Scope
Manual, inferred and confirmed scope for groups, holdings, brands, domains and targets. Ownership comes with the evidence behind it.
Exposure intelligence
Finds a company's external surface, shows what belongs to it and why, and separates real risk from noise.
Exposure Debt
18.4
-12% MoM
Signals
247
18 strong
Group scope
36
confirmed
Open cases
7
2 at risk
Top material risk
Signal sources
4 filas
Operational Signal Feed
MRS
Material risk with proof
Grupo
Group and holding expansion
Casos
A signal becomes a case
The product
RAIDSEC brings CTEM, ASM/EASM and CTI into one workspace per client. What ties it together is the chain signal → scope → proof → score → action, on the same screen.
Manual, inferred and confirmed scope for groups, holdings, brands, domains and targets. Ownership comes with the evidence behind it.
Observed signals, hunt pivots and analyst-declared threats, split into four work queues.
MRS, Exposure Debt, proof level, ownership and priority on one screen.
A signal becomes a target, watchlist, threat or case, and that flows straight into the rest of the operation.
Who it's for
Each role uses RAIDSEC differently, but it all comes from the same place: ownership, proof, priority and action.
How it works
The adoption flow is designed to produce results in the first week, without a long rollout project.
You enter the company name. The engine suggests primary domain, brands, holding and related targets. You confirm or adjust them in Scope Manager.
DNS, Certificate Transparency, WHOIS/RDAP and web fingerprint run on a schedule. A change in the surface comes in as a signal.
The analyst reads the signals, hunt pivots and declared threats, and promotes each one to target, watchlist, threat or case.
Leadership follows the scorecard with freshness and trend. Report Studio generates the executive report and exports it as HTML.
Screens
Below, the real screens: workspace, Signal Feed, Scope Manager, scorecard and Report Studio.
Operational workspace
Avg MRS
31.8
Freshness
OK
Cases
3
Risk by severity
Top risks
Signal Feed in four queues
Observed
strongGitHub code hit with tenant domain
Hunt pivot
pivotQuery prepared for monitoring
Manual
inputThreat declared by the analyst
Tracking
monitoringActive watchlist from the signal
Group and holding, with reason
Manual
12
Inferred
24
Confirmed
8
Same corporate root
high confidenceGenerates new signals, watchlists and queries from the relation.
Parallel domain with a CT signal
medium confidenceGenerates new signals, watchlists and queries from the relation.
Accepted related brand
medium confidenceGenerates new signals, watchlists and queries from the relation.
Executive report
Executive summary
The report covers scope, ownership, evidence, score and recommendations without becoming a technical dump.
Template
Board
Export
HTML
How we think about it
Five questions an exposure program has to answer. RAIDSEC answers all five in one workspace, with the proof next to it.
What belongs to the client
Domains, subdomains, brands, holding and parallel assets, discovered automatically.
Why it belongs
Each asset carries its evidence: same corporate root, CT signal, confirmed related brand.
What actually matters
MRS and Exposure Debt separate material risk from noise, based on proof.
What changed on the surface
Near real-time signals: a new subdomain, an issued certificate, exposed code.
What to do now
Promote the signal to target, watchlist, threat or case, with an SLA and an owner.
The signal already comes with the next step: target, watchlist, threat or case. Less loose searching.
Scorecard, trend, material risk and the executive report in one place.
Explainable ownership and group expansion are harder to copy than a dashboard.
Security and privacy
In pre-launch, with continuous security review. The points below have been there since the project started.
Every query scoped by tenant_id. One client's data never crosses into another's session.
TLS in transit; encryption at rest for the database and backups.
Role-based permissions, with operate, read and administer kept separate.
Sensitive actions logged with actor, scope, time and context.
Defined Data Protection Officer, defined legal basis, retention and deletion on demand.
Discovery from public sources (OSINT). We don't scan assets without authorization.
Questions
No. It's in pre-launch, with early access for the first partners. The product already runs and is useful day to day, but the roadmap is still open.
External discovery via DNS, Certificate Transparency, WHOIS/RDAP, web fingerprint and OSINT. No internal client access to get started.
No. The engine suggests parallel domains, brands and related assets, always showing why. The analyst accepts or rejects each one.
Multi-tenant isolated by tenant_id, defined Data Protection Officer, configurable retention and deletion on demand. The detail is in the Privacy Policy.
Yes. There's a guided demo for the first early-access partners. Ask at contato@raidsec.com.br.
Today there's an external ticket link per case. Native integration with Jira, Linear, Slack and SIEM is on the near roadmap.
Brazilian Portuguese and English, with dark mode in both.
During pre-launch, controlled infrastructure in a Brazilian environment. Dedicated and on-premises deployment are on the roadmap for those who need it.
Next step
Pre-launch, with limited early-access spots.