Control External Trust Across Your Business
Thunder combines EASM and supply chain intelligence to deliver accurate, up-to-date trust insights across your ecosystem.
External Asset Awareness
Continuously identify and track first- and third-party internet-facing assets that shape your real attack surface.
Exposure Priorization
Contextualize external exposure using real adversary behavior to focus decisions on what matters most
Continuous Trust Evaluation
Evaluate external exposure trends across your environment and vendors to support consistent trust decisions.
Supply Chain Intelligence
Monitor vendor and partner exposure using the same external perspective applied to your own organization.
Attack Surface Research
Data-driven insights from continuous monitoring of Latin American enterprise infrastructure

Choose Your Plan
Select the perfect plan for your organization's security needs
Free
Discover your external exposure
- 1 root domain
- Up to 50 assets
- Basic asset discovery
- Limited Refresh
Core
Real visibility into your external infrastructure and immediate suppliers
- 5 domains
- Access for up to 2 team members
- ~500 assets monitored
- Always-on, centrally orchestrated discovery
- Non-intrusive network analysis and protocol inspection
- Application and Technology classification
- Change tracking with historical visibility
- Baseline supply-chain exposure intelligence
- Standard platform support
- Actionable remediation guidance
Advanced
Risk intelligence across your external attack surface and supply chain.
- Unlimited domains*
- Monitoring for ~3,000–5,000 internet-facing assets
- Access for up to 5 team members
- Continuous, large-scale discovery and monitoring
- Extended protocol enumeration
- Supply chain discovery with dependency mapping
- Vendor and supplier risk scoring
- Attack path and exposure chain analysis
- Compliance-aligned mappings (SOC 2, ISO 27001)
- Executive-ready risk and exposure reporting
- API access
- Analyst-assisted validation of high-impact findings
- Priority platform support
Enterprise
Fully managed risk intelligence service providing continuous visibility, expert analysis, and accountable security oversight.
- Everything included in Advanced
- Unlimited assets and root domains
- Custom users across security, risk, and executive teams
- Multi-organization and subsidiary management
- Dedicated security analysts aligned to your environment
- Managed risk intelligence and continuous exposure oversight
- Custom integrations with SIEM, SOAR, and ticketing systems
- Dedicated account and engagement manager
- 24/7 premium support with defined escalation paths
- Advanced analytics and business intelligence reporting
- White-label and co-branded reporting options
- Custom SLA and service guarantees
- On-demand security and risk advisory services