Frequently Asked Questions
Find answers to the most common questions about Ambionics and our CTEM platform.
What is CTEM (Continuous Threat Exposure Management)?
CTEM is a continuous threat exposure management model. Unlike one-time audits, it enables continuous monitoring of your attack surface, assessment of real risks, and long-term risk reduction management. Gartner identified CTEM as one of the top cybersecurity trends.
What is the difference between Ambionics and a vulnerability scanner?
A scanner detects potential vulnerabilities, often with many false positives. Ambionics goes further: each vulnerability is validated by a human expert, ensuring zero false positives. Additionally, we combine asset mapping, continuous pentesting, and CTI monitoring in a unified view.
How do you guarantee 'zero false positives'?
Each detected vulnerability is manually analyzed and validated by our PASSI-certified pentest experts before being reported in the platform. This eliminates noise and allows your teams to focus only on real risks.
How long does it take to deploy Ambionics?
The Uncovery module requires no deployment: simply enter your domain names or IP addresses. The first mapping is available within hours. For Security, onboarding includes a scoping phase and initial pentest within 2 to 4 weeks.
What integrations are available?
Ambionics offers a complete and documented REST API, multi-format exports (PDF, DOCX, CSV, JSON), and connectors to over 4,000 market solutions through our integration partners. SSO/MFA integration is also available.
How does multi-tenancy work?
The platform allows logical segmentation by entity (subsidiaries, business units, countries). Each entity has its own scope and users, while enabling a consolidated view at the group level for strategic management.
How does asset discovery work with Uncovery?
Uncovery combines advanced OSINT techniques (Certificate Transparency, passive DNS, search engines) and technical scans (65,535 TCP ports, application discovery). The mapping is updated at a configurable frequency and helps identify Shadow IT.
How often are security tests performed?
Vulnerability scans run continuously. Manual pentests are performed at least twice a year, with weekly counter-audits to verify fixes. The 0-day/1-day monitoring is daily.
What sources does the Threats module monitor?
The Threats module monitors the dark web, specialized forums, marketplaces, social networks, and compromised element databases. Our CTI experts analyze weak signals to provide actionable intelligence.
How is pricing structured?
Pricing depends on the chosen module and scope to be covered. Uncovery is billed based on the number of assets. Security offers Standard, Professional, and Premium packages. Contact us for a custom quote.
How do I request a demonstration?
You can request a personalized demonstration via our contact form or by booking a slot directly with our sales team. The demo lasts about 45 minutes and can be tailored to your specific needs.
What support is included?
All our offerings include access to the Ambionics portal and the ability to exchange directly with our experts via the comments section. Premium offerings include dedicated support with a privileged contact.