Actively managed by company

At Informer, we take a proactive approach to help organizations protect themselves from cyber threats by giving them a real-time view of their attack surface and live actionable vulnerability insights. Our attack surface management platform offers the unique benefits of combining live asset discovery, vulnerability scanning, and expert penetration testing in one platform to centralize vulnerability detection and remediation. Our experienced and highly skilled penetration testers, developers, and researchers collaborate extensively to offer business-critical security insights that empower you to fortify and scale your security program.

Quick overview

Brighton, United Kingdom

Founded in 2014

11-50 Employees

Additional information

Working industry

IT, Software and Services, Cyber Security, Finance and Insurance

Type of company

Service provider


1 Headquarter

Number of services

1 Service

Specialised areas

Vulnerability Scanning, Penetration Testing, Attack Surface Management, Cybersecurity, Information Security, Web Application Scanner

Products & services of offers a wide range of products and services

Product: Attack Surface Management Platform


Attack Surface Management Platform

Go to product >

Use Cases of

Get insights into the use cases of

UseCase: Attack Surface Reduction

Use case

Attack Surface Reduction

Financial Services, Software, Insurance, Retail

Attack surface reduction is crucial for modern organizations to minimize the risk of cyber attacks, protect sensitive data, and maintain a strong cybersecurity posture. Attack surface reduction involves identifying and reducing vulnerabilities and weaknesses that attackers can exploit to gain unauthorized access.

UseCase: Asset Discovery and Inventory

Use case

Asset Discovery and Inventory

Financial Services, Insurance, Software, Banking, Retail

Today’s external attack surfaces change constantly. New internet-facing assets regularly emerge and organizations struggle to keep up. Automated and continuous asset discovery and inventory equips IT and security teams with improved asset visibility helping avoid gaps with an up-to-date and accurate digital asset inventory.

Headquarter of operates in 1 country around the world

City: Brighton

State: England

Country: United Kingdom

Locations of

Get an overview of the locations of






United Kingdom



Frequently asked questions (FAQ) about

Some frequent questions that have been asked about

The company headquarter of is located in Brighton, England, United Kingdom. It's worth noting, that the company may have more locations

As of the latest available information has around 11-50 employees worldwide. was founded in 2014

The company has it's main focus in the industries of IT, Software and Services, Cyber Security, Finance and Insurance

Competitors of

Check out some interesting alternative companies to

Deteact's Logo


Moscow, Russia

1-10 Employees


We provide application security assessment, infrastructure penetration testing, security audit and consulting services. We provide Infrastructure Penetration Testing, Red Teaming, Application Security Assessment, and Vulnerability Management services. We develop an Application Security Orchestration Platform and provide DevSecOps and Secure SDLC implementation services. We are a growing team of researchers, not salesmen.

InPath Security's Logo

InPath Security

Chicago, United States

11-50 Employees


Our mission is to remove the incentives for malicious actors to attack your systems through continual business IT testing, analysis, and improvements combined with employee training and security engagement. We provide measurable results for virtually any industry. However, we are particularly focused on and have optimized our solutions for the following industries:. Your network is the backbone of your company’s technology infrastructure. It’s both the platform on which internal systems operate and your gateway to the outside world. InPath Security offer an array of IT Security services that you can use in combination, or pick and choose to achieve an ideal fit for your business needs. Also known as a Pen Test, Penetration Testing is a simulated cyber attack against your computer systems to identify vulnerabilities that may be exploited from the outside. We offer proven network design and implementation improvement services that drive results.'s Logo


- Employees

- is our go-to tool when dealing with compliance issues and security investigations related to the external infrastructure. Risk analysis in prevented multiple security incidents for our clients. We discovered multiple assets we weren't aware of — a fast, powerful engine did the discovery for us. Monitor every element in the external infrastructure to quickly resolve threats and consistently deliver exceptional security. Gathered data is analyzed using Artificial Intelligence models to provide most value to the customer.

Exploit Pack's Logo

Exploit Pack

Maastricht, Netherlands

11-50 Employees


Our team of highly skilled penetration testers, developers and cyber security experts is dedicated to staying up-to-date with the latest trends and techniques, to ensure that our software solutions and Penetration tests are always at the forefront of cybersecurity innovation. Secure your network, speed up software delivery and prevent cyber attacks.

Detectify's Logo


Stockholm, Sweden

11-50 Employees


Detectify's repository of unique vulnerabilities is continuously growing thanks to Crowdsource - researchers have submitted over 1,765 modules, 300+ 0-days were received in 2020-21, and nearly 240,000 vulnerabilities have been found in customer assets. This interactive report offers insights from Detectify's customer base, including 2023's top vulnerabilities, industry and regional breakdowns, and what this tells us about attack surfaces this year. Find and remediate business-critical vulnerabilities in custom-built apps with advanced crawling and fuzzing. Render and crawl a custom-built application for in-depth findings. Surface Monitoring gives a comprehensive view of your attack surface, while Application Scanning provides deeper insights into custom-built applications. We recommend combining both products for the most comprehensive attack surface coverage. For organizations with large amounts of domains and subdomains, we offer a flexible, scalable, and customized offering. New security tests are added daily, with submission to implementation in as fast as 15 minutes.

Pen Test Service's Logo

Pen Test Service

Bedford, United Kingdom

1-10 Employees


Find out how attackers can exploit your vulnerabilities and get advice on how to stop them. The best way to stop attackers is to think like them. We are the good people who know about bad things. We have experience working for multi-nationals and small businesses on a variety of pentest engagements. An exploited vulnerability can cost you the earth. Working with us helps you minimise the risk of that ever happening. Order a pen test report to uncover your own vulnerabilities. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Copyright © 2022 Penetration Testing Services - All Rights Reserved.

Suitable topics for

Topics which have been searched by others and may be interesting for you: