ensun logo
Locations
Company type
Result types
Industries
Employees
Founding year
ZeroThreat Logo

ZeroThreat

Actively managed by company

ZeroThreat, the world's most intelligent web applications and API security scan platform, delivers 5x faster vulnerability detection by avoiding the pitfalls of 90% manual pentest work. ZeroThreat helps you efficiently scale your application security testing with seamless integration into SDLC. With no configuration required, ZeroThreat scans all types of web apps, including SPAs and JavaScript-heavy ones, to minimize external attacks and false positives. Get access to the most intelligent DAST tool – ZeroThreat, to comprehensively address OWASP Top 10, CWE Top 25, and beyond, securing your applications with unprecedented speed and accuracy.

Quick overview

Wilmington, United States

Founded in 2024

11-50 Employees

Startup

Additional information

Working industry

Cyber Security

Type of company

Service provider

Locations

1 Headquarter

Number of products

1 Product

Specialised areas

Web Application Security Testing, Vulnerability Assessment, Vulnerability Scanner

Products & services of ZeroThreat

ZeroThreat offers a wide range of products and services

Product: Web Application Security Testing Tool

Product

Web Application Security Testing Tool

Go to product >

ESG score estimation

An estimation about the ESG values based on digital data and signals. Important: The ESG scores are only based on information about the country, not the actual company itself

Country:

United States


Overall risk estimation:

Low


ESG country scores

The ESG Data of countries are based on public sources

Environment

D

Grade (A-E)

View details

Social

A

Grade (A-E)

View details

Governance

A

Grade (A-E)

View details

Use Cases of ZeroThreat

Get insights into the use cases of ZeroThreat

UseCase: Cloud-based Web Application Scanner

Use case

Cloud-based Web Application Scanner

Technology & SaaS

ZeroThreat is a smart, cloud-based web application security testing tool that automates the process of identifying vulnerabilities. It thoroughly scans your web apps end-to-end, detecting potential risks and ensuring comprehensive protection, all while enhancing security and efficiency in your development lifecycle.

Headquarter of ZeroThreat

ZeroThreat operates in 1 country around the world

City: Wilmington

State: Delaware

Country: United States

Locations of ZeroThreat

Get an overview of the locations of ZeroThreat

Location

Country

State

City

Headquarter

United States

Delaware

Wilmington

Frequently asked questions (FAQ) about ZeroThreat

Some frequent questions that have been asked about ZeroThreat

The company headquarter of ZeroThreat is located in Wilmington, Delaware, United States. It's worth noting, that the company may have more locations

As of the latest available information ZeroThreat has around 11-50 employees worldwide.

ZeroThreat was founded in 2024

The company ZeroThreat has it's main focus in the industries of Cyber Security

Based on the founding year and the amount of employees the company ZeroThreat seems to be a Startup at the current state. Note that over time that status can change

Competitors of ZeroThreat

Check out some interesting alternative companies to ZeroThreat

rThreat Inc.'s Logo

rThreat Inc.

Bellingham, United States

11-50 Employees

2020

THE ONLY BREACH AND ATTACK SOLUTION THAT CONDUCTS ZERO-DAY RESEARCH TO HELP PREVENT CYBER ATTACKS. VALIDATE TECHNOLOGY, PROCESSES AND PROFESSIONALS WITH TTPs USED BY ADVANCED ADVERSARIES. rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks. Enable your team to discover and resolve gaps in security using breach and attack emulation before threat actors strike. Use breach and attack emulation to challenge new and deployed tools, business continuity, and test your team to optimize ROI.

Horizon3.ai's Logo

Horizon3.ai

San Francisco, United States

51-100 Employees

2019

OSCP Experts Equipped with the Speed and Scale of NodeZero. NodeZero is easy-to-use, safe for production, and scales to support your largest networks. How Airiam Cut Vulnerabilities in Half Airiam is a pioneering managed resilience provider on a mission to ensure its customers minimize cyber risk and maximize business productivity. How an MSSP Turned NodeZero into a High-Demand Service Offering Canada’s leading managed security service provider, F12.net delivers reliable and efficient technology solutions to a range of small and medium sized enterprises across Canada. With intelligence from a world-class attack team, NodeZero provides exploits for zero day and n-day vulnerabilities as they emerge, allowing your organization to test whether you are impacted and proactively secure against them. The platform provides real-time insights and reports with weaknesses and impacts prioritized for you, enabling your security team to take immediate action. NodeZero can conduct unlimited tests round the clock, with faster delivery, broader coverage, higher accuracy and better value for money. The automation and integration provided by NodeZero reduces the need for additional specialized personnel, resulting in substantial savings and better effectiveness given the skills shortage.

Rumble Network Discovery's Logo

Rumble Network Discovery

Austin, United States

11-50 Employees

2018

The runZero Platform provides complete security visibility across IT, OT, IoT, cloud, mobile, and remote assets so that you can see and secure everything on your network. The new runZero Platform introduces novel passive discovery perfect for OT & ICS environments. See what's happening at runZero and read up on the latest ideas, opinions, and articles from our experts and researchers. See how runZero has empowered security teams to take control of their networks, uncover their unknowns, and save significant time and money. Read reviews of the runZero Platform and see how teams have improved their security with our technology. Carahsoft and runZero have joined forces to provide Public Sector customers the solutions they need to secure dynamic attack surfaces. HD founded runZero to solve this problem and lay the foundation for the next generation of exposure management. The runZero Platform is launched, making it the only cyber asset attack surface management solution (CAASM) that unifies proprietary active scanning, native passive discovery, and API integrations to provide customers with the most complete, in-depth security visibility possible, empowering them to mitigate exposures quickly and reduce compliance risk.

Purplemet - Web Application Security Monitoring's Logo

Purplemet - Web Application Security Monitoring

Paris, France

1-10 Employees

2019

Continuously detect and track web application technology changes with real-time alerts on new vulnerabilities, new technologies, new versions, and revised ratings. No more blind spots on exposed web application components thanks to a continuous technology knowledge update. Dynamically build smart security classification to help you in selecting web applications that require deeper security consideration and assessment. Automated and real time updated security assessment priority to cover continuously moving threats and technologies. Analyze your web applications in seconds to detect hidden, layered and embedded technical components with versions.

NovaSec's Logo

NovaSec

Tel-Aviv, Israel

1-10 Employees

2018

We are a small group of security researchers who have mastered the way of modern web application penetration testing.With years of experience, and continuous learning, we strive to conduct one of the best web application pentests available.Most of us are also part-time bug bounty hunters.It allows us to keep continuously competing with other hackers from all around the world, and gives us the possibility to discover, and strengthen our weak spots, as there is always room for improvement.Automation plays a huge role in cyber security, as well as in web application penetration testing.Thanks to our years of experience in the field, we were able to develop advanced in-house tools that are capable of pulling bugs from any where at any time.They are not only capable of finding surface-layer vulnerabilities but also deeply hidden context-based security issues that previously required an immense amount of time, and experience to discover. We want to pursue this mission by developing highly advanced security vulnerability scanners that are not only blazing fast but also extremely reliable for any web application or API. We set precise goals that align with our mission. Built By The Same Penetration Testers That Helped Secure. Built-In Vulnerability Management Solution + Atlassian JIRA & GitHub Issues Integrated. Vulnerability scanning is a process where an automated program is looking for vulnerabilities and security misconfigurations in your web application or network.Usually, vulnerability scanners execute a predefined workflow to identify any exploitable vulnerability type.Once a vulnerability scanner has found and verified a valid security flaw, it creates an alert and reports the finding accordingly. However, the payload will unlikely work as the browser won't render the response as HTML.We solve this issue by validating every vulnerability found before notifying you (so you don't have to get excited and later realize that it was for nothing). Throughout our years of experience as web app penetration testers and bug bounty huntersWe sometimes used third-party vulnerability scanners to automate some of our workflows, and it didn't work out well for us.We had times when we found vulnerabilities while some vulnerability scanners just couldn't, even after pointing out where to scan.This never allowed us to put our trust in vulnerability scanners.

IT Threat Solutions's Logo

IT Threat Solutions

Fremont, United States

1-10 Employees

-

Is Your Organization At Risk Of Being Hacked. IT Threat Solutions is a Veteran Owned Cybersecurity Firm providing Vulnerability Assessments, Penetration Testing and Red Team exercises. Assessing your organizations network perimeter and online presence. Comprehensive assessment utilizing all tools and techniques to gain unauthorized access. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.