UpGuard BreachSight features

One solution to cover your attack surface management needs

Acknowledge

Security ratings
Your security rating
?
Instantly understand your overall security posture.
Domain security ratings
?
Instantly understand your domain security posture.
Continuous security monitoring
Risk profile
?
Understand risks shared across your infrastructure.
Domains & IPs
?
Dive deep into individual domain and IP risks.
Attack surface reduction
Vulnerabilities
?
Discover vulnerabilities in software on your website.
Typosquatting
?
Monitor and identify domain permutations.

Remediate

Data protection
Data leak detection
?
Detect sensitive data exposed publicly.
Identity breaches
?
Discover credentials exposed in data breaches.
Workflows and waivers
Remediation workflows
?
Seamless inbuilt workflows to remediate risks.
Risk waivers
?
Accept specific risks that have been identified.
Security profile
Your security profile
?
Eliminate repeated security questionnaires.

Manage

Reporting and insights
Executive reporting
?
In-built executive reports for the Board and C-Suite.
Business operations
Roles and permissions
?
Tailor access for your team to protect sensitive info.
Account security
?
Support for Azure, Okta, Ping Identity and more.
Collaboration notes
?
Attach notes and info for your teammates.
Audit log
?
Keep track of important events and users.
Third-party integrations
UpGuard API
?
Access your account programmatically.
Abstract shape
Shield tick icon

Acknowledge risks

UpGuard risk profileAbstract shape
Rating icon

Security ratings

Use our security ratings to get a data-driven, objective, and dynamic measurement of your organization’s security posture. Our security ratings are generated through the analysis of trusted commercial, open-source, and proprietary threat intelligence feeds and non-intrusive data collection methods.

Your security rating

Instantly understand your organization’s overall security posture.
  • Check icon
    Easy to understand for non-technical stakeholders and senior management
  • Check icon
    Updated multiple times a day
  • Check icon
    Based on the analysis of each of your underlying domains and their security ratings

Domain security ratings

Explore the security posture of individual domains and drill into issues.
  • Check icon
    Based on the analysis of hundreds of individual risks across five risk categories
Shield icon

Continuous security monitoring

Get real-time information about misconfigurations, understand your risk profile, and get started in minutes, not weeks, with our fully integrated solution and API. Because we use externally verifiable information, you won’t have to lift a finger to get started.

Risk profile

Instantly understand your risk profile and drill down into individual risks shared across your infrastructure.
  • Check icon
    Transparent security ratings
  • Check icon
    Intelligent risk categories
  • Check icon
    Updated daily
  • Check icon
    Real-time risk insights

Domains & IPs

View the domains and IPs that belong to your organization and their corresponding cyber risks.
  • Check icon
    See the security rating of each domain and associated risks
  • Check icon
    Automatic domain discovery, no manual input needed
  • Check icon
    Label domains based on owner, use, or any other category
Shield globe icon

Attack surface reduction

Reduce your attack surface by discovering exploitable vulnerabilities and permutations of your domains that are at risk of typosquatting.

Vulnerabilities

Discover vulnerabilities that may be exploitable in the software that is running on your websites.
  • Check icon
    Automatically detected through exposed information in HTTP headers and website content
  • Check icon
    Each vulnerability has CVE ID information and a CVSS, a numerical score between 0 and 10 that reflects the severity

Typosquatting

Monitor and identify permutations of your domains that are at risk of typosquatting.
  • Check icon
    Prevent bait and switching, domain parking, imitators, phishing, and other typosquatting-related risks
Terminal icon

Remediate risks

UpGuard remediation requestAbstract shape
Data leak icon

Data protection

Failure to detect exposed data can have serious consequences on your business, from enabling corporate espionage to customer identity theft. This data provides attackers with a huge advantage: enabling reconnaissance, providing a foothold in the network for further exploration, selling data to the highest bidder, or holding data at ransom.

