Censys

Censys ืžืชื—ื–ืงืช ืืช ืžืคืช ื”ืชืฉืชื™ื•ืช ื”ืžืงื™ืคื” ื•ื”ืžื”ื™ืžื ื” ื‘ื™ื•ืชืจ ืฉืœ ื”ืื™ื ื˜ืจื ื˜ ื”ื’ืœื•ื‘ืœื™, ื•ืžืืคืฉืจืช ืœืืจื’ื•ื ื™ื ื‘ืจื—ื‘ื™ ื”ืขื•ืœื ืœื–ื”ื•ืช ืกื™ื›ื•ื ื™ื, ืœื”ื’ื™ื‘ ื‘ืฆื•ืจื” ื™ืขื™ืœื” ื•ืœืžื ื•ืข ืคืจืฆื•ืช ืื‘ื˜ื—ื” ืขื•ื“ ืœืคื ื™ ืฉื”ืŸ ืžืชืจื—ืฉื•ืช

ื”ืžืœืฆื” ืฉืœ CyberLion

ืœืจืื•ืช ื”ื›ื•ืœ. ืœืื‘ื˜ื— ื”ื›ื•ืœ. Censys ืžืกืคืงืช ื ืจืื•ืช ื—ืกืจืช ืชืงื“ื™ื ืขืœ ืคื ื™ ื›ืœ ื”ืื™ื ื˜ืจื ื˜, ื•ืžืืคืฉืจืช ืœื›ื ืœื’ืœื•ืช ื•ืœื ื˜ืจ ื›ืœ ื ื›ืก, ื‘ื›ืœ ืžืงื•ื
programming-background-with-person-working-with-codes-computer 1

ืชื›ื•ื ื•ืช ืขื™ืงืจื™ื•ืช

ื ืจืื•ืช ืžืœืื” ืฉืœ ื ื›ืกื™ื

ื–ื™ื”ื•ื™ ื›ืœ ื ื›ืก ื”ืคื•ื ื” ืœืื™ื ื˜ืจื ื˜ ื‘ื›ืœ ื”ืกื‘ื™ื‘ื•ืช, ื‘ื–ืžืŸ ืืžืช.

ื ื™ื˜ื•ืจ ืจืฆื™ืฃ

ืงื‘ืœืช ื”ืชืจืื•ืช ืžื™ื™ื“ื™ื•ืช ืขืœ ื—ืฉื™ืคื•ืช ื—ื“ืฉื•ืช, ื—ื•ืœืฉื•ืช ืื• ืฉื’ื™ืื•ืช ืชืฆื•ืจื”

ืชื™ืขื“ื•ืฃ ืกื™ื›ื•ื ื™ื ืื•ื˜ื•ืžื˜ื™

ื”ืชืžืงื“ื•ืช ื‘ืื™ื•ืžื™ื ื‘ืขืœื™ ื”ื”ืฉืคืขื” ื”ื’ื‘ื•ื”ื” ื‘ื™ื•ืชืจ, ื‘ื”ืชื‘ืกืก ืขืœ ื ืชื•ื ื™ ื ื™ืฆื•ืœ ืžื”ืขื•ืœื ื”ืืžื™ืชื™.

ืžื•ื“ื™ืขื™ืŸ ืื™ื ื˜ืจื ื˜ ื’ืœื•ื‘ืœื™

ื ื™ืฆื•ืœ ืžืื’ืจ ื ืชื•ื ื™ ื”ืกืจื™ืงื” ื”ืจื—ื‘ ื•ื”ืžืงื™ืฃ ื‘ื™ื•ืชืจ ื‘ืชืขืฉื™ื™ื” ืœืจื•ื—ื‘ ื”ืจืฉืช

ืื™ื ื˜ื’ืจืฆื™ื•ืช ื—ืœืงื•ืช

ื—ื™ื‘ื•ืจ ืงืœ ื•ืคืฉื•ื˜ ืœืคืœื˜ืคื•ืจืžื•ืช SIEM, โ€SOAR ื•ื ื™ื”ื•ืœ ื—ื•ืœืฉื•ืช.

ื—ื‘ื™ืœืช ืžื•ืฆืจื™ื

ืคืœื˜ืคื•ืจืžื”

ื”ืคืœื˜ืคื•ืจืžื” ื”ืื—ืช ืœื”ื’ื ื” ืขืœ ื”ืืจื’ื•ืŸ ืฉืœื›ื ื‘ืื™ื ื˜ืจื ื˜

ื ื™ื”ื•ืœ ืžืฉื˜ื— ืชืงื™ืคื”

ื’ืœื•, ืชืขื“ืคื• ื•ื”ืกื™ืจื• ื—ืฉื™ืคื•ืช ื‘ืืžืฆืขื•ืช Censys Attack Surface Management

ืฆื™ื“ ืื™ื•ืžื™ื

ื—ืงื™ืจื” ื•ื ื˜ืจื•ืœ ื™ื–ื•ืžื™ื ืฉืœ ืื™ื•ืžื™ื ื‘ืืžืฆืขื•ืช Censys Threat Hunting.

