website.recon.titleLine1
website.recon.titleLine2
website.recon.subtitle
| mockups.scanTable.scan | mockups.scanTable.target | mockups.scanTable.entryPoints | mockups.scanTable.vulnerabilities | mockups.scanTable.risk | mockups.scanTable.status |
|---|---|---|---|---|---|
Production Audit 2 hours ago | A acme-corp.eu | 47 | 2 5 12 8 | 6.8 | mockups.scanTable.completed |
Staging Check 5 hours ago | S staging.fintech.io | 23 | 0 2 7 4 | 4.2 | mockups.scanTable.completed |
Partner Portal 1 day ago | P partners.logistica.it | 31 | 1 3 9 6 | 5.7 | mockups.scanTable.completed |
Weekly Scan mockups.scanTable.running 67% | H api.healthtech.de | 15 | 0 1 3 2 | 3.1 | 67% |
New Client Onboard Queued | R shop.retailco.es | - | - | - | mockups.scanTable.queued |
website.recon.statSubdomains
website.recon.statPorts
website.recon.statTech
website.recon.statCVE
website.recon.featuresTitle
website.recon.featuresSubtitle
website.recon.features.subdomains
website.recon.features.subdomainsDesc
website.recon.features.ports
website.recon.features.portsDesc
website.recon.features.tech
website.recon.features.techDesc
website.recon.features.cve
website.recon.features.cveDesc
website.recon.features.risk
website.recon.features.riskDesc
website.recon.features.dns
website.recon.features.dnsDesc
website.recon.pipelineTitle
website.recon.pipelineSubtitle
website.recon.pipeline.phase1
website.recon.pipeline.phase1Tools
5-10s
website.recon.pipeline.phase2
website.recon.pipeline.phase2Tools
5-10s
website.recon.pipeline.phase3
website.recon.pipeline.phase3Tools
5-10s
website.recon.pipeline.phase4
website.recon.pipeline.phase4Tools
15-25s
website.recon.pipeline.phase5
website.recon.pipeline.phase5Tools
3-5s
website.recon.pipeline.phase6
website.recon.pipeline.phase6Tools
10-30s
website.recon.insideTitle
website.recon.insideSubtitle
website.recon.demoTitle
website.recon.demoSubtitle
website.recon.vulnTitle
website.recon.vulnSubtitle
FortiOS Out-of-Bound Write
A out-of-bound write vulnerability in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code via specially crafted HTTP requests.
PAN-OS Command Injection
A command injection vulnerability in the GlobalProtect feature of PAN-OS allows unauthenticated attackers to execute commands with root privileges.
mockups.severity.distribution
website.recon.trendTitle
website.recon.trendSubtitle
mockups.trend.vulnerabilityTrend
website.recon.vsTitle
website.recon.vsSubtitle
| website.recon.capability | Orizon RECON | Qualys EASM | CrowdStrike Falcon |
|---|---|---|---|
| website.recon.cmpTools | Multi-stage | 3-4 | 5-6 |
| website.recon.cmpCVE | 10+ databases | 2-3 | 3-4 |
| website.recon.cmpAccuracy | 90%+ | ~80% | ~85% |
| website.recon.cmpTime | Under 60s | 5-10 min | 2-5 min |
| website.recon.cmpNIS2 | |||
| website.recon.cmpFrameworks | 7 frameworks | 1-2 | 0 |
| website.recon.cmpPrice | EUR 50/domain | EUR 15K+/yr | EUR 25K+/yr |
website.recon.pricingTitle
website.recon.pricingSubtitle
Pay-As-You-Go
- website.recon.priceFeat1
- website.recon.priceFeat2
- website.recon.priceFeat3
- website.recon.priceFeat4
Starter
- website.recon.starterFeat1
- website.recon.starterFeat2
- website.recon.starterFeat3
- website.recon.starterFeat4
Professional
- website.recon.proFeat1
- website.recon.proFeat2
- website.recon.proFeat3
- website.recon.proFeat4
Business
- website.recon.bizFeat1
- website.recon.bizFeat2
- website.recon.bizFeat3
- website.recon.bizFeat4
Enterprise
- website.recon.entFeat1
- website.recon.entFeat2
- website.recon.entFeat3
- website.recon.entFeat4
website.recon.relatedTitle
website.recon.relatedSubtitle