Introducing G2.ai, the future of software buying.Try now

Best Attack Surface Management Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks

Best Attack Surface Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
139 Listings in Attack Surface Management Available
(702)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Attack Surface Management software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • Security Engineer
    • CISO
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    100
    Features
    91
    Security
    86
    Visibility
    69
    Easy Setup
    68
    Cons
    Improvement Needed
    31
    Feature Limitations
    29
    Improvements Needed
    28
    Missing Features
    26
    Learning Curve
    24
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    8.7
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • Security Engineer
  • CISO
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
100
Features
91
Security
86
Visibility
69
Easy Setup
68
Cons
Improvement Needed
31
Feature Limitations
29
Improvements Needed
28
Missing Features
26
Learning Curve
24
Wiz features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
8.7
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,406 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(141)4.9 out of 5
Optimized for quick response
1st Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

    Users
    • Security Engineer
    • Cyber Security Engineer
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 56% Enterprise
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cymulate: Security Validation and Exposure Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Features
    38
    Security
    36
    Customer Support
    32
    Vulnerability Identification
    30
    Cons
    Improvement Needed
    10
    Integration Issues
    8
    Lack of Integration
    6
    Inefficient Alert System
    5
    Complexity
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
    8.5
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.5
    Compliance Monitoring
    Average: 8.6
    9.8
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymulate
    Company Website
    Year Founded
    2016
    HQ Location
    Holon, Israel
    Twitter
    @CymulateLtd
    1,083 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    268 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

Users
  • Security Engineer
  • Cyber Security Engineer
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 56% Enterprise
  • 42% Mid-Market
Cymulate: Security Validation and Exposure Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Features
38
Security
36
Customer Support
32
Vulnerability Identification
30
Cons
Improvement Needed
10
Integration Issues
8
Lack of Integration
6
Inefficient Alert System
5
Complexity
4
Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
8.5
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.5
Compliance Monitoring
Average: 8.6
9.8
Ease of Admin
Average: 9.0
Seller Details
Seller
Cymulate
Company Website
Year Founded
2016
HQ Location
Holon, Israel
Twitter
@CymulateLtd
1,083 Twitter followers
LinkedIn® Page
www.linkedin.com
268 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(119)4.6 out of 5
3rd Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 70% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    Threat Intelligence
    46
    Threat Detection
    37
    Insights
    34
    Customer Support
    30
    Cons
    Inefficient Alerts
    19
    Inefficient Alert System
    13
    False Positives
    10
    Integration Issues
    10
    Missing Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 8.9
    8.7
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,861 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    161 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 70% Enterprise
  • 20% Mid-Market
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
Threat Intelligence
46
Threat Detection
37
Insights
34
Customer Support
30
Cons
Inefficient Alerts
19
Inefficient Alert System
13
False Positives
10
Integration Issues
10
Missing Features
9
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 8.9
8.7
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,861 Twitter followers
LinkedIn® Page
www.linkedin.com
161 employees on LinkedIn®
(138)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    46
    Security
    45
    Ease of Use
    43
    Automation
    32
    Vulnerability Detection
    32
    Cons
    Expensive
    12
    Limited Scope
    12
    Technical Issues
    11
    Limited Features
    10
    Inadequate Reporting
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    8.2
    Vulnerability Intelligence
    Average: 8.9
    7.9
    Continuous Monitoring
    Average: 9.0
    7.9
    Compliance Monitoring
    Average: 8.6
    8.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,347 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 38% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
46
Security
45
Ease of Use
43
Automation
32
Vulnerability Detection
32
Cons
Expensive
12
Limited Scope
12
Technical Issues
11
Limited Features
10
Inadequate Reporting
9
Pentera features and usability ratings that predict user satisfaction
8.2
Vulnerability Intelligence
Average: 8.9
7.9
Continuous Monitoring
Average: 9.0
7.9
Compliance Monitoring
Average: 8.6
8.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,347 Twitter followers
LinkedIn® Page
www.linkedin.com
410 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    41
    Customer Support
    22
    Easy Integrations
    20
    Time-saving
    19
    Ease of Use
    18
    Cons
    Difficult Learning
    8
    Learning Curve
    8
    Complexity
    7
    Complex Setup
    7
    Learning Difficulty
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.9
    Continuous Monitoring
    Average: 9.0
    9.9
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    178 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 32% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
41
Customer Support
22
Easy Integrations
20
Time-saving
19
Ease of Use
18
Cons
Difficult Learning
8
Learning Curve
8
Complexity
7
Complex Setup
7
Learning Difficulty
7
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.9
Continuous Monitoring
Average: 9.0
9.9
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
178 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
(1,183)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Attack Surface Management software
View top Consulting Services for Scrut Automation
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

