Platform
Platform
How it Works
Get a quick overview of the platform
Watch a Demo
4-minute recorded demo video
Cyber Asset Attack Surface Management
Gain complete asset visibility to secure your attack surface
Integrations
Find Integrations
Over 180 integrations with leading technologies
Customer Stories
Robinhood
Continuous monitoring across vulnerabilities and assets
Databricks
Gaining greater asset visibility
Auth0
Improving SecOps capability
Indeed
Securely transitioning to AWS
Mercury Financial
Tackling complexity with a single source of truth
View all customer stories
Featured
Databricks case study
How Databricks achieved greater asset visibility with JupiterOne
Solutions
Use Cases
Cloud Security Posture Management +
Secure your entire multi-cloud environment and more
Incident Response
Accelerate incident response with greater context
Vulnerability Management
Simplify vulnerability management with a central view of your cyber assets
Identity and Access Management
Discover and prioritize IAM risks across your cyber assets
Compliance
Stay up to date with asset governance and compliance
Teams
SecOps
Streamline day-to-day Security Operations
SecEng
Improve strategy for Security Engineering
IT
Manage and secure IT assets
DevOps
Continuous compliance for DevOps
Industries
Fintech
Complete asset visibilty for FinTech
SaaS
Cloud-native security for SaaS-based companies
Healthcare
Compliance and data security for Healthcare providers
Pricing
Resources
All Resources
Blog
The latest from our community
Case Studies
Learn how companies are using JupiterOne
Reports
Industry articles and security knowledge
eBooks
Can't-miss content from JupiterOne Press
Datasheets
Industry datasheets
Whitepapers
Research-based documents
Videos
Webinars and presentations
Events
Meet JupiterOne in person at these events
Featured
2023 State of Cyber Assets Report
Data driven look at the state of cyber assets
Company
Company
About
Security as a basic right for all
Contact
Get in touch with us
Careers
Join the JupiterOne team!
Newsroom
News and media coverage
Partners
Become a JupiterOne partner
Press Kit
JupiterOne logos and team photos
New!
JupiterOne named Great Place to Work
Certified Great Place to Work
Community
Community
AskJ1 Community
Find answers and engage with our community
Questions Library
Hundreds of pre-built and categorized questions
Docs
Official product documentation
100X Engineering
Become a 100x Engineer
Cyber Therapy
Let's unpack that
Open Source
Starbase
Check out the GitHub repository
Introduction
Read about our open source project
Featured
Reinventing Cybersecurity
Collection of original stories on cybersecurity
Sign In
|
Get Started
Book a Demo
Glossary of terms
A
Access management
Asset inventory
Attack surface analysis
Attack surface management
C
Cloud asset management
Cloud native cybersecurity
Critical assets
Crown jewels
Cyber asset attack surface management (CAASM)
Cyber asset management
Cyber assets
Cyber attack surface
Cyber hygiene
Cyber risk management
D
Data breach
I
ISO 27001
Identity management
N
NIST
S
SOC 2
Security operations
Security posture
V
Vulnerability management