Conor O Neill

Radar - Hacker-powered threat intelligence

80% of breaches are caused by hackers finding and exploiting known vulnerabilities. Radar watches your back 24/7 - giving you the power to find these vulnerabilities in your business before the bad guys do.

Add a comment

Replies

Best
Luke Morgan
Lovely stuff
Anthony Fellows
Love this, great product, great design and even better security! Best of luck to you all!
Jonny Slater
Awesome product, awesome team!
Ben
Looks Awesome, looking forward to seeing the results coming back from it!
Patryk Pijanowski
While Radar seems robust in identifying known vulnerabilities, it might not be as effective in detecting new, unknown threats (zero-day vulnerabilities). Incorporating more sophisticated AI-driven anomaly detection could potentially make the tool even more powerful. Additionally, clarity about its user interface and ease of setup would be useful for potential users.
Beth Watts
@patpijanowski - thanks for your comment! Radar takes 30 seconds to set up, it just uses your domain via your email address you register with and searches from there, you can also add additional domains if you have more than one! We very much understand the concern about zero-day vulnerabilities. The reason they're challenging for any threat intel tool is largely due to the very nature of these threats - they’re unknown and unidentified until they’re exploited, meaning they're pretty much impossible to pre-empt. Our product operates as an external, unauthenticated scanner - it can only assess and analyse data that is publicly accessible over the internet. AI-driven anomaly detection sounds appealing but requires a far deeper, internal view of the system it’s protecting, generally beyond what is possible without authentication/explicit consent. Plus the ethical implications! The main focus of Radar is to help users identify known vulnerabilities in their systems based on a database that’s continuously updated. This focus is pivotal for maintaining a good security posture, as the vast majority of successful attacks still exploit known vulnerabilities that have not been patched. On your UI comment, we are consistently working to make our tool as user-friendly as possible, do you have any specific suggestions? Hope this helps, really interested in your feedback and thanks for taking the time.
Ahmad Ali
The hard work behind the launch is evident, Congrats!
Oisin O'Neill
Very impressive that I didn't actually have to do anything except sign up and it found a bunch of security issues we didn't know about. Definitely recommend.