Five modules, one operator view.
Three pillars on the home page; here's the full surface. Asset Intelligence, Risk Visibility, Compliance & Operations, Automation & Integration, and the on-prem Gateway. Each one earns its keep.
Asset Intelligence
Inventory across endpoints, network devices, firewalls, virtualisation hosts and identity. Without an agent on the endpoint.
- Five-step matching cascade — assets reconcile across sources by hostname, then serial, then MAC, then IP, then Entra ID. The asset graph stays canonical.
- Hardware specs — CPU, RAM, disk, OS and patch level pulled from each connector.
- Discovered applications — installed software with version, vendor and category, surfaced from Defender / Intune / SolarWinds.
- Change history — every change to an asset is timestamped and audit-logged. Why did this device drop EDR coverage on Tuesday? It's there.
Risk Visibility
A configurable rule set scores every asset against your control posture. A–F grade, control gaps, and a network topology that paints the risk surface.
- Asset-class weighting — endpoints, servers, network devices and firewalls aren't graded by the same rubric. Configurable per asset class.
- Live network topology — force-directed graph with LLDP / VPN edges and risk-glow node colouring. Find blast radius at a glance.
- Control validation — EDR coverage, OS patch level, encryption, backup SLA and MFA coverage continuously checked.
- Override with intent — every exception leaves a trail. Risk acceptance is a decision, not an oversight.
Compliance & Operations
Exemptions with audit trail and expiry. A dynamic tagging engine. CIS / NIST mapping. Five report types your auditors actually accept.
- Per-asset risk acceptance — exempt a control with a reason, an owner, and an expiry date. Bulk rules supported. Auditor-friendly.
- Dynamic tagging — built-in rules plus custom conditions. Tag as
criticalwhen the asset is a domain controller AND missing EDR AND in the finance subnet. - Framework mapping — control posture mapped to CIS Critical Security Controls and NIST CSF. Generate evidence for the categories your assessor cares about.
- Five report types — executive summary, risk assessment, asset inventory, compliance, connector health. Scheduled delivery to a distribution list.
Automation & Integration
The action centre auto-generates remediation tasks. Push them to ServiceNow for escalation, or close them in-platform. Either way, audit-logged.
- Action centre — every control gap becomes an actionable task with scope, assignee, and SLA. Group by rule, asset class or owner.
- ServiceNow integration — escalate with one click. Track the incident from EtherSight or work it inside ServiceNow.
- API access — Professional and above. Pull asset state, push exemptions, integrate with your own pipelines.
- Audit-log export — CSV export of the audit log on demand.
Infrastructure & Gateway
A Docker agent that lives in your network and reaches systems without cloud APIs. SolarWinds Orion, UniFi Local, Proxmox VE — all in scope.
- Why a gateway — most of the systems that matter inside an org don't have public APIs. Your firewall mgmt plane lives on a VLAN. Your virtualisation host expects local credentials. The gateway reaches those.
- What it runs — single Docker container, low-footprint Node runtime, mTLS back to the EtherSight cloud. No inbound ports.
- Multi-tenant ready — gateways are per-tenant, scoped to the connectors you assign them. Audit-logged at the cloud.
- Where it sits in pricing — Professional and above. Community and Starter use cloud-only connectors.
Connect what you have. Roadmap what you don't.
Built connectors are tested and live in production. Roadmap connectors are scoped, prioritised, and confirmed with launch customers — not vapour.
Five modules. One operator-grade view.
Request a demo and we'll walk you through your own attack surface, using your own connectors. Not a sandbox.