ื ืจืื•ืช ืื™ื ื˜ืจื ื˜ื™ืช

ืฆื•ื•ืชื™ ืื‘ื˜ื—ื” ื–ืงื•ืงื™ื ืœื™ื•ืชืจ ืžื ืงื•ื“ื•ืช ื ืชื•ื ื™ื ืžื‘ื•ื“ื“ื•ืช โ€” ื”ื ืฆืจื™ื›ื™ื ืœื”ืขืžื™ื“ ืกื™ื›ื•ื ื™ื ื‘ื”ืงืฉืจ ื”ื ื›ื•ืŸ, ืœืชืขื“ืฃ ืื•ืชื ื•ืœื”ื‘ื™ืŸ ื›ื™ืฆื“ ื ื›ืกื™ื ื”ืคื•ื ื™ื ืœืื™ื ื˜ืจื ื˜ ืžืชืงืฉืจื™ื ื–ื” ืขื ื–ื” ื•ืžืชืคืชื—ื™ื ืœืื•ืจืš ื–ืžืŸ.

ื–ื•ื›ื” ืœืืžื•ืŸ ืฉืœ ื—ื‘ืจื•ืช ืžื•ื‘ื™ืœื•ืช

ืชืจื—ื™ืฉื™ ืฉื™ืžื•ืฉ ื•ื—ื“ืฉื•ืช

ืขืžื™ื“ื” ื‘ืจื’ื•ืœืฆื™ื•ืช ืชืขืฉื™ื™ืชื™ื•ืช ืžื—ื™ื™ื‘ืช ืœื“ืขืช ืื™ืœื• ื ื›ืกื™ื ืงื™ื™ืžื™ื ื‘ืืจื’ื•ืŸ โ€” ื•ืœื•ื•ื“ื ืฉื”ื ืžืื•ื‘ื˜ื—ื™ื ื›ืจืื•ื™. โ€Censys ืžืกืคืงืช ื ื™ื˜ื•ืจ ืจืฆื™ืฃ ืขื‘ื•ืจ ืžืกื’ืจื•ืช ืชืื™ืžื•ืช ื›ื’ื•ืŸ PCI-DSS, โ€HIPAA ื•-ISO 27001. ื‘ืืžืฆืขื•ืช ื–ื™ื”ื•ื™ ืชืฆื•ืจื•ืช ืฉื’ื•ื™ื•ืช…

ื›ืืฉืจ ืžืชืจื—ืฉื™ื ืื™ืจื•ืขื™ ืื‘ื˜ื—ื”, ื”ื–ืžืŸ ื”ื•ื ื’ื•ืจื ืงืจื™ื˜ื™. ื‘ืืžืฆืขื•ืช Censys Search ื•-Censys Enrich, ืฆื•ื•ืชื™ ืชื’ื•ื‘ื” ื™ื›ื•ืœื™ื ืœืชืฉืืœ ื‘ืื•ืคืŸ ืžื™ื™ื“ื™ ืืช ื›ืœืœ ื”ืื™ื ื˜ืจื ื˜ ื›ื“ื™ ืœื–ื”ื•ืช ืชืฉืชื™ื•ืช ืชื•ืงืคื™ื, ืœื”ืชื—ืงื•ืช ืื—ืจ ืคืขื™ืœื•ืช ื–ื“ื•ื ื™ืช…

ืขื‘ื•ืจ ืืจื’ื•ื ื™ื ื‘ืขืœื™ ืชืฉืชื™ืช ืžื•ืจื›ื‘ืช ื•ืžื‘ื•ื–ืจืช, ื ื›ืกื™ื ืœื ืžื•ื›ืจื™ื ื”ื ื ืงื•ื“ืช ื”ืขื™ื•ื•ืจื•ืŸ ื”ื’ื“ื•ืœื” ื‘ื™ื•ืชืจ. โ€Censys ASM ืžื–ื”ื” ื›ืœ ื”ืชืงืŸ, ื™ื™ืฉื•ื ื•ืฉื™ืจื•ืช ื”ื—ืฉื•ืคื™ื ืœืื™ื ื˜ืจื ื˜ โ€” ื‘ื™ืŸ ืื ื”ื ืžืงื•ืžื™ื™ื (On-Prem), ื‘ืขื ืŸ…