EASM & Automated Pentesting

Continuously protect what you expose on the Internet

Map, detect, and remediate your external vulnerabilities before they are exploited.

  • 250k+
    sites and applications protected
  • 1.4M+
    assets continuously monitored

  • faster vulnerability remediation

More than 100 companies trust us

  • heetch
  • heetch
  • heetch
  • heetch
  • heetch
  • heetch

OUR SOLUTIONS

An offensive approach to managing your external attack surface

Advanced External Attack Surface Management

  • Dynamic mapping of your exposed assets

  • Shadow IT detection

  • Continuous monitoring of risks and misconfigurations

  • Alerts on actively exploited vulnerabilities

Discover our EASM solution

Automated Pentest with Human Validation

  • Continuous black box penetration testing

  • Vulnerabilities validated by our expert pentesters, zero false positives

  • Prioritization based on real exploitability

  • Actionable remediation plans and automatic retests

Discover our pentest solution

The Patrowl Method

From exposure to remediation continuously.

  • 1-Discover

    Map your entire internet-facing attack surface.

    • Discover exposed assets automatically: domains, subdomains, IPs, Shadow IT

    • Monitor counterfeiting attempts, data leaks and perimeter changes

    • Score each discovered asset with an ownership rating

    • Centralize multi-entity visibility: each subsidiary has its own perimeter, consolidated at group level

  • 2-Detect

    Detect the vulnerabilities that are truly exploitable on your assets.

    • Identify known vulnerabilities (CVE) and unknown ones (OWASP) continuously

    • Enrich findings through Threat Intelligence (CTI) and actively exploited threats

    • Qualify every vulnerability with our expert team

    • Prioritize based on technical severity, real exploitability and business impact

  • 3-Remediate

    Fix what matters most, at the right time.

    • Access Indicators of Compromise (IoC) included for each vulnerability

    • Receive a prioritized, contextualized and detailed remediation plan

    • Track fix status directly from the dashboard

    • Integrate natively into your daily tools (Jira, ServiceNow, GLPI…)

  • 4-Monitor

    Verify every fix and maintain optimal protection over time.

    • Retest automatically after each fix

    • Detect new vulnerabilities on your assets continuously

    • Configure custom controls and automated monitoring on an ongoing basis

    • Report with a complete remediation history for your audits and COMEX reporting

Our Technology & Expertise

Automation combined with human expertise

At Patrowl, we believe no machine can replace the judgment of an expert but that experts should focus on what machines cannot do.

  • Scalable automated pentest engine: our engine developed since 2018 continuously orchestrates the best pentesting tools. Every public exploit is analyzed, sanitized and lab-tested before any deployment on your assets.

  • Continuous threat monitoring and innovation: our experts continuously enrich our technology through CTI, CERT alerts and internal bug bounty sessions.

  • Continuous improvement: every validated offensive technique is integrated and automatically redeployed across all our engines.

  • Roadmap aligned with your needs: product evolution is guided by the permanent needs of security teams, in close collaboration with our clients through dedicated quarterly and annual advisory committees.

A platform built for every team

CISO

"I need to prove I'm managing risk, not just describing it."

  • Continuously mapped attack surface

  • Critical vulnerabilities surfaced as a priority

  • Board-ready reports at your fingertips

CIO

"My infrastructure is growing fast. I no longer know what's truly exposed."

  • Full visibility over every exposed asset, including Shadow IT

  • Clear security KPIs to steer and make decisions

  • Exposure reports available at any time

SecOps

"I'm drowning in alerts. I don't know what to deal with first."

  • Zero false positives, every vulnerability is qualified by our experts

  • Prioritization based on real criticality and exploitability

  • Remediation tickets ready to integrate into your ITSM

Compliance / Risk

"The audit is coming. I need to demonstrate our external security posture."

  • Audit-ready reports for NIS2, DORA, ISO 27001, Cyberscore....

  • Full remediation traceability

  • Compliance evidence with no manual effort

Trusted, certified and award-winning.

