
Continuous security monitoring of assets and networks.
Overview
The Blacklight Platform brings IT asset identification, configuration auditing and file integrity monitoring into one platform, empowering security teams to better protect their critical assets. Its cloud-based management portal and on-premise agents provide a more efficient and cost-effective way to monitor and secure the full IT surface area.
Overview
Blacklight is a configuration analysis and asset discovery solution that surfaces and provides context to unseen risks. It consists of a cloud-based management portal, and on-premise agents that analyzes asset configuration states, reports how configurations differ from established benchmarks, and provides misconfiguration risk scores in real-time.

Audit Configurations
Audit asset configurations against benchmark standards.

Compliance Reporting
Report configuration compliance via real-time dashboard.

Inventory Assets
Discover assets and applications to create an accurate inventory.

Detect Changes
Identify when changes happen with file integrity monitoring.
How it Works
1. Deploy
The universal Blacklight agent (Windows, OSX, Linux) is deployed to all assets ad-hoc or via your organization’s existing deployment tools.


2. Collect
Each Blacklight agent collects changes in configuration states and application inventory. Blacklight agents also perform scans to discover new devices.
3. Sync
New configuration and application data discovered by Blacklight agents continuously syncs with your Blacklight Cloud environment.


4. Audit
Automatically compare configurations against benchmarks and enable file integrity monitoring. Generate real-time findings and tickets for investigation.
5. Report
Real-time, filterable reports are accessed via a secure web interface, enabling better compliance reporting and findings management.

Benchmarks for hardening your configuration compliance
Blacklight is certified by the Center for Internet Security to automatically audit discovered devices against a number of CIS benchmarks. Built with flexibility in mind, Blacklight also allows you to create your own custom asset configuration benchmarks.
Advantages of our cloud architecture
No hardware to install or manage
Blacklight and all its functionality is cloud-based and accessible via an intuitive web interface.
Lower operating costs
The lack of required hardware, straight-forward reporting, and our aggressive pricing lowers operational costs and total cost of ownership.
Seamless scaling
Deployed in the cloud, Blacklight is a scalable solution for all aspects of configuration compliance. Seamlessly add users, assets and agents with no performance cost.
Built for usability
Role-based information access, self-updating agents, intuitive risk scores, and minimal needed configuration allow for a straight-forward user experience.
Integrates with existing solutions
Report on asset and configuration data in Blacklight or import the data into your ticketing system or risk management platform.
Always up-to-date config data
Continuous, automated data collection ensures the most current snapshot of a network’s current state.
Blacklight Resources
Discover unknown assets and risks on your networks with the Blacklight Platform. Learn more >
Get off to a quick start with this checklist on how to use the Blacklight Platform. Learn more >