Build Your CTEM Program

Choose the plan that works best for your team.
See available plans
all-in-one ctem

Full CTEM Solution

Get all of the benefits of a consolidated, all-in-one platform that will help you implement a continuous threat exposure management program. Priced yearly per asset.
REQUEST DEMO

Need only Part of CTEM?
Try These Packages

Attack Surface Mapping

Discovery
  • Continuous New Asset Discover
  • Automated Asset Ownership Validation
  • Passive IP & open port scanning
  • OSINT + Proprietary Intelligence Monitorin
  • Team Collaboration
Also include
Playbooks
  • Trigger-based automation of processes
API
Rest API
  • Integrations with 3rd party applications
Reports
  • CSV exporting
REQUEST DEMO

Continuous Exposure Validation

Asset Management
  • Risk-based Asset Management
  • OSINT + Proprietary Intelligence Monitoring
  • Remediation Recommendations
  • Basic Security Control Validation
  • Team Collaboration
Also include
Playbooks
  • Trigger-based automation of processes
API
Rest API
  • Integrations with 3rd party applications
Reports
  • CSV exporting
  • Executive overview reports
  • Detailed finding reports
REQUEST DEMO

Continuous Automated Red Teaming

Vectors
  • Validated Vulnerabilities with PoC
  • Context-based Prioritization
  • Vector Timeline & Tracking
  • Advanced Security Control Validation
  • Team Collaboration
Also include
Playbooks
  • Trigger-based automation of processes
API
Rest API
  • Integrations with 3rd party applications
Reports
  • CSV exporting
  • Executive overview reports
  • Detailed finding reports
REQUEST DEMO

Plans Details

Max assets
How many assets can be configured
Continuous Discovery
Discover related domains, subdomains, hosts, and other internet-facing assets. Monitor and continuously map your attack surface.
Continuous
One-time
-
Continuous
Asset Management
Manage your assets using tags, timelines, ownership information, recommended remediations and remediation status tracking
-
Vectors
Find prioritized and automatically validated vulnerabilities, weaknesses and misconfigurations
-
-
Security Control Validation
Utilizing defense evasion methodologies to test your security control configurations.
-
Basic
Vector Proof of Concept
Every vector comes with a reproducible Proof of Concept
-
-
Technology Scanning
Assets are scanned for outdated technologies and services running on assets
Threat-based Patch Management
Prioritize required patches that actually pose a threat.
-
Timeline & Collaboration
Track vectors/assets over time as their status change. Comment & tag on timeline events with other team members.
Weakness Scan Frequency
Regardless of packages, all assets are scanned for weaknesses that are automatically validated. The difference is the scan's depth and request amount.
2 /week
2 /week
3 /week
Continuous
VITA AI Assistant
Regardless of packages, all assets are scanned for weaknesses that are automatically validated. The difference is the scan's depth and request amount.
-
-
-
Dashboard
Dashboard to overview all of your data in one place
Reports & Exportables
Generate executive reports, summarizing and detailed PDF reports. Export information and data as CSV
Playbooks
Automate and create workflows based on new findings, events and data available in the platform. Integrate and push data automatically by custom-set conditions.
API
API
Query all information available in your plan using a RestAPI.
Technical Support
Technical support for general usage questions and guidance
Researcher & Analyst Support
Consult with ULTRA RED's researchers and analysts directly
-
-
-