    Users
    • CTO
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Small-Business
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Scrut Automation Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    355
    Customer Support
    270
    Helpful
    269
    Compliance Management
    267
    Compliance
    260
    Cons
    Improvement Needed
    82
    Technical Issues
    70
    Improvements Needed
    59
    Software Bugs
    58
    Bugs
    49
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Scrut Automation features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 8.9
    9.5
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.6
    9.6
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Palo Alto, US
    Twitter
    @scrutsocial
    112 Twitter followers
    LinkedIn® Page
    in.linkedin.com
    205 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

Users
  • CTO
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Small-Business
  • 49% Mid-Market
Scrut Automation Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
355
Customer Support
270
Helpful
269
Compliance Management
267
Compliance
260
Cons
Improvement Needed
82
Technical Issues
70
Improvements Needed
59
Software Bugs
58
Bugs
49
Scrut Automation features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 8.9
9.5
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.6
9.6
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2022
HQ Location
Palo Alto, US
Twitter
@scrutsocial
112 Twitter followers
LinkedIn® Page
in.linkedin.com
205 employees on LinkedIn®
(51)4.8 out of 5
5th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 43% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSEK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Features
    23
    Customer Support
    22
    Monitoring
    17
    Implementation Ease
    16
    Cons
    False Positives
    9
    Dashboard Issues
    3
    Integration Issues
    3
    UX Improvement
    3
    Poor Detection Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 43% Enterprise
  • 31% Mid-Market
CloudSEK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Features
23
Customer Support
22
Monitoring
17
Implementation Ease
16
Cons
False Positives
9
Dashboard Issues
3
Integration Issues
3
UX Improvement
3
Poor Detection Performance
2
CloudSEK features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.3
Ease of Admin
Average: 9.0
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,253 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(138)4.6 out of 5
18th Easiest To Use in Attack Surface Management software
View top Consulting Services for Recorded Future
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
    • Users like the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the support from the responsive and helpful team.
    • Reviewers experienced difficulties with the complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    Features
    64
    Threat Intelligence
    47
    Threat Detection
    45
    Insights
    42
    Cons
    Expensive
    28
    Complexity
    26
    Learning Curve
    19
    Information Overload
    18
    Difficult Learning
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    8.5
    Vulnerability Intelligence
    Average: 8.9
    7.8
    Continuous Monitoring
    Average: 9.0
    7.4
    Compliance Monitoring
    Average: 8.6
    8.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    109,059 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,047 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
  • Users like the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the support from the responsive and helpful team.
  • Reviewers experienced difficulties with the complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
Features
64
Threat Intelligence
47
Threat Detection
45
Insights
42
Cons
Expensive
28
Complexity
26
Learning Curve
19
Information Overload
18
Difficult Learning
16
Recorded Future features and usability ratings that predict user satisfaction
8.5
Vulnerability Intelligence
Average: 8.9
7.8
Continuous Monitoring
Average: 9.0
7.4
Compliance Monitoring
Average: 8.6
8.7
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
109,059 Twitter followers
LinkedIn® Page
www.linkedin.com
1,047 employees on LinkedIn®
(31)4.7 out of 5
Optimized for quick response
8th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 74% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyble Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    12
    Monitoring
    12
    Threat Detection
    12
    Features
    10
    Threat Intelligence
    10
    Cons
    Inefficient Alerts
    7
    False Positives
    5
    Inefficient Alert System
    4
    Limited Customization
    4
    Data Inaccuracy
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    18,518 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 74% Enterprise
  • 19% Mid-Market
Cyble Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
12
Monitoring
12
Threat Detection
12
Features
10
Threat Intelligence
10
Cons
Inefficient Alerts
7
False Positives
5
Inefficient Alert System
4
Limited Customization
4
Data Inaccuracy
3
Cyble features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
18,518 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In this era of hybrid work, shadow IT creates an increasingly serious security risk. Defender EASM helps cloud security teams see unknown and unmanaged resources outside the firewall.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender External Attack Surface Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    4
    Customer Support
    3
    Features
    2
    Real-time Notifications
    2
    Cons
    Complex Setup
    2
    Slow Loading
    2
    Bugs
    1
    Integration Issues
    1
    Lack of Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender External Attack Surface Management features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

