# ReConfirm > ReConfirm is the world's first External Attack Surface Management (EASM) platform, helping organizations discover, understand, and act on their external attack surface to defend against cyber threats. ReConfirm EASM continuously maps and monitors an organization's internet-facing digital footprint — including domains, subdomains, IP addresses, cloud assets, email configurations, SSL/TLS certificates, and exposed services — to identify vulnerabilities before attackers do. ## Core Capabilities - **Discover**: Automated discovery of all internet-facing assets, including shadow IT, forgotten subdomains, and third-party services - **Understand**: Risk scoring, vulnerability assessment, and contextual analysis of discovered assets - **Act**: Actionable remediation guidance, alerting, and integration with existing security workflows ## Key Features - Vulnerability scanning and CVE detection - Email security assessment (SPF, DKIM, DMARC) - SSL/TLS certificate monitoring - Similar domain detection (typosquatting, brand abuse) - Credential leak monitoring - Dangerous open port detection - Security header analysis - Subdomain enumeration and inactive subdomain detection - Associated domain discovery - Brand protection ## For Partners ReConfirm offers a white-label partner program for MSPs, MSSPs, and distributors, providing recurring revenue opportunities with full platform customization. ## Certifications - Cybersecurity Made in Europe (ECSO) - EU-hosted infrastructure - GDPR compliant ## Links - [Product Overview](https://reconfirm.com/product) - [How It Works](https://reconfirm.com/how-it-works) - [Partner Program](https://reconfirm.com/for-partners) - [Knowledge Base](https://reconfirm.com/resources/kb) - [Blog](https://reconfirm.com/blog) - [Free Scan](https://reconfirm.com/free-scan) - [Contact](https://reconfirm.com/contact) - [Company](https://reconfirm.com/company) ## Knowledge Base ### Getting Started - [Introduction to ReConfirm EASM](https://reconfirm.com/resources/kb/getting-started/introduction) ### Understanding Scanning Results - [Vulnerability Scanning](https://reconfirm.com/resources/kb/understanding-scanning-results/vulnerability-scanning) - [Email Security](https://reconfirm.com/resources/kb/understanding-scanning-results/email-security) - [Similar Domains](https://reconfirm.com/resources/kb/understanding-scanning-results/similar-domains) - [Associated Domains](https://reconfirm.com/resources/kb/understanding-scanning-results/associated-domains) - [Assets](https://reconfirm.com/resources/kb/understanding-scanning-results/assets) - [Credential Leaks](https://reconfirm.com/resources/kb/understanding-scanning-results/credential-leaks) - [Subdomains](https://reconfirm.com/resources/kb/understanding-scanning-results/subdomains) - [Inactive Subdomains](https://reconfirm.com/resources/kb/understanding-scanning-results/inactive-subdomains) - [SSL/TLS Information](https://reconfirm.com/resources/kb/understanding-scanning-results/ssl-tls-information) ### Platform Documentation - [Introduction and Overview](https://reconfirm.com/resources/kb/platform-documentation/introduction-and-overview) - [Getting Started & First Usage](https://reconfirm.com/resources/kb/platform-documentation/getting-started-first-usage) - [Dashboard and User Interface](https://reconfirm.com/resources/kb/platform-documentation/dashboard-and-user-interface) - [System Settings & Account Management](https://reconfirm.com/resources/kb/platform-documentation/system-settings-account-management) - [Organizational View](https://reconfirm.com/resources/kb/platform-documentation/organizational-view) - [Scanning and Monitoring](https://reconfirm.com/resources/kb/platform-documentation/scanning-and-monitoring) - [Scan Results and Reporting](https://reconfirm.com/resources/kb/platform-documentation/scan-results-and-reporting) - [Integrations, Best Practices & FAQ](https://reconfirm.com/resources/kb/platform-documentation/integrations-best-practices-faq) - [Secure Software Development Lifecycle](https://reconfirm.com/resources/kb/platform-documentation/secure-software-development-lifecycle) ### Configuration - [Scan Configuration](https://reconfirm.com/resources/kb/understanding-configuration/scan-configuration) - [Scan Profiles](https://reconfirm.com/resources/kb/understanding-configuration/scan-profiles) ### Common Vulnerabilities - [Security Headers Guide](https://reconfirm.com/resources/kb/security-headers/security-headers-guide) - [List of Dangerous Open Ports](https://reconfirm.com/resources/kb/dangerous-open-ports/list-of-dangerous-open-ports) ### Integrations & Configuration - [Webhook Implementation](https://reconfirm.com/resources/kb/api-webhook/webhook-implementation) - [Custom Subdomain Sources Overview](https://reconfirm.com/resources/kb/custom-subdomain-sources/overview) - [Azure DNS Setup](https://reconfirm.com/resources/kb/custom-subdomain-sources/azure-dns-setup) - [Cloudflare DNS Setup](https://reconfirm.com/resources/kb/custom-subdomain-sources/cloudflare-dns-setup) - [NS1 DNS Setup](https://reconfirm.com/resources/kb/custom-subdomain-sources/ns1-dns-setup) - [TransIP DNS Setup](https://reconfirm.com/resources/kb/custom-subdomain-sources/transip-dns-setup) ## Blog - [ReConfirm Announces Technology Alliance with ESET in the Netherlands](https://reconfirm.com/blog/reconfirm-technology-alliance-eset-netherlands) - [ReConfirm Proudly Bearing the "Cybersecurity Made in Europe" Label](https://reconfirm.com/blog/cybersecurity-made-in-europe-label) - [External Attack Surface Monitoring (EASM)](https://reconfirm.com/blog/external-attack-surface-monitoring-easm)