Get a hold of your digital assets.
Hidden threats. Supplier risks. Discover and bring them into focus.
Get your demo.png)
%20(1).png)
Trusted by customers, technology suppliers, and managed service providers.


The problem
Your attack surface is bigger than you think.
It's what you own—and who you’re connected to.
Limited or manual discovery that falls flat
Poor scalability, missing critical applications and APIs.
Third-party blind spots
Typical vendor risk assessments overlook the real cyber risk of suppliers.
Undefined digital attack surface
Data can’t adequately cover Software Bill of Materials (SBOM).
Visibility of Digital Assets
Organisations struggle to maintain an inventory of their internet-facing assets, including lost or shadow IT. ThingsRecon helps discover and map them, as well as their proximity and importance.
Vulnerability Identification
ThingsRecon identifies potential vulnerabilities in digital assets, by providing deeper context, proximity, and discovery—allowing organisations to proactively address weaknesses before attackers exploit them.
Risk Prioritization
Not all vulnerabilities pose the same level of risk and therefore ThingsRecon helps organisations prioritize remediation efforts by providing deeper understanding of risk and understanding of Cyber Hygiene & Asset Connection Resilience.
Attack Surface Reduction
ThingsRecon helps organisations reduce their overall attack surface, minimizing the potential entry points for cyberattacks by assisting to improve their overall cyber security posture.


ThingsRecon exposes what others miss with deeper, context-rich insights.
Ongoing visibility to reduce unknown exposure.
OUR TEAM
The Minds Behind ThingsRecon

Robin de Vries
CEO
.png)
Stephane Konarkowski
CPO & Co-Founder
.png)
Nicolas Renard
CTO & Co-Founder
.png)
Ashley Clark
CCO
.png)
Tim Grieveson
CSO & EVP Information Security

Daan Dia
Investor & Co-Founder
.png)
Aziz Maakaroun
Investor & Co-Founder
.png)
Tom Lukas Steingräber
AI Digital Producer
Testimonials
Pricing
ThingsRecon External Attack Surface Management Platform
Digital Asset Discovery
Automate mapping via digital footprints (domains, IPs, scripts)
Measure cyber hygiene and quantify risk to drive smarter security investments
Meet regulatory requirements (NIS2, DORA)
*Pay per domain
Supply Chain Discovery
Assess supplier cyber risk with transparent scoring
Understand proximity—their level of integration into your digital surface
Continuously monitor your supply chain
*Pay per supplier