Find every internet-facing asset. Including the ones you didn't know about.
Most security teams know about 60-80% of their organization's internet-facing assets. The other 20-40% is what attackers find. Smart Asset Discovery closes that gap by indexing the internet's data layer and finding everything tied to your organization, including the assets your inventory missed.
Discover every asset associated with your organization.
Asset discovery starts from a seed (typically your primary corporate domain) and expands outward through every relationship the internet's data layer reveals. Subdomains discovered via passive DNS, certificate transparency logs, and web crawling. IP addresses surfaced via reverse-IP lookups. Subsidiary domains found via reverse-WHOIS on registration emails.
Discovered candidates don't get monitored automatically. They land in a discovery queue where your team approves, ignores, or sets them aside. Approved assets enter the monitored inventory; ignored ones stay out, with a documented decision. The discovery engine runs continuously, surfacing new candidates as they appear on the internet.
Three discovery techniques, working together.
The discovery engine runs three techniques in parallel. They share results, deduplicate candidates, and feed the same approval queue.
Forward enumeration.
Subdomain discovery via passive DNS records, certificate transparency logs, web crawling, and search-engine indexing. Most discoverable subdomains surface within hours of being seeded into the platform.
Reverse enumeration.
Reverse-IP, reverse-MX, reverse-NS, and reverse-WHOIS lookups against Deepinfo's internet-scale dataset. If your organization owns one IP and that IP hosts other domains, those other domains surface. If subsidiaries register domains under shared infrastructure, the relationship gets discovered.
Smart discovery rules.
Built-in rules that capture common patterns: variations of your brand, country-specific TLD variants, common subsidiary naming patterns, M&A-acquired domain inheritance. Rules are continuously refined based on discoveries that recur across customer environments.
The asset categories your inventory typically misses.
Subsidiary infrastructure
Domains and assets owned by group companies, regional subsidiaries, and recently-acquired entities.
Shadow IT
Marketing campaign domains, sandbox environments, abandoned development infrastructure that's still resolvable.
Post-acquisition assets
Inherited infrastructure from M&A activity that hasn't been integrated into the central inventory yet.
Partner-hosted environments
Customer-facing or backend infrastructure operated by partners on behalf of your organization.
Forgotten subdomains
Subdomains spun up for short-term projects or events that were never decommissioned.
Pre-production assets
Staging, development, and test environments accidentally exposed to the public internet.
Discovery feeds the rest of the EASM workflow.
Smart Asset Discovery is the entry point to External Attack Surface Management. Every approved asset enters the monitored inventory and gets scanned continuously across seven data layers (Continuous Scanning), classified for risk (Comprehensive Risk Detection), enriched with remediation guidance (Remediation with Actionable Insights), and scored on the unified risk scale (Complete Risk Scoring). One workflow, five capabilities, all built on the discovery foundation.
“We've been running an ASM program for years. Smart Asset Discovery surfaced subdomains and acquired-company assets we'd never inventoried, mostly from M&A history nobody on the security team had visibility into.”
Explore the full platform.
See your entire attack surface. Act on what matters.
Continuous discovery and monitoring of every internet-facing asset, including subsidiaries and acquired companies.
See module CTI · CYBER THREAT INTELLIGENCESee what’s exposed. Act before it’s exploited.
Dark-web monitoring, breach corpora, infostealer logs, and threat-actor activity tied to your organization.
See module BRP · BRAND RISK PROTECTIONKeep an eye on the internet. Protect your brand.
Lookalike domains, fake apps, fraudulent listings, and brand abuse caught in hours, not weeks.
See module TPRM · THIRD-PARTY RISK MANAGEMENTEvery third party carries risk. See all of it.
Continuous external monitoring of every approved vendor with the same depth as your own surface.
See module DSI · DEEP SEARCH AND INSIGHTSExplore the entire internet. See every layer.
400M domains, 2B subdomains, 200B DNS records, 30B SSL certificates. All queryable directly.
See moduleSee what's on your attack surface that you didn't know about.
Run Deepinfo against your domain. The free threat exposure report includes a full discovery pass; the EASM module monitors the surface continuously after.