In this era of hybrid work, shadow IT creates an increasingly serious security risk. Defender EASM helps cloud security teams see unknown and unmanaged resources outside the firewall.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 38% Mid-Market
Microsoft Defender External Attack Surface Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
4
Customer Support
3
Features
2
Real-time Notifications
2
Cons
Complex Setup
2
Slow Loading
2
Bugs
1
Integration Issues
1
Lack of Integration
1
Microsoft Defender External Attack Surface Management features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(108)4.9 out of 5
10th Easiest To Use in Attack Surface Management software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    38
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    9.8
    Compliance Monitoring
    Average: 8.6
    9.8
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
38
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
9.8
Compliance Monitoring
Average: 8.6
9.8
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(182)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Customer Support
    11
    Vulnerability Detection
    11
    Security
    9
    Vulnerability Identification
    9
    Cons
    Expensive
    5
    Limited Features
    4
    Complex Setup
    3
    Pricing Issues
    3
    Slow Scanning
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 9.0
    9.2
    Compliance Monitoring
    Average: 8.6
    9.5
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    952 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 35% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Customer Support
11
Vulnerability Detection
11
Security
9
Vulnerability Identification
9
Cons
Expensive
5
Limited Features
4
Complex Setup
3
Pricing Issues
3
Slow Scanning
3
Intruder features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 9.0
9.2
Compliance Monitoring
Average: 8.6
9.5
Ease of Admin
Average: 9.0
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
952 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
(39)4.7 out of 5
12th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 54% Enterprise
    • 33% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a cybersecurity platform that provides real-time threat detection, external attack surface management, and rapid incident response to protect organizations from digital threats.
    • Reviewers appreciate the platform's proactive approach to cybersecurity, its comprehensive features, ease of use, and the responsive support team that helps enhance overall security posture effectively.
    • Users reported that integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments, and the platform doesn't focus enough on region or industry-specific threats.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CTM360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Features
    8
    Detection
    7
    Threat Detection
    7
    Ease of Use
    6
    Cons
    Complexity
    2
    Limited Customization
    2
    Limited Features
    2
    Complex Searching
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 8.9
    8.8
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    9.5
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 54% Enterprise
  • 33% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a cybersecurity platform that provides real-time threat detection, external attack surface management, and rapid incident response to protect organizations from digital threats.
  • Reviewers appreciate the platform's proactive approach to cybersecurity, its comprehensive features, ease of use, and the responsive support team that helps enhance overall security posture effectively.
  • Users reported that integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments, and the platform doesn't focus enough on region or industry-specific threats.
CTM360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Features
8
Detection
7
Threat Detection
7
Ease of Use
6
Cons
Complexity
2
Limited Customization
2
Limited Features
2
Complex Searching
1
Complex Setup
1
CTM360 features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 8.9
8.8
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
9.5
Ease of Admin
Average: 9.0
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
968 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
(17)4.6 out of 5
20th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falcon Security and IT operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Easy Integrations
    2
    Implementation Ease
    2
    Response Time
    2
    Cons
    Expensive
    3
    Bugs
    1
    Installation Problems
    1
    Insufficient Training
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Security and IT operations features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    9.5
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 41% Enterprise
Falcon Security and IT operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Easy Integrations
2
Implementation Ease
2
Response Time
2
Cons
Expensive
3
Bugs
1
Installation Problems
1
Insufficient Training
1
Poor Documentation
1
Falcon Security and IT operations features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
9.5
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(286)4.5 out of 5
Optimized for quick response
19th Easiest To Use in Attack Surface Management software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    9
    Features
    8
    Automated Scanning
    5
    Ease of Use
    5
    Vulnerability Detection
    5
    Cons
    Slow Scanning
    3
    Lack of Automation
    2
    Limited Automation
    2
    Limited Features
    2
    Time-Consuming
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    7.8
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 32% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
9
Features
8
Automated Scanning
5
Ease of Use
5
Vulnerability Detection
5
Cons
Slow Scanning
3
Lack of Automation
2
Limited Automation
2
Limited Features
2
Time-Consuming
2
Tenable Nessus features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
7.8
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 9.0
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
(39)4.8 out of 5
14th Easiest To Use in Attack Surface Management software
Save to My Lists
16% off: $14950 per year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOCRadar Extended Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    16
    Threat Intelligence
    15
    Features
    14
    Threat Detection
    13
    Ease of Use
    11
    Cons
    Integration Issues
    4
    Limited Features
    4
    False Positives
    3
    Information Overload
    3
    Lack of Features
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
SOCRadar Extended Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
16
Threat Intelligence
15
Features
14
Threat Detection
13
Ease of Use
11
Cons
Integration Issues
4
Limited Features
4
False Positives
3
Information Overload
3
Lack of Features
3
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 9.0
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,121 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A powerful Attack Surface Management solution designed to help you identify, assess, and monitor your organization's cybersecurity vulnerabilities. Stay ahead of potential threats with real-time insig

