Get a hold of your digital assets.

Hidden threats. Supplier risks. Discover and bring them into focus.

Get your demo

Trusted by customers, technology suppliers, and managed service providers.

The problem

Your attack surface is bigger than you think.

It's what you own—and who you’re connected to.

Limited or manual discovery that falls flat

Poor scalability, missing critical applications and APIs.

Third-party blind spots

Typical vendor risk assessments overlook the real cyber risk of suppliers.

Undefined digital attack surface

Data can’t adequately cover Software Bill of Materials (SBOM).

Visibility of Digital Assets

Organisations struggle to maintain an inventory of their internet-facing assets, including lost or shadow IT. ThingsRecon helps discover and map them, as well as their proximity and importance.

Vulnerability Identification

ThingsRecon identifies potential vulnerabilities in digital assets, by providing deeper context, proximity, and discovery—allowing organisations to proactively address weaknesses before attackers exploit them.

Risk Prioritization

Not all vulnerabilities pose the same level of risk and therefore ThingsRecon helps organisations prioritize remediation efforts by providing deeper understanding of risk and understanding of Cyber Hygiene & Asset Connection Resilience.

Attack Surface Reduction

ThingsRecon helps organisations reduce their overall attack surface, minimizing the potential entry points for cyberattacks  by assisting to improve their overall cyber security posture.

Visibility of Digital Assets

Organisations struggle to maintain an inventory of their internet-facing assets, including lost or shadow IT. ThingsRecon helps discover and map them, as well as their proximity and importance.

Vulnerability Identification

ThingsRecon identifies potential vulnerabilities in digital assets, by providing deeper context, proximity, and discovery—allowing organisations to proactively address weaknesses before attackers exploit them.

Risk Prioritization

Not all vulnerabilities pose the same level of risk and therefore ThingsRecon helps organisations prioritize remediation efforts by providing deeper understanding of risk and understanding of Cyber Hygiene & Asset Connection Resilience.

Attack Surface Reduction

ThingsRecon helps organisations reduce their overall attack surface, minimizing the potential entry points for cyberattacks  by assisting to improve their overall cyber security posture.

ThingsRecon exposes what others miss with deeper, context-rich insights.

Ongoing visibility to reduce unknown exposure.

Our discovery engine  
+
Advanced AI
+
Context-rich insights

Your things. Discovered.

Visibility over risk  
+
Significance assessment
+
Proximity-based prioritisation

Your decisions. Informed.

Deeper context-rich data
+
Added proximity & resilience

Your digital footprint. Defined.

OUR TEAM

The Minds Behind ThingsRecon

Robin de Vries

CEO

Stephane Konarkowski

CPO & Co-Founder

Nicolas Renard

CTO & Co-Founder

Ashley Clark

CCO

Tim Grieveson

CSO & EVP Information Security

Daan Dia

Investor & Co-Founder

Aziz Maakaroun

Investor & Co-Founder

Tom Lukas Steingräber

AI Digital Producer

Testimonials

“We were surprised by the level of ‘things’ discovered—far greater than any other solution we have used or tested. ThingsRecon helps Northumbria NHS focus our security approach based on evidenced exposure. And they have worked with our team really closely to quickly prioritise and address our most important exposures”

Simon Sleightholm

Information Assurance & Security Manager
@Northumbria Healthcare

"We operate TR Discovery as a service for our clients, testing and assessing their external attack surface so they can act on the findings. Our goal is always to ensure cyberpositive improvements—not just to point out weaknesses. When we’ve needed top technical results fast, TR has delivered. The tool gives clear, actionable data, and the ThingsRecon team has been flexible, supportive, and technically solid."

Jani Kallio

CEO
@Fraktal

Pricing

ThingsRecon External Attack Surface Management Platform

Digital Asset Discovery

Automate mapping via digital footprints (domains, IPs, scripts)

Measure cyber hygiene and quantify risk to drive smarter security investments

Meet regulatory requirements (NIS2, DORA)

*Pay per domain

Supply Chain Discovery

Assess supplier cyber risk with transparent scoring

Understand proximity—their level of integration into your digital surface

Continuously monitor your supply chain

*Pay per supplier

Get a quote