lorem ipsum dolor sit

Lorem ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at enim nisl. Integer iaculis arcu sed quam suscipit vulputate.

Lorem ipsum dolor sit amet

lorem ipsum
Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.

lorem ipsum
Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.

lorem ipsum
Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.

lorem ipsum
Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.

lorem ipsum
Lorem ipsum

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla.

lorem ipsum dolor sit

Lorem Ipsum dolor sit amet

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed at enim nisl. Integer iaculis arcu sed quam suscipit vulputate.

DORA
Requirement

Article 8(4): Identify all information andICT assets and map their configurationand interdependencies.

Article 8(6): Maintain inventories,update them periodically, andwhenever any major changes occur.

What ThingsRecon
delivers

Automated Asset Discovery and SupplyChain Mapping continuously identifydomains, IPs, APIs, certificates, andconnections, including third-party andforgotten infrastructure.

DORA
Requirement

Article 8: Continuously identify allsources of ICT risk.    Article 9: Continuously monitor andcontrol ICT security and functioning. 
  

Article 10:
Have mechanisms topromptly detect anomalous activities.

What ThingsRecon
delivers

Continuous external discovery of both yourown attack surface and your connectedvendors, including shadow IT andunmanaged assets, helps maintain real-timevisibility into exposure to identify anomalies.

DORA
Requirement

Article 28: Maintain a register of allcontractual arrangements with ICTthird-party service providers.

Article 30:
Ensure contractual rightsfor monitoring, auditing, andobtaining information from providers.

What ThingsRecon
delivers

Supply chain discovery gives actionablevisibility into vendor and supplier risk, withDigital Proximity scoring to understand howdeeply each is integrated and what impactthey could have.

DORA
Requirement

Article 18: Classification of ICTrelated incidents and cyber threats.  

Article 24:
A risk-based approach
to conducting digital operationalresilience testing.

What ThingsRecon
delivers

Risk scoring engine with 100+ cyber hygieneindicators, including missing ormisconfigured HTTP headers, weak oroutdated SSL/TLS protocols, insecure forms,to support evidence-based prioritisation andmitigation efforts.

DORA
Requirement

Article 17: Track, log, and classifyICT-related incidents. Identify,document, and address root causesto prevent recurrence. Put in placeearly warning indicators.

What ThingsRecon
delivers

Contextual risk reports and remediation recommendations show which assets,vendors, or misconfigurations are most critical,helping you act before incidents happen.

DORA
Requirement

Article 19: Reporting of major 
ICT-related incidents and voluntarynotification of significant cyber threats.

Article 20: Standardized 
reporting templates.

What ThingsRecon
delivers

Reporting insights that plug into GRC, SIEM,or EASM workflows to streamlinedocumentation, support audits, and board orexecutive reporting.

DORA
Requirement

Articles 28 30: Understand the 
location of service providers and theirsubcontractors.

Article 29: Assess ICT concentration risk.

What ThingsRecon
delivers

Geo located scanning and global points of presence help respect data residency requirements and support compliance with specific sovereignty needs.

Lorem ipsum dolor sit

Lorem ipsum
dolor sit
amet