EXPOSURE ASSESSMENT

Continuous and comprehensive exposure assessment

Legacy exposure management tools scan a subset of ports, leaving many exposures hidden. SixMap continuously inspects all 65,535 ports on every host across IPv4 and IPv6, so nothing is ever missed.

Uncover all exposures in near real-time, across all assets

Large enterprises manage tens or hundreds of thousands of external digital assets, making exposure assessment a complex process. Legacy tools typically only scan the top 1,000 to top 5,000 ports on hosts, leaving many exposures undetected. SixMap provides advanced technology that continuously and exhaustively inspects all ports on each asset, revealing every Internet-facing exposure.

Delivering innovative exposure assessment capabilities

SixMap is elevating exposure management, turning a complex and time-consuming challenge into a streamlined, highly precise security process that delivers real results.

Own your exposures, surface the truth.   Schedule a Demo

An exposure assessment solution that saves time and reduces risk.

SixMap’s advanced technology enables continuous, comprehensive exposure assessments of your entire digital estate. An independently owned and operated Internet Service provider (ISP) makes SixMap’s assessments safe, efficient, accurate, and silent.

Continuous Assessment

  • Runs continuously, when one ends another begins

  • Completed at least once weekly, as often as daily

  • Changelog shows exactly what changed between runs

Safe & Silent Operation

  • Orchestrated from SixMap’s independent ISP for full control

  • Conducted efficiently to speed up results and improve accuracy
  • Designed to assess silently without triggering alerts

Exhaustive Port Inspection

  • All 65,535 ports assessed on every live IP address

  • Exhaustive assessment at least once weekly
  • Reveals hidden services on non-standard ports

Service Enumeration

  • Analyzes each open port to check for services in use

  • Identifies exposures on non-standard and ephemeral ports
  • Enumerates the service, vendor, product and version

Software Inventory

  • Shows exactly what software is running in your environment

  • Inventories all services exposed to the public Internet
  • Enables quick response when new CVEs are published

An exposure assessment solution that saves time and reduces risk.

SixMap’s advanced technology enables continuous, comprehensive exposure assessments of your entire digital estate. An independently owned and operated Internet Service Provider (ISP) makes SixMap’s assessments safe, efficient, accurate, and silent.

Continuous Assessment
Safe & Silent Operation
Exhaustive Port Inspection
Service Enumeration
Software Inventory
Continuous Assessment

Continuous Assessment

  • Runs continuously, when one ends another begins

  • Completed at least once weekly, as often as daily

  • Changelog shows exactly what changed between runs

Safe & Silent Operation

Safe & Silent Operation

  • Orchestrated from SixMap’s independent ISP for full control

  • Conducted efficiently to speed up results and improve accuracy
  • Designed to assess silently without triggering alerts

Exhaustive Port Inspection

Exhaustive Port Inspection

  • All 65,535 ports assessed on every live IP address

  • Exhaustive assessment at least once weekly
  • Reveals hidden services on non-standard ports

Service Enumeration

Service Enumeration

  • Analyzes each open port to check for services in use

  • Identifies exposures on non-standard and ephemeral ports
  • Enumerates the service, vendor, product and version

Software Inventory

Software Inventory

  • Shows exactly what software is running in your environment

  • Inventories all services exposed to the public Internet
  • Enables quick response when new CVEs are published

Complete and accurate exposure data that delivers real business value

SixMap’s exposure assessment capabilities improve visibility, save time, and help you preemptively mitigate risks before an attack takes place.

Own your exposures, surface the truth.   Schedule a Demo

Trusted by Fortune 500 and Government Agencies

Elwyn Wong

CISO, Ross Stores

“Out of thousands of Internet-facing assets, SixMap was able to automatically pinpoint the most pressing vulnerabilities that required immediate action based on quantifying the risk by correlating the threat actors and exploitable vulnerabilities. We’re glad they have partnered with AWS to deliver value to their customers.”

SixMap Platform Use Cases

Exposure Management

Continuously monitor your exposures for vulnerabilities and risks.

Learn more>

External Cloud Visibility

Track and monitor all cloud instances visible from the Internet in real time.

Learn more>

IT Asset Inventory

Gain a complete and accurate inventory of all external domains and IP addresses.

Learn more>

M&A Cyber Risk Due Diligence

Accurately evaluate the risk of an organization before an M&A activity.

Learn more>

Frequently asked questions

How is SixMap’s solution deployed? Does it require agents?

SixMap is an agentless SaaS solution. It does not require any installation, downloads, or agents. The product UI can be accessed through any web browser and the data can be ingested via RESTful APIs and webhooks. 

How does SixMap’s discovery process work?

SixMap’s discovery procedure has two main components: our unique mapping methodology and 6Gen, our core technology. SixMap’s methodology begins by mapping out an organization’s structure, finding all subsidiaries, holding companies, shell companies, and other legal entities that belong to the parent organization globally. Each of these entities serves as a starting point for the asset discovery process, which uncovers all networks, IP addresses, and domains.

6Gen, SixMap’s computational mapping algorithm, is unique in that it can detect hosts across both the IPv4 and IPv6 address spaces. SixMap uses 6Gen, along with other data sources like WHOIS and DNS records, to provide a complete, accurate, and up-to-date inventory of all your external assets. This discovery process is silent, safe, and non-intrusive.

Many exposure management tools are noisy and may cause disruption to systems or applications. How does SixMap avoid these challenges?

SixMap’s host discovery and exposure assessment processes are fast, efficient, silent, and completely safe. The SixMap platform does not pose any risk to the confidentiality, integrity, or availability of your organization’s assets. SixMap does not run any intrusive tests or exploit scripts, so there is no activity that might be considered dangerous or risky.

Does SixMap integrate with the other tools in my security stack?

Yes. SixMap offers several RESTful APIs and webhooks that make it easy to ingest the data into any other tools in your environment. All licenses include access to the APIs and webhooks at no additional cost.

How is SixMap different from similar products on the market?

SixMap has 3 major differentiators. First, SixMap begins by truly getting to know an organization’s DNA before running technical processes. The organization mapping process identifies all legal entities that belong to a single parent organization, including all subsidiaries, holding companies, etc. On average, we find 5-10x more entities than what’s known to major business intelligence firms. 

Second, SixMap’s host discovery process uses 6Gen, a proprietary technology, to uncover all IP addresses and hosts across both the IPv4 and IPv6 spaces. Other tools on the market have very limited discovery capabilities in the IPv6 space, possibly leaving some assets exposed and unmanaged. While many security teams think they do not use IPv6, we almost always find some IPv6 addresses in use.

Third, SixMap’s exposure assessment inspects all 65,535 ports on every host, during every assessment. Most other tools check the top 1,000 to 5,000 most commonly-used ports, which fails to detect exposed services on high ports and creates risk. SixMap finds 7-9% more exposures by assessing all ports, on each host, every single time we run an assessment.

How is SixMap different from other exposure management tools?

Legacy tools stop at fragments — partial scans, incomplete inventories, and misattributions. SixMap goes further, mapping the entire organization across IPv4 and IPv6, tying every host and exposure back to its rightful entity.

How is SixMap’s platform priced?

SixMap prices the platform based on the number of full-time employees at your organization, which serves as a proxy for the complexity of your digital infrastructure and the quantity of external assets you need to monitor and protect. It may help to think of a SixMap contract as a “site license,” which covers your entire organization, regardless of the exact number of assets and users.

While some organizations price based on the number of assets, this pricing model may sometimes put customers in a position where they’re incentivized to ignore some of their own assets in order to stay in a lower pricing tier. SixMap prefers a pricing model that encourages customers to protect all of their infrastructure and assets.

See the SixMap Platform in Action

Schedule a time to talk with us and view a demo.

Get A Demo Form

"*" indicates required fields