Who you are.
What you own.
What to defend.
SixMap’s advanced technology goes wider, deeper, and faster—surfacing known and unknown entities, hosts, and exposures so you can protect them.
SixMap’s advanced technology goes wider, deeper, and faster—surfacing known and unknown entities, hosts, and exposures so you can protect them.
M&A activity and operational expansion extend what you need to protect, spreading your team thin and complicating compliance. If assets are overlooked or vulnerabilities are left undetected, risk increases to unacceptable levels. Security leaders need efficient solutions that can provide visibility and keep up with the pace of modern business.
SixMap reveals the whole organization—every entity, asset, and exposure. Complete and accurate data, delivered in near real-time.
entities uncovered through SixMap’s organizational mapping procedure — exposing what’s truly yours to defend.
IP addresses discovered with IPv6 asset discovery — turning overlooked hosts into defended ground.
exposures revealed across all 65,535 ports — closing gaps before they become exploitable risks.
Gain visibility, find out what your tools are missing. Schedule a Demo
Each step in SixMap’s continuous process provides high-fidelity data, showing you what infrastructure you own, what’s exposed to the public Internet, and what risks need to be mitigated urgently.
STEP 1: MAP
Who you really are
Sequence your full organizational structure, including subsidiaries, shells, and other legal entities– often, 5X more than traditional sources can identify. This is the foundation of knowing what’s truly yours to defend.
Learn more >
STEP 2: DISCOVER
What you actually own
SixMap’s 6Gen algorithm continuously discovers hosts across IPv4 and IPv6, uncovering every asset and tying it back to its rightful owner. Nothing slips through, and nothing is left unaccounted for.
Learn more >
STEP 3: ASSESS
Where your exposures actually live
SixMap conducts comprehensive exposure assessments, inspecting all 65,535 ports on each host, every day— silently, efficiently and accurately. Daily assessments are made possible with SixMap’s independently operated ISP.
Learn more >
STEP 4: PRIORITIZE
What you need to defend
SixMap turns signal into certainty, enriching vulnerabilities with threat intelligence and data on real-world exploitation activity so defenders can act on the risks that truly matter. Every decision is quicker, sharper, and evidence-based.
Learn more >
Learn how SixMap uncovers what others miss. Download Solutions Brief
With SixMap, you continuously receive high-fidelity data that improves visibility and operational efficiency, all without additional effort from your team.
Trusted by Fortune 500 and Government Agencies
Elwyn Wong
CISO, Ross Stores
“Out of thousands of Internet-facing assets, SixMap was able to automatically pinpoint the most pressing vulnerabilities that required immediate action based on quantifying the risk by correlating the threat actors and exploitable vulnerabilities. We’re glad they have partnered with AWS to deliver value to their customers.”
How SixMap is being leveraged
Continuously monitor your exposures for vulnerabilities and risks.
Track and monitor all cloud instances visible from the Internet in real time.
Gain a complete and accurate inventory of all external domains and IP addresses.
Accurately evaluate the risk of an organization before an M&A activity.
Frequently asked questions
SixMap is an agentless SaaS solution. It does not require any installation, downloads, or agents. The product UI can be accessed through any web browser and the data can be ingested via RESTful APIs and webhooks.
SixMap’s discovery procedure has two main components: our unique mapping methodology and 6Gen, our core technology. SixMap’s methodology begins by mapping out an organization’s structure, finding all subsidiaries, holding companies, shell companies, and other legal entities that belong to the parent organization globally. Each of these entities serves as a starting point for the asset discovery process, which uncovers all networks, IP addresses, and domains.
6Gen, SixMap’s computational mapping algorithm, is unique in that it can detect hosts across both the IPv4 and IPv6 address spaces. SixMap uses 6Gen, along with other data sources like WHOIS and DNS records, to provide a complete, accurate, and up-to-date inventory of all your external assets. This discovery process is silent, safe, and non-intrusive.
SixMap’s host discovery and exposure assessment processes are fast, efficient, silent, and completely safe. The SixMap platform does not pose any risk to the confidentiality, integrity, or availability of your organization’s assets. SixMap does not run any intrusive tests or exploit scripts, so there is no activity that might be considered dangerous or risky.
Yes. SixMap offers several RESTful APIs and webhooks that make it easy to ingest the data into any other tools in your environment. All licenses include access to the APIs and webhooks at no additional cost.
SixMap has 3 major differentiators. First, SixMap begins by truly getting to know an organization’s DNA before running technical processes. The organization mapping process identifies all legal entities that belong to a single parent organization, including all subsidiaries, holding companies, etc. On average, we find 5-10x more entities than what’s known to major business intelligence firms.
Second, SixMap’s host discovery process uses 6Gen, a proprietary technology, to uncover all IP addresses and hosts across both the IPv4 and IPv6 spaces. Other tools on the market have very limited discovery capabilities in the IPv6 space, possibly leaving some assets exposed and unmanaged. While many security teams think they do not use IPv6, we almost always find some IPv6 addresses in use.
Third, SixMap’s exposure assessment inspects all 65,535 ports on every host, during every assessment. Most other tools check the top 1,000 to 5,000 most commonly-used ports, which fails to detect exposed services on high ports and creates risk. SixMap finds 7-9% more exposures by assessing all ports, on each host, every single time we run an assessment.
Legacy tools stop at fragments — partial scans, incomplete inventories, and misattributions. SixMap goes further, mapping the entire organization across IPv4 and IPv6, tying every host and exposure back to its rightful entity.
SixMap prices the platform based on the number of full-time employees at your organization, which serves as a proxy for the complexity of your digital infrastructure and the quantity of external assets you need to monitor and protect. It may help to think of a SixMap contract as a “site license,” which covers your entire organization, regardless of the exact number of assets and users.
While some organizations price based on the number of assets, this pricing model may sometimes put customers in a position where they’re incentivized to ignore some of their own assets in order to stay in a lower pricing tier. SixMap prefers a pricing model that encourages customers to protect all of their infrastructure and assets.
See the SixMap Platform in Action
Schedule a time to talk with us and view a demo.
"*" indicates required fields