  • Awards & recognition: Innovation Award, Assises de la Cybersécurité 2022 & 2023 · Grand Prix Startup, FIC 2025 · Wavestone Radar

  • Expert certifications: OSCP · OSWE · OSWP · OSCE · PNPT · GPEN / SANS 560 · GXPN / SANS 660 · ISO 27001 Lead Auditor · EBIOS Risk Manager · PASSI (ANSSI qualification)

  • Methodological frameworks: OWASP · PTES · OSSTMM

  • Regulatory compliance: NIS2 · DORA · Cyber Essentials (UK) · GDPR · MonAideCyber · Programme CaRE · ISO 27001 · SOC 2

  • Data security: Secure European hosting · Data never shared with third parties · Fully isolated per-client environment

  • Platform security: Audited annually by an independent provider · CyberVadis score 824/1000 in 2025, above the average benchmark of 654 · Documentation available on request under NDA

  • Open & documented API: Full REST API to connect Patrowl to your existing stack · Available connectors: Splunk · Hackuity · Nucleus · TheHive · and on request

Our Partners

Testimonials

They took back control of their attack surface.

  • “Our Blue Team was immediately alerted. Notification received at 3:57 PM, alert triggered at 4:36 PM. Thank you for the quality of your active monitoring.”

    Brest Métropole
  • “Instead of dedicating our team's precious time to ad hoc tests, we now continuously receive verified, high-quality results that our engineers can act on immediately.”

    Xplor
  • “Patrowl delivers highly relevant results. The automated monitoring is genuinely appreciated by our teams.<br>”

    Colas
  • “Enhanced security, integrated without friction into our existing workflows. Deployed in 2 days across all our public assets.”

    Heetch
  • “Continuous pentesting is an innovative solution perfectly aligned with the extreme scalability of today's enterprise IT.”

    MGEN

FAQ

What is the difference between Patrowl and a vulnerability scanner?

A scanner detects known vulnerabilities on a perimeter you have declared. Patrowl continuously discovers, tests and prioritizes everything you expose on the Internet including what you didn't know you were exposing.

Criteria Vulnerability Scanner Patrowl
Coverage Known CVEs on declared perimeter CVE, OWASP, misconfigurations, data leaks, Shadow IT
Discovery Manual perimeter declaration required Automatic and continuous mapping of everything you expose
Control Internal expertise required, heavy configuration Zero configuration, fully automated
Results Hundreds of pages, unqualified, full of false positives Alerts only on confirmed, exploitable, prioritized vulnerabilities
Remediation Generic Detailed, contextualized, with command examples accessible to non-experts

How do you ensure zero false positives?

All vulnerabilities reported by Patrowl are automatically pre-qualified by several criteria including:

  • The technical severity of the vulnerability: CVSSv3

  • The criticality of the asset

  • The exposure level of the asset

  • The origin of the vulnerability

The vulnerabilities are then validated by an offensive operator.

How is discovery done?

You declare technical information (IP addresses and domain names) and/or general information (company name, subsidiary, brand, product name, etc.) and then Patrowl automatically takes care of the rediscovery.

Patrowl pivots on different repositories or techniques such as Whois, subdomains, Certificate Transparency, Subject Alternative Name, Wikipedia, RIPE, etc.

How long does it take to get up and running?

  • Up and running in 30 minutes

  • First attack surface map available within 24 hours

  • No agent to install, no infrastructure changes required

  • Onboarding support included at every step

Will Patrowl disrupt our infrastructure?

No. Patrowl does not perform any load testing, DoS or DDoS:

  • Requests are kept to a strict minimum

  • Bandwidth is controlled and adjustable to your constraints

  • No destructive testing, neither in passive nor active mode

  • Pentests are conducted from dedicated IP addresses, known and shared with your teams

  • Scans can be restricted to specific time windows if needed

Is Patrowl suited for large multi-entity organizations?

  • Consolidated group view for security leadership

  • Hierarchical sub-organizations by subsidiary, business unit or region

  • Complete data isolation between entities

  • Full RBAC: operator, standard user, auditor

  • Progressive onboarding: new entities and acquisitions integrated quickly

DEMO

15 minutes to discover what you're really exposing on the Internet.