Loading Thunder Engine…
EASM + Supply Chain Research

Control External Trust Across Your Business

Thunder combines EASM and supply chain intelligence to deliver accurate, up-to-date trust insights across your ecosystem.

External Asset Awareness

Continuously identify and track first- and third-party internet-facing assets that shape your real attack surface.

Exposure Priorization

Contextualize external exposure using real adversary behavior to focus decisions on what matters most

Continuous Trust Evaluation

Evaluate external exposure trends across your environment and vendors to support consistent trust decisions.

Supply Chain Intelligence

Monitor vendor and partner exposure using the same external perspective applied to your own organization.

THREAT RESEARCH

Attack Surface Research

Data-driven insights from continuous monitoring of Latin American enterprise infrastructure

Early Beta

Choose Your Plan

Select the perfect plan for your organization's security needs

MonthlyYearlySave up to 31%

Free

Basic external exposure insights
$0

Discover your external exposure

  • 1 root domain
  • Up to 50 assets
  • Basic asset discovery
  • Limited Refresh
Free Trial Available

Core

Autonomous Exposure Monitoring
$699
/month
Regular: $699/month

Real visibility into your external infrastructure and immediate suppliers

  • 5 domains
  • Access for up to 2 team members
  • ~500 assets monitored
  • Always-on, centrally orchestrated discovery
  • Non-intrusive network analysis and protocol inspection
  • Application and Technology classification
  • Change tracking with historical visibility
  • Baseline supply-chain exposure intelligence
  • Standard platform support
  • Actionable remediation guidance
Free Trial Available

Advanced

Operational Risk Intelligence & Supply Chain Security
$2,099
/month
Regular: $2,099/month

Risk intelligence across your external attack surface and supply chain.

  • Unlimited domains*
  • Monitoring for ~3,000–5,000 internet-facing assets
  • Access for up to 5 team members
  • Continuous, large-scale discovery and monitoring
  • Extended protocol enumeration
  • Supply chain discovery with dependency mapping
  • Vendor and supplier risk scoring
  • Attack path and exposure chain analysis
  • Compliance-aligned mappings (SOC 2, ISO 27001)
  • Executive-ready risk and exposure reporting
  • API access
  • Analyst-assisted validation of high-impact findings
  • Priority platform support
Contact Us

Enterprise

Managed Risk Intelligence & Supply Chain Security
Custom

Fully managed risk intelligence service providing continuous visibility, expert analysis, and accountable security oversight.

  • Everything included in Advanced
  • Unlimited assets and root domains
  • Custom users across security, risk, and executive teams
  • Multi-organization and subsidiary management
  • Dedicated security analysts aligned to your environment
  • Managed risk intelligence and continuous exposure oversight
  • Custom integrations with SIEM, SOAR, and ticketing systems
  • Dedicated account and engagement manager
  • 24/7 premium support with defined escalation paths
  • Advanced analytics and business intelligence reporting
  • White-label and co-branded reporting options
  • Custom SLA and service guarantees
  • On-demand security and risk advisory services