Skip to main content

runZero

runZero - Overview

Assets Asset Discovery

runZero is a modern Cyber Asset Attack Surface Management (CAASM) platform specializing in rapid, comprehensive asset discovery across IT, OT and IoT environments.

Founded in 2018 by HD Moore (creator of Metasploit), runZero pioneered unauthenticated active discovery, the ability to discover and fingerprint network devices without requiring credentials, agents, or network taps. This approach revolutionized asset discovery, by delivering complete inventory visibility in hours instead of weeks or months

  • Core Philosophy: "You dan't secure what you don't know you have." runZero's mission is to eliminate asset visibility gaps through intelligent, safe, multimodel discovery that surfaces 25-30% more devices than traditional inventory tools.
  • Key Market Position: Gartner Peer Insight's "Customers' Choice" for CAASM; created the modern active discovery market category; recognized for speed, ease of deployment, and comprehensive device fingerprinting.
  • Business Model: Cloud SaaS platform with flexible deployment (cloud, on-premises); pricing based on discovery scope (number of assets)

How to position?

Primary Target Customer Segments

Organizations with high velocity IT change

Organizations experiencing rapid growth, frequent M&A activity, cloud migration or digital tranformation face constant infrastructure change that outpaces manual inventory processes. IT teams maintain spreadsheets that become outdated within weeks. Security teams can't assess risk because they don't know what system exist.

Manufacturing & Industrial Operations

Manufacturing environments blend IT and OT, computers, servers, routers alongside industrial equipment, PLCs, sensors, SCADA systems (OT). OT systems are often decades old, fragile and running critical production. Traditional active scanning risks disruption.

runZero's safe, tunable active scanning and robust passive discovery specifically address this: organizations can scan OT environments without disrupting production, discovering equipment IT never knew existed. The NREL/CECA report validates that active discovery is safe in OT environments done correctly.

Healthcare Organizations

Hospitals have medical devices scattered throughout infrastructure: bedside monitors, infusion pumps, diagnostic equipment, patient wearables. IT has no central inventory of these devices. Devices run specialized, often ancient operating systems that can't run security agents.

runZero's agentless discovery finds these devices, classifies them (manufacturer, model, firmware) and flags vulnerabilities

Managed Service Providers and Resellers

Managed Service Providers managing hundreds of customer environments face a critical problem: maintaining accurate asset inventory across customers while scaling efficiently. Manual discovery doesn't scale; expensive appliance-based solutions break the economics.

runZero's cloud-based SaaS model enables MSPs to deploy discovery across customer environments from a single console, automatically discovering assets, flagging shadow IT, and identifying vulnerabilities. Integrations with customer CMDBs (ServiceNow, Solarwinds, etc.) enable automated inventory population.

Vulnerability Management Programs

Organizations running vulnerability scanners (Qualys, Tenable, Rapid7, Nessus) identify thousands of vulnerabilities but are blind to unmanaged devices. Vulnerability scanners can't reach OT equipment, air-gapped systems, devices that block active probes. Patches are prioritized on scanned devices while vulnerabilities on unmanaged devices go invisible.

runZero bridges this gap: it discovers the unmanaged devices; vulnerability management tools then assess them. Together, they close the visibility gap.

Cross-Sell Opportunities

From CMDB/ITSM to Real-Time Inventory

Organizations with ServiceNow, Solarwinds ITSM, JumpCloud Asset Management, or other CMDB systems maintain inventory but face constant staleness. As infrastructure evolves, CMDBs lag behind.

runZero auto-populates and keeps CMDBs current, eliminating manual data entry and ensuring inventory reflects reality.

Message: "Your CMDB is a historical database, not a living inventory. runZero continuously discovers what's actually connected and auto-updates your CMDB. Your inventory becomes current, accurate and reflects your actual infrastructure in real-time.

From Incident Response to Attack Surface Management

Organizations responding to security incidents discovery they don't have complete infrastructure inventory. Post-incident, they need asset discovery to prevent repeat attacks

Example customers

  1. Organizations Managing Multiple Networks or Geographies Organizations with multiple data centers, office locations, or regional networks struggle to maintain consistent inventory across sites. runZero discovers assets uniformly across all environments, providing unified inventory
  2. Organizations preparing M&A or divestitures During acquisitions, IT must rapidly inventory the target company's infrastructure to assess integration complexity, identify redundancies, and establish security controls. runZero accelerates this: initial scan in hours provides complete inventory of the acquired company's assets
Health-Check Service offering

Kappa Data offers a network and security health-check towards their partners. White-labelled, we do a runZero scan on the end-customer's network together with an interview to offer a gap-analysis and improvement plan. This covers vulnerabilities, end-of-life devices, and general cybersecurity roadmap

Core Features

Active Discovery (Intelligent Network Scanning)

Active discovery is runZero's signature capability. Rather than passive listening, runZero sends benign, standards-conformant network probes and analyzes device responses to identify exactly what's on the network.

How it works: runZero Explorers (lightweight scanners deployed on-premises or in cloud) send SNMP queries, HTTP requests, and other standard protocols to network addresses. Devices respond with information: "I'm a Windows Server 2019", "I'm an Extreme Networks switch", "I'm a medical monitoring device". From these responses, runZero fingerprints exact device type, manufacturer, model, firmware, and running services.

Advantages:

  • Complete fingerprinting: Identifies exact device models and firmware versions, not just "Windows Server"
  • Fast: Scans complete in hours or days, not weeks
  • No credentials needed: Unauthenticated scanning works on unmanaged devices IT doesn't have access to
  • Highly configurable: Fine-grained tuning for scan speed, protocol selection, excluded hosts ensures safe operation even in sensitive OT environments
  • Safe by design: Only standard, conformant packets; research-driven approach prevents disruption

OT Safety: runZero specifically engineered active discovery to be safe in OT environments. NREL/CECA report validated that active discovery is safe when done correctly. Fine-grained tuning, standards-conformant packets, and extensive protocol handling prevent disruption even on decades-old equipment

Passive Discovery (Continuous Monitoring)

For environments where active scanning is uncomfortable (air-gapped networks, extremely fragile OT, high-security facilities), runZero provides passive discovery that continuously listens to network traffic without sending probes

How it Works: runZero observes network traffic (via mirror/SPAN port or log imports) and learns about devices from their communications. When a device sends DHCP requests, HTTP traffic, or proprietary protocol communications, runZero observes and fingerprints it.

Advantages:

  • Non-intrusive: Zero risk of disruption
  • Continuous: Always-on monitoring provides ongoing visibility
  • Safe for fragile systems: No probes sent
  • Works on air-gapped networks: If traffic can be captured and imported

Limitation: Slower than active discovery; only identifies devices that communicate during observation window

Fingerprinting (Exact Device Identification)

Fingerprinting is how runZero identifies "Canon imagePRUNER 4000 running firmware 5.2.1" without contacting Canon. Every device communication in characteristic ways; runZero recognizes these patterns

  • How it works: When runZero analyzes device responses, it builds a fingerprint (a unique signature of behavior patterns, response formats, and metadata). runZero compares this fingerprint to a database of millions of known devices, identifying exact device type, model, firmware and configuration
  • Accuracy: 99%+ identification accuracy for common devices; reduces false positives in vulnerability assessment by correctly identifying device types
  • Value: Accurate fingerprinting enables precise vulnerability mapping. Critical vulnerabilities affecting specific device models are flagged; false alarms on misidentified devices are eliminated

Vulnerability Detection in Discovery

Modern runZero (integrated with Nuclei vulnerability scanner) doesn't just discover devices, it immediately assesses them for known vulnerabilities

How it works: When runZero discovers a device as "Windows Server 2016 with outdated patch level," it checks: "Is this configuration vulnerable to known CVEs?" Flags high-risk configurations (outdated OS, weak protocols, exposed services)

Integration: runZero feeds vulnerability data into vulnerability management platforms, SIEM and XDR tools for centralized risk assessment.

API Integrations

runZero integrates with dozens of platforms to provide comprehensive inventory by unifying data from multiple cloud sources

  • Cloud Providers: AWS, Azure, Google Cloud
  • Identity Platforms: Active Directory, Entra ID
  • IT Management: ServiceNow, Netbox, Atlassian
  • Vulnerability Management: Qualys, Tenable, Rapid7
  • EDR/MDR: CrowdStrike, Microsoft Defender, SentinelOne
  • Network: Palo Alto, VMWare
  • Threat Intelligence: Shodan, Censys

Advantage: runZero becomes the central clearinghouse for asset data. It discovers assets through active/passive scanning, enriching with data from other platforms, feeding consolidated inventory to downstream systems

External Attack Surface Management

runZero can scan external IP space (public-facing infrastructure) to identify exposed services, misconfigured firewalls, and shadow IT exposed to internet

How it works: Configure ASN numbers or domain names; runZero scans external-facing IP addresses to identify web servers, management interfaces, or other exposed infrastructure

Use case: Discover accidentally exposed cloud buckets, development servers exposed to internet, or rogue DNS entries pointing to attacker infrastructure.

Network Topology and Visualization

runZero generates network diagrams showing device relationships, network segmentation, and topology. Identifies network bridges (devices with multiple network interfaces) that could violate network segmentation

Business Value: Quick visualization reveals architecture issues, excessive network bridges, poor segmentation, unintended network connectivity.

Feature overview

Deployment Models

  • Cloud SaaS: Explorers deployed on-premises or in cloud environments; all data processing, storage, and analytics in runZero cloud. Ideal for organizations wanting minimal on-premises infrastructure
  • On-Premises: Full deployment on customer's own infrastructure; supports air-gapped environments

Scalability

runZero scales from single-site deployments to multinational enterprises with hundreds of sites:

  • Single Explorer scans local network
  • Multiple explorers coordinate scans across distributed networks
  • Central management console aggregates inventory from all sites

Audit and Compliance

runZero maintains detailed change logs:

  • When was each device discovered?
  • When did configuration change?
  • When were vulnerabilities flagged?
  • When was remediation completed?
  • Who authorized changes?

This audit rail satisfies compliance requirements demonstrating continuous asset monitoring and vulnerability management.

runZero vs Armis: Realistic Comparison

Both runZero and Armis address identity and asset visibility with fundamentally different approaches

Where runZero excels

  • Speed of initial deployment: runZero achieves complete inventory in hours; Armis requires days or weeks of behavioral learning
  • Discovery without credentials: Active scanning works on unmanaged, IoT, OT devices without requiring authentication
  • Active scanning precision: Active fingerprinting identifies exact device models, firmware versions, and services running
  • External attack surface: runZero can scan external IP space to identify exposed infrastructure; Armis focuses on internal networks

Conclusion