Skip to content

About The Platform

Vorlon

Vorlon has developed a way to quickly analyze data movement between third-party applications. Complete with detection, threat intelligence, and remediation capabilities, Vorlon enables security teams to significantly reduce the window of opportunity attackers have to exploit risks posed by third-party applications.

Threat Discovery with Vorlon
Vorlon Checkmark

Reduce Your Time to Detect

Vorlon Checkmark

Reduce Your Time to Respond

Vorlon Checkmark

Reduce Your Attack Surface

Continuous Third-Party Risk Monitoring

Understand your risk with continuous risk scoring for all third-party apps, secrets, and users.

Continuous Risk Profile of Third-Party Apps with Vorlon
Secret Inventory

Third-Party Secrets Inventory

Vorlon monitors all your third-party secrets’ metadata and activity. Understand the lifecycle, usage, and behavior of your third-party secrets with a comprehensive secret inventory.

Threat Investigation Enrichment

Data enrichment, including malicious IP Address identification, is built directly into the Vorlon platform to facilitate faster threat investigation.

Threat Investigation Enrichment with Vorlon
TPDR-Breach-Scoping-and-Investigation (1)

Real-Time Data Analysis

Continuous monitoring and analysis of the data flows between your organization’s third-party apps in near real-time. Vorlon detects anomalies for malicious and inappropriate activity.

Compliance Violation Prevention

Reduce fines from costly compliance violations by proactively managing third-party access to sensitive data. Continuous monitoring and behavioral notifications make it easier to quickly correct potential issues before they become compliance violations.

Third-Party Vendor Compliance Profiles with Vorlon
Secrets Rotation with Vorlon

Behavioral Alerts

All apps have a behavioral baseline of normal, valid traffic. Know immediately when something isn't right with alerts sent in-app, or via SMS, Slack, or Microsoft Teams.

Fix with Two Clicks

Respond to third-party API issues within minutes, not months. Revoke or rotate secrets within the Vorlon platform. 

Revoke Secrets with Vorlon
dashboard

Dashboard

View a comprehensive summary of your third-party apps, secrets, and data, including in-depth insights into trends and highlighting key areas that need your immediate focus.

discovery

Discovery

Discover all third-party applications connected to your observed apps. Drill down into their connections and analyze traffic for detailed investigations.

risk profile

Risk Profile

Configure observed apps and tag sensitive data. See risk scoring and compliance for vendors and your observed third-party apps.

secrets

Secrets

Inventory of all third-party secrets, including permissions and metadata. Manage secrets by tagging, adding notes, or revoking.

alerts

Alerts

View and manage real-time alerts in a user-friendly interface. Detailed response recommendations are provided for each alert.

Vorbot Outline

Ask Vorlon

An AI Advisor that knows and learns your third-party landscape. Ask it anything you want about your apps, secrets, and data.

What the Experts Say
Legendary SANS Institute DFIR Expert Takes First Look at Vorlon

Jason Jordaan, one of the most famous digital forensics and incident response instructors shares his perspective on Vorlon for security analysts in his First Look review.

This report provides an agnostic opinion of Vorlon and was written by SANS Institute with the express purpose of articulating the perceived value for a cybersecurity practitioner. 

  • Compliance and Protecting Your Data
  • Visibility of Your Third-Party API Ecosystem
  • Threat Detection and Incident Response

Subscription Options

Basic

1-40 Apps /month

Our basic plan includes monitoring up to four (4) third-party applications with unlimited detection of all apps connected to your monitored applications. This plan is designed for organizations seeking basic visibility into their third-party API attack surface.

Included:

  • Unlimited Users with SSO
  • 30 Days Retention with option to extend
  • Limited Features
  • Customer Success
  • Customer Support

Pro

5-498 apps /month

Our pro plan includes monitoring up to 49 third-party applications with unlimited detection of all apps connected to your monitored applications. This plan is designed for organizations seeking complete visibility and remediation capabilities for their third-party API attack surface.

Included:

  • Unlimited Users with SSO
  • 30 Days Retention with option to extend
  • Limited Features
  • Customer Success
  • Customer Support

Enterprise

50+149 apps /month

Our Enterprise plan includes monitoring of unlimited third-party applications with unlimited detection of all apps connected to your monitored applications. This plan is designed for larger organizations seeking complete visibility and remediation capabilities for their third-party API attack surface.

Included:

  • Unlimited Users with SSO
  • 30 Days Retention with option to extend
  • Limited Features
  • Customer Success
  • Customer Support

Basic

Pro

Enterprise

Data Retention

30 Days
Upgrade available
Extended Retention
Option to Purchase
Option to Purchase
Option to Purchase

Third-Party API Visibility

Visibility (Third- and Fourth-Party Apps)
Dashboard
Traffic
Data Flow

Detection and Response

Unlimited App Detection
Behavioral Alerting
-
Enhanced Threat Intelligence
-
Remediation
-

Risk Profile/Compliance

Continuous App Risk Scoring
Sensitive Data Tagging
Custom Compliance Tagging
Risk Profiles - Third-Party Apps
Risk Profiles - Users
-
Compliance Alerting
-

Third-Party API Secrets Monitoring

Continuous Secrets Monitoring
-
Multi-Use Secrets
-
Secret Risk Score
-
Over Permissive Secret Identification
-
Creator Identification
-
Last Used Date
-
Expired Secret Identification
-

Integrations

SIEM
-
ITSM
-
SOAR
-
Slack/Teams
-

Administrative

Unlimited Users
SSO

Video Demo

No sales people. No slides. Just you and a 3-minute video demo.