    Users
    No information available
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 68% Mid-Market
    • 16% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rankiteo Scoring Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection
    8
    Ease of Use
    6
    Actionable Intelligence
    4
    Customer Support
    4
    Features
    4
    Cons
    Integration Issues
    2
    Bugs
    1
    Complex Queries
    1
    Expensive
    1
    Insufficient Training
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rankiteo Scoring Platform features and usability ratings that predict user satisfaction
    8.9
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.6
    9.6
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rankiteo
    Year Founded
    2022
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A powerful Attack Surface Management solution designed to help you identify, assess, and monitor your organization's cybersecurity vulnerabilities. Stay ahead of potential threats with real-time insig

Users
No information available
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 68% Mid-Market
  • 16% Enterprise
Rankiteo Scoring Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection
8
Ease of Use
6
Actionable Intelligence
4
Customer Support
4
Features
4
Cons
Integration Issues
2
Bugs
1
Complex Queries
1
Expensive
1
Insufficient Training
1
Rankiteo Scoring Platform features and usability ratings that predict user satisfaction
8.9
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.6
9.6
Ease of Admin
Average: 9.0
Seller Details
Seller
Rankiteo
Year Founded
2022
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
(22)4.9 out of 5
6th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    10
    Monitoring
    9
    Ease of Use
    6
    Threat Intelligence
    6
    Alerts
    5
    Cons
    Information Overload
    4
    Limited Features
    4
    Lack of Customization
    3
    Missing Features
    3
    Poor UI Design
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    14,043 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

