ThingsRecon obtains Cybersecurity Made in Europe label. Read CEO’s view.

See which suppliers put you at risk. Request free proximity scan.

solutions

Attack Surface
Discovery

Uncover exposed assets across your digital footprint. Enrich findings with business, financial, and geopolitical context to prioritize the risks.

Supply Chain
Intelligence

Understand how vendors connect to your digital ecosystem. Continuously monitor supplier exposure and focus on the risks closest to your core systems.

Network Node Connection Integration Streamline Icon: https://streamlinehq.com

Integrations

Connect exposure intelligence across your stack.

Featured content

blog

A Security Leader's Guide to Digital Proximity & Prioritization

blog

Why Digital Connectivity Is Key to External Attack Surface Management
about uspartnerspricing
resources
Blog

Fresh insights and real-world lessons
on the things that matters.

Podcast

Explainers, demos, and bite-sized takes
on cyber risk straight from our team.

Visit Resource Center
Datasheets

Clear breakdowns of our capabilities
and use cases.

Use Cases

Real outcomes in security,
from compliance to exposure.

Visit Resource Center

Featured content

blog

10 Metrics to Track Exposure & Supply-Chain Risk

press release

Study: Enterprises Face Over 800,000 High-Severity Issues
start recon
start recon

Resource Center

The things you need for a better recon. Explore fresh perspectives and practical lessons on attack surface discovery, third-party risk, and the things most teams overlook.

Blog

Compliance & Regulations

EU Cybersecurity Package 2026: What Supply Chain Security Compliance Requires

Compliance & Regulations

NIS2 and Supply Chain Security: What Actual Compliance Looks Like

Compliance & Regulations

How does Digital Proximity map to NIS2 asset identification?

more blogs

Datasheets

Datasheet

How ThingsRecon Capabilities Support DORA Compliance 

Datasheet

Supply Chain Intelligence

Datasheet

Attack Surface Deep Discovery

more datasheets

Videos

Video

800,000 Vulnerabilities Later: What Security Teams Still Miss About Risk

Video

All Things Cyber: Building The Security Tool We Wished We Had

Video

What Powers Our Recon (And Why It Works)

more videos

Cookie Settings

You can read more about how we use cookies here.

Necessary (Always Active)

These items required to enable basic website functionality

Marketing

Cookies used to deliver advertising that is more relevant to you and your interests.

Some content, like embedded videos, may not display unless marketing cookies are enabled.

Analytics

These items help the website operator understand how its website performs, how visitors interact with the site, and whether there may be technical issues.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
save settingscancel
cookie icon

This website uses cookies.

We use cookies to improve how our site works, understand traffic, personalise content, and support social sharing. Some partners may combine this data with other info you’ve given them or they’ve collected from your use of their services. Learn more in our Cookie Policy and Privacy Policy.

Some content, like embedded videos, may not display unless marketing cookies are enabled.

manage settings
accept alldecline all

We're just
a message away

get in touch
contact us
about us
Platform
attack surface discovery
supply chain intelligence
integrations
Learning
blog
podcast
academy
Cibersecurity Made In Europe Badge

©ThingsRecon 2025.

Amsterdam, The Netherlands

Privacy Policy

Cookie Policy

Terms of Use

Contact us