation (NAT)

Every device in an IPv6 network has an IP address that can be pointed to directly from the internet instead of the external address of the router or firewall.

Firewall/Network Intrusion Detection Systems

Admins need to augment existing rules and filters to protect devices and services on IPv6.

View our Product

How is SixMap different?

We’ve reimagined network mapping to index IPv6 and IPv4 comprehensively and internet-wide.

Adaptive Empirical Analysis(AEA)

“Smart scanning” obtains ground truth about your network attack surface from the attackers perspective.

50x Network Attack Surface Visualization

View analysis on all 65,535 TCP ports on IPv6 and IPv4.

Attribution

Attribute vulnerabilities, network services, and devices to their owner regardless of physical or virtual locations (cloud instances). 

Facilitate IPv6 Transition

Detect and remediate network security policy and divergence between IPv6 and IPv4 to enable organizations to meticulously monitor and plan their transition during IPv4 only, dual stack, and IPv6 only deployments.

Discover Risks with Direct Network Observation

Use empirical data to detect and resolve misconfiguration of existing security tools and achieve an ideal network security posture.

Prioritize High Risk Attack Vectors

Preempt exploits by providing a triaged index of externally exposed CVEs.

Accelerate Zero-Trust Architecture

Enumerate all network services, even if they belong to your partners. Identify extraneous public facing services to accelerate your transition to a Zero-Trust Architecture.
Schedule a Demo Today
See what your attackers see on IPv6 and IPv4.
Request a Demo