Users
No information available
Industries
No information available
Market Segment
  • 41% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
10
Monitoring
9
Ease of Use
6
Threat Intelligence
6
Alerts
5
Cons
Information Overload
4
Limited Features
4
Lack of Customization
3
Missing Features
3
Poor UI Design
3
ThreatMon features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 9.0
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
14,043 Twitter followers
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Glasstrail Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Vulnerability Detection
    6
    Customer Support
    5
    Ease of Use
    5
    Features
    5
    Cons
    Expensive
    2
    Learning Curve
    2
    Complexity
    1
    Complex UI
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.6
    8.8
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
Glasstrail Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Vulnerability Detection
6
Customer Support
5
Ease of Use
5
Features
5
Cons
Expensive
2
Learning Curve
2
Complexity
1
Complex UI
1
False Positives
1
Glasstrail features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.6
8.8
Ease of Admin
Average: 9.0
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
(83)4.5 out of 5
16th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Automation
    23
    Vulnerability Identification
    23
    Automation Testing
    19
    Features
    16
    Cons
    Limited Scope
    8
    Missing Features
    8
    Limited Features
    7
    Complexity
    6
    Expensive
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RidgeBot features and usability ratings that predict user satisfaction
    9.1
    Vulnerability Intelligence
    Average: 8.9
    8.8
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,280 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 46% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Automation
23
Vulnerability Identification
23
Automation Testing
19
Features
16
Cons
Limited Scope
8
Missing Features
8
Limited Features
7
Complexity
6
Expensive
6
RidgeBot features and usability ratings that predict user satisfaction
9.1
Vulnerability Intelligence
Average: 8.9
8.8
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,280 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Notus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Easy Integrations
    9
    Time-saving
    9
    Customer Support
    8
    Visibility
    6
    Cons
    Bugs
    3
    Insufficient Training
    3
    Integration Issues
    2
    Learning Curve
    2
    Poor Documentation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.9
    Continuous Monitoring
    Average: 9.0
    9.6
    Compliance Monitoring
    Average: 8.6
    8.5
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Easy Integrations
9
Time-saving
9
Customer Support
8
Visibility
6
Cons
Bugs
3
Insufficient Training
3
Integration Issues
2
Learning Curve
2
Poor Documentation
2
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.9
Continuous Monitoring
Average: 9.0
9.6
Compliance Monitoring
Average: 8.6
8.5
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
(44)4.6 out of 5
24th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Cyber Risk Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Risk Management
    6
    Assessment Process
    5
    Helpful
    5
    Ease of Use
    4
    Cons
    Poor Notifications
    3
    Delay Issues
    2
    Improvement Needed
    2
    Learning Curve
    2
    Vendor Management
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight Cyber Risk Intelligence features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 30% Mid-Market
Bitsight Cyber Risk Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Risk Management
6
Assessment Process
5
Helpful
5
Ease of Use
4
Cons
Poor Notifications
3
Delay Issues
2
Improvement Needed
2
Learning Curve
2
Vendor Management
2
Bitsight Cyber Risk Intelligence features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,462 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saner CVEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Ease of Use
    22
    Features
    19
    Customer Support
    16
    Patch Management
    14
    Cons
    Integration Issues
    8
    Expensive
    7
    Missing Features
    6
    Slow Performance
    6
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 8.9
    9.0
    Continuous Monitoring
    Average: 9.0
    9.0
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Small-Business
  • 39% Mid-Market
Saner CVEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Ease of Use
22
Features
19
Customer Support
16
Patch Management
14
Cons
Integration Issues
8
Expensive
7
Missing Features
6
Slow Performance
6
Learning Curve
5
Saner CVEM features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 8.9
9.0
Continuous Monitoring
Average: 9.0
9.0
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 9.0
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(37)4.7 out of 5
11th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darwin Attack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Vulnerability Identification
    8
    Remediation Efficiency
    7
    Remediation Solutions
    6
    Communication
    5
    Cons
    Poor Notifications
    2
    Authentication Issues
    1
    Difficult Navigation
    1
    Filtering Problems
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darwin Attack features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 8.9
    8.0
    Continuous Monitoring
    Average: 9.0
    9.0
    Compliance Monitoring
    Average: 8.6
    9.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chicago, Illinois
    Twitter
    @theevolvesec
    802 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 19% Small-Business
Darwin Attack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Vulnerability Identification
8
Remediation Efficiency
7
Remediation Solutions
6
Communication
5
Cons
Poor Notifications
2
Authentication Issues
1
Difficult Navigation
1
Filtering Problems
1
Inadequate Remediation
1
Darwin Attack features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 8.9
8.0
Continuous Monitoring
Average: 9.0
9.0
Compliance Monitoring
Average: 8.6
9.3
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
802 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(37)4.6 out of 5
22nd Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at $2,500.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. Continuously discover, prioritize, and mitigate exposures with evidence-backed Attack Surface Management,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Breachlock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Pentesting Efficiency
    9
    Communication
    8
    Ease of Use
    6
    Reporting Quality
    6
    Cons
    False Positives
    5
    Lack of Detail
    3
    Poor Interface Design
    3
    Expensive
    2
    Inadequate Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Breachlock features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.1
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    New York, NY
    Twitter
    @BreachLock
    261 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. Continuously discover, prioritize, and mitigate exposures with evidence-backed Attack Surface Management,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 38% Mid-Market
Breachlock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Pentesting Efficiency
9
Communication
8
Ease of Use
6
Reporting Quality
6
Cons
False Positives
5
Lack of Detail
3
Poor Interface Design
3
Expensive
2
Inadequate Reporting
2
Breachlock features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.1
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2019
HQ Location
New York, NY
Twitter
@BreachLock
261 Twitter followers
LinkedIn® Page
www.linkedin.com
120 employees on LinkedIn®
(51)4.5 out of 5
21st Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at €82.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Detectify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Automation Testing
    3
    Automated Scanning
    2
    Customizