Network Security

Network security for your external perimeter

Fencer monitors everything visible from the outside: your domains, DNS records, SSL certificates, email authentication, lookalike phishing domains, open ports, and exposed network services. Updated daily, findings in one place.

Get StartedBook a Demo
Why Fencer?

Network security without the overhead

Works from day one

Connect your cloud accounts and domains and Fencer starts monitoring immediately. No agents, no complex configuration, no security team required.

Two Capabilities, one perimiter

Domain security covers your DNS, SSL, email authentication, and phishing exposure. Network scanning covers your open ports and exposed services. One platform, full perimeter coverage.

Your Full Security Foundation

Network security is one part of Fencer's complete security platform. Application security, cloud, identity, endpoint, and monitoring all in one place.

Capabilities

Everything exposed on your external perimeter, covered

Domain security

Domain security for DNS, SSL, email, and phishing

Fencer scans your domains daily across six layers: DNS record health, SSL/TLS certificate analysis, email authentication validation (SPF, DMARC), spam blacklist checking, lookalike phishing domain detection, and subdomain discovery. One scan, everything visible about your domain.

  • DNS monitoring: Full DNS record inventory with DNSSEC status and CAA record verification
  • SSL/TLS analysis: Certificate health, expiry warnings, cipher suites, and known vulnerabilities including Heartbleed and POODLE
  • Email security: SPF, DMARC, and MX validation with spam blacklist checking and overall email security status
  • Phishing detection: Lookalike domain detection using typosquatting, homoglyphs, and suffix variations
  • Subdomain discovery: Passive and active enumeration with tech stack fingerprinting and WHOIS expiry tracking
Network scanning

Network vulnerability scanning for your public infrastructure

Fencer connects to your cloud accounts and domains, automatically discovers every public IP and open port, then runs vulnerability checks against each service it finds. Findings flow into your vulnerability pipeline with severity ratings and remediation guidance.

  • Automatic discovery: Public IPs extracted from connected AWS accounts and domains, no manual target configuration required
  • Port scanning: Top 1,000 ports scanned per IP with service version detection and full service inventory
  • Vulnerability checks: SSL/TLS issues, EternalBlue, Shellshock, unauthenticated Redis and MongoDB, and more
  • Custom targets: Scan any IP, CIDR range, or hostname beyond your connected cloud accounts
  • INFO filtering: Informational results automatically filtered so only actionable findings reach your queue
use Cases

What can you do with Fencer's network security capabilities?

See your external perimeter before attackers do

Fencer discovers every open port, exposed service, and lookalike phishing domain targeting your brand. Updated daily so your perimeter reflects the current state of your infrastructure.

Monitor domain and certificate health automatically

SSL certificates expire, DMARC policies go stale, and subdomains accumulate without anyone noticing. Fencer catches all of it on a daily schedule so nothing slips through.

Satisfy SOC 2 perimeter security requirements

SOC 2 auditors ask about domain monitoring, email authentication, and network vulnerability scanning. Fencer's daily scan history gives you documented evidence across all three.

Replace point solutions with one perimeter platform

A separate SSL monitor, a DMARC tool, a port scanner — each with its own dashboard and alerts. Fencer covers your full external perimeter in one place.

“A lot of security products are built for a dedicated security team. Fencer takes a developer-first approach and meets you where you already are as a dev team, which makes it a much better fit for a startup like ours.”

— Ben Papillon
CTO & Co-founder, Schematic

Secure your startup’s momentum