runZero’s cover photo
runZero

runZero

Software Development

Austin, Texas 19,556 followers

See and secure your total attack surface. Even the unknowns and unmanageable. Try it free today!

About us

Founded by HD Moore (creator of Metasploit), runZero provides a single source of truth for exposure management across your total attack surface: internal, external, IT, OT, IoT, mobile, and cloud. Providing the most complete and accurate visibility into every asset and exposure, runZero helps you mitigate risks faster, meet compliance requirements, and ensure you continuously discover the assets and exposures that others miss. On average, customers find 25% more assets with runZero than they were previously aware of. The runZero Platform doesn’t require agents, authentication, or appliances to deliver complete visibility. Novel active scanning technology is combined with passive discovery and API integrations to deliver insights across internal and external attack surfaces, as well as in-depth fingerprinting and exposure detection on every asset. Today, we have 500+ customers globally, including a number of Fortune 500 entities that use us at scale and were recently named the Customers’ Choice on Gartner® Peer Insights. What will you uncover with runZero? Find out with a free 21-day trial.

Website
https://www.runzero.com
Industry
Software Development
Company size
51-200 employees
Headquarters
Austin, Texas
Type
Privately Held
Founded
2018
Specialties
network discovery, asset inventory, cyber asset management, caasm, exposure management, and attack surface management

Locations

Employees at runZero

Updates

  • View organization page for runZero

    19,556 followers

    Will AI-driven cyberattacks lead CISA to change KEV patching deadlines? Don’t miss Justin Doubleday’s recent article, AI drives new debate around CISA software patching deadlines, in Federal News Network. It’s a great summary of: ✅ Why this change is probably being considered, ✅ The challenges agencies will face if implemented, ✅ Changes the agencies will need to make to adapt, and ✅ How it could lead to the unintended consequence of increasing time to patch. Features commentary from Tod Beardsley, VP of Security Research, runZero. Read it today at: https://lnkd.in/eqD2bCC5 

    In response to the Anthropic #Mythos preview, the Trump administration is reportedly considering moving to a three-day window for federal agencies to patch vulnerabilities on the "Known Exploited Vulnerabilities" (KEV) catalog. But data shows CISA had already been accelerating KEV patch timelines, from an average of 19.7 days last year to 14.4 days so far in 2026. I spoke to cyber experts, who agreed we need faster remediation, but said setting shorter deadlines isn't the only answer. Thanks to Hemant Baidwan Tod Beardsley for sharing their perspective for my story. https://lnkd.in/esidRZ2q

  • View organization page for runZero

    19,556 followers

    🔈ICYMI: During their runZero Day session, HD Moore (runZero), Jonathan Cran (Mallory), and host Tod Beardsley (runZero) explored how AI-powered threat intelligence is providing defenders with a much-needed advantage in an increasingly noisy security landscape. 👉 Check out the clip & then watch the full episode to learn more about this timely topic! 🎥 runZero Day session—The infinite eye: How AI threat intelligence gives defenders an asymmetric edge https://lnkd.in/gr854YkV

  • runZero reposted this

    Every security professional knows the feeling when a vulnerability advisory drops for embedded IoT devices. Historically, tracking down affected UPS management cards and printers meant hours of manual cable tracing and MAC address hunting across multiple IDF and MDF closets. Not anymore. Massive shoutout and gratitude to the Friday Institute and NCDPI for equipping our district with the tools to respond to threats efficiently. Thanks to the runZero visibility they provided, our incident response workflow went from hours of guessing to minutes of targeted execution. When a recent vulnerability hit our fleet, the remediation looked like this: 1️⃣ Queried the affected software via runZero. 2️⃣ Exported the telemetry data. 3️⃣ Parsed the export to instantly extract the exact Switch IPs and physical switch ports for every single vulnerable asset. 4️⃣ Used our site engine to drop the ports and quarantine the devices. From alert to full isolation in minutes—without leaving the console. This is what happens when you empower teams with absolute network visibility. We aren't just reacting; we are executing targeted remediations. Thank you to the Friday Institute and NCDPI leadership for your continued investment in our K-12 security posture. The tools you’ve put in our hands are making a measurable impact on the front lines. 🛡️💻 #CyberSecurity #InfoSec #NetworkVisibility #IncidentResponse #runZero #NCDPI #FridayInstitute #K12Security #ThreatHunting #SOC Cory Rankin Samuel Carter NCSU

  • New federal guidance recently dropped on applying Zero Trust (ZT) principles to Operational Technology (OT). Applying ZT to legacy OT systems is challenging. #OT environments are often old, expensive to modernize, and increasingly converging with IT networks, creating attractive targets for adversaries. So, what should you do? First, don't let the fear of OT fragility stop you from going beyond air-gaps and segmentation to protect your OT network. runZero has active scanning technology that is proven to be safe in these sensitive environments (according to an NREL evaluation). Next, runZero is empowering converged network defenders with new powerful capabilities from our recent 4.9 release that map attack paths, identify segmentation gaps, deliver deep OT intel (with field-level discovery), and more! Finally, make sure to read our blog about the recent federal guidance on applying ZT to OT and find out what our experts (Tod Beardsley and Colin Dupreay) say is the first step you should take for protecting your OT environment. 👀  Read the full blog here: https://lnkd.in/gnbZYGiw ➡️ For more 4.9 release details, visit: https://lnkd.in/gPq_-W4E 👉 Read the NREL report at: https://lnkd.in/gQwc7HpK #OTsecurity