Data leak detection

Detect sensitive data exposed by employees, contractors, and third-parties. Whether it’s credentials, intellectual property, proprietary code, personal data, or financial data, UpGuard can help protect your sensitive assets.
  • Check icon
    UpGuard’s analysts review exposures, prevent false positives, and assign severities
  • Check icon
    Protect customer data and avoid reputation, business, and regulatory damages
  • Check icon
    Find exposed employee credentials before attackers do
  • Check icon
    Detect sensitive documents that aren’t meant for distribution
  • Check icon
    Identify API keys from hundreds of providers, database connection strings, SSL certificates, and more
  • Check icon
    Monitor for data exposures that occur at third-party party vendors that reference your organization

Identity breaches

Discover credentials exposed in third-party data breaches on the open, deep, and dark web and notify affected employees before their accounts are compromised.
  • Check icon
    Notify impacted employees from inside the platform
  • Check icon
    Archive remediated breaches
  • Check icon
    Automated severity assessment
  • Check icon
    Know what data has been exposed
Workflows icon

Workflows and waivers

Simplify and accelerate how you remediate issues, waive risks, and respond to security queries. Use our real-time data to get information about risks, rely on our workflows to track progress, and know exactly when issues are fixed.

Remediation workflows

Use inbuilt workflows to remediate risks identified by the UpGuard platform.
  • Check icon
    Fix man-in-the-middle risks
  • Check icon
    Find insecure SSL/TLS certificates
  • Check icon
    Understand email security
  • Check icon
    Enforce HSTS
  • Check icon
    Close unnecessary open ports
  • Check icon
    Fix vulnerable software
  • Check icon
    Prevent HTTP accessibility
  • Check icon
    Secure cookie configuration

Risk waivers

Accept specific risks that have been identified by the UpGuard platform.
  • Check icon
    Stop risks from appearing in your risk profile and impacting the internally-reported score of your company
User profile icon

Security profile

Eliminate security questionnaires and stop answering the same questions over and over. Create an UpGuard security profile and share it before being asked.

Security profile

Save time by proactively and securely sharing your security information in one place. This includes your security rating, industry comparison, completed security questionnaires, and supporting documents. Save time and let companies assess you without email tennis and configure who has access in a few clicks. 
  • Check icon
    Avoid responding to the same security-related queries
  • Check icon
    Embeddable on your website
  • Check icon
    Streamlined workflows
  • Check icon
    An access log of who has viewed your profile
  • Check icon
    Control who has access your profile
Check bracket icon

Manage risks

UpGuard Executive SummaryAbstract shape
Pie chart icon

Reporting and insights

See all risks–across different domains, IPs, and categories–in the UpGuard platform or extract the data directly from the API.

Executive reporting

Use our prebuilt executive reporting suite to get insights right inside the platform. With structured access to your data, you can do things such as: see your current security rating and twelve-month history, compare your organization to your competition, and breakdown your security rating into various risk categories like website security and email security.
  • Check icon
    Prebuilt reportings for company security rating, competitor analysis, and risk category breakdown
  • Check icon
    Filter executive summary based on labels
  • Check icon
    Customizable report
  • Check icon
    Export report to PDF
User profile icon

Business operations

Share access to your UpGuard account with other team members with confidence. Each user gets an individual account with fine-grained access control.

Roles and permissions

Tailor access for your team to ensure that sensitive information and actions are protected. Keep track of who has access to your UpGuard account and remove team members easily.
UpGuard roles and permissions

Account security

Secure access to the UpGuard platform and your account data. Integrate with various SSO options like Microsoft Azure, Okta, and Ping Identity. As long as your identity provider has a SAML interface we can integrate with it.
  • Check icon
    SSO options like Microsoft Azure, Okta, and Ping Identity
  • Check icon
    SAML integration

Collaboration notes

Attach notes for your teammates on remediation requests, risk waivers, and data leaks to give them context when they jump into the platform.
UpGuard collaboration notes

Audit log

Keep track of important events and who performed them inside the UpGuard platform.
  • Check icon
    Searchable
  • Check icon
    Real-time reporting and data
  • Check icon
    Filter by user, event type, and time
  • Check icon
    Streamline workflows
Cloud server icon

Third-party integrations

Integrate and extend the UpGuard platform with other tools with our easy to use API that can save hours of human time.

UpGuard API

Access information about your UpGuard account programmatically.
UpGuard Executive Summary
Pricetag icon

Simple, transparent pricing

Start monitoring your organization from $5,000 per year.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
Website Security scan resultsWebsite Security scan ratingAbstract shape

Book a free demo

Book a free, personalized onboarding call with one of our cybersecurity experts.