Recon Wave

Hello World

🚀 We're launching an Attack Surface Management Platform with a mission to make your infrastructure safer.

Recon Wave Logo

Recon Wave is an external Attack Surface Monitoring (EASM) platform that provides comprehensive visibility into an organization's attack surface. This includes all the points where an attacker could potentially enter or interact with the network, applications, or systems, including external entry points like firewalls and web applications, as well as internal components such as databases, employee devices, and third-party integrations.

We see your company the way hackers see it and monitor all your blind spots with an automatic assets discovery paired with advanced vulnerability scanning. We solve the fundamental problem of “what to protect”. We let you know, when there is a vulnerable application in your network.

Proudly built in Prague

Recon Wave is based in Prague, Czechia 🇨🇿, and is built by a team of security experts with a passion for making the internet a safer place. We are dedicated to providing organizations with the tools they need to protect themselves from cyber attacks.

Recon Wave was founded by a team of cybersecurity experts from Czech Technical University in Prague. Our team has a diverse and unique background, which makes us well-equipped to understand and tackle a wide range of cybersecurity challenges.

Recon Wave was founded by Martin Repa and Lukas Forst. Lukas and Martin have known each other since 2016 and are closely working together since 2021, starting with joint research at the university, then working in CDN77 where they were colleagues and lastly teaching the same cyber security course at the Czech Technical University.

Manage your security posture

Recon Wave is a comprehensive platform that provides a wide range of features to help organizations secure their attack surface. Some of the key features of Recon Wave include.

  • Assets Discovery. Recon Wave discovers all your online assets automatically and instantly. No need to configure anything.
  • Vulnerability Scanning. Identify and mitigate security weaknesses using our vulnerability scanning before attackers can exploit them.
  • Simplify Compliance. Take proactive steps to meet your compliance requirements of NIS2.
  • Risk Scoring. Assigned a risk level to each identified asset and vulnerability, enabling you to prioritize your security efforts efficiently.
  • Continuous Monitoring. Keep a vigilant eye on your infrastructure 24/7. Is there a new domain created or did any of your DNS record change? We let you know.
  • Advanced Reporting. Find real-time alerts enhanced with AI and mitigation steps in our platform or using one of many 3rd party integrations.

Ready to be more secure?