    • No alternative text description for this image
  • 🚨Next runZero Hour: Segmentation—stop assuming & start verifying with 4.9! Join runZero CEO HD Moore and VP of Security Research Tod Beardsley for next week's runZero Hour, as they showcase the powerful new capabilities in runZero 4.9, including: 📈 Interactive attack path mapping 👁️ Multi-homed & bridge detection 🗺️  Advanced 2D & 3D topology maps 🧠 Deep OT intelligence, including field-level discovery ➕ More! Don’t forget to stick around for the live Q&A session and the Rapid Response Roundup that covers the month’s most notable threats. Register today and get your questions ready for next week! 👉 https://lnkd.in/eseNuWxz  🗓️  May 20, 2026 at 1 PM ET/ 10AM PT

    • No alternative text description for this image
  • 🚨New Report: 2026 GigaOm Radar for Operational Technology Security “runZero excels in environments requiring comprehensive visibility into converged IT and OT networks.” — GigaOm Radar for OT Security The report evaluates security solutions designed specifically for industrial environments, focusing on purpose-built capabilities that can be safely deployed in OT environments. 🎉  We’re thrilled to announce that runZero is positioned as a Challenger and Fast Mover in the Innovation/Platform Play quadrant of the Radar. 👏 runZero’s capabilities featured in the report include: ✅ OT discovery: “Identify assets with high precision, providing security teams with accurate inventory data without the risk of crashing sensitive OT hardware,” including shadow IT, forgotten infrastructure, and sub-assets reachable through protocol gateways. ✅ OT threat detection & response: Leverage advanced OT threat intelligence and real-time detection for emerging threats “driven by a dedicated in-house research team, specializing in reverse-engineering OT protocol stacks and identifying insecure-by-design vulnerabilities.” ✅ Unified IT/OT security: Achieve “a single source of truth that correlates data from enterprise IT assets, industrial OT infrastructure, and cloud environments within a common backplane.” ✅ Ease of deployment: Get up and running fast — “implementation is exceptionally streamlined…the agentless and credential-free nature of the discovery process allows organizations to begin seeing results within minutes of deployment.” Ready to learn more? 🎥 Join GigaOm Field CTO Chris Ray and runZero CEO HD Moore for a live webinar as they explore new methods for hardening OT defenses and discuss insights from the OT Radar. 💻 Webinar—Mind the Gaps: Securing the converged IT/OT attack surface 🗓️ Thursday, May 28, 2026 at 12 PM ET / 9 AM PT 👉 Register for the webinar & read the report at: https://lnkd.in/gPVyC6Mm #OTSecurity 

    • No alternative text description for this image
  • Stop guessing. Start mapping. 🗺️ With the release of runZero 4.9, we’re helping organizations "map the unmappable." Traditional tools often see a single gateway IP and stop there. runZero dives deeper, recursively walking the backplane to reveal the entire field-level topology of PLCs and nested devices. But discovery is only half the battle. Our new attack path mapping shows you exactly how an attacker could move through your network to reach those assets, exposing the segmentation gaps you didn't know existed. 🚀 Check out our latest blog to learn more about these capabilities: https://lnkd.in/gimSwtrQ For all 4.9 release information, visit: https://lnkd.in/gPq_-W4E #ExposureManagement #NetworkSegmentation #OTsecurity #ITOTConvergence #CriticalInfrastructure

  • View organization page for runZero

    19,556 followers

    🎉 We’re excited to welcome 10 talented new team members to runZero! Please join us in welcoming our newest Yetis: Meaghan Amato, Pete Caldecourt, Adam Foit, Gregory McGinnis, Corey Holland, Douglas Danger Manley, Chris Passas, Cody Strong, Jennifer Wood, and Sally Yates, M.A., BCBA. We’re thrilled you’re here!👏 Want to re-imagine the future of exposure management and be surrounded by innovators and collaborators? runZero might be the place for you! Check out our current openings at: https://lnkd.in/gUb8d5iU

    • No alternative text description for this image
  • Are unpatched, End-of-Life (EOL) devices making your network edge the easiest way in for attackers?🚪 In a recent runZero Day session, kimber D. and Patrick Garrity 👾🛹💙 from VulnCheck joined host Tod Beardsley (runZero) to discuss the risks lurking at your network edge. They detailed why EOL hardware—like routers and firewalls—are some of the most commonly exploited assets. They also explore how this problem is exacerbated by internet service providers that continue to issue EOL hardware to new customers as well as the lack of consumer awareness regarding router updates. Stop leaving the door open. 🎥 Watch the full on-demand session to learn more: https://lnkd.in/giu2dGVj #EOL #networksecurity

  • Is your #OT network segmentation based on fact or just untested assumptions? Threat actors are betting on the latter. It's time to trade assumptions for validation with runZero 4.9! ✅ See & map hidden attack paths that cross converged boundaries. ✅ Reveal 'unmappable' sub-assets hidden behind protocol gateways. ✅ Spot dangerous segmentation gaps and multi-homed devices. ✅ Understand the role and risk profile of every asset across your entire attack surface. 👉️ Read our latest blog to learn more about the power of runZero 4.9! https://lnkd.in/gZPfEwV8

    • No alternative text description for this image

Similar pages

Browse jobs

Funding

runZero 2 total rounds

Last Round

Series A

US$ 15.0M

See more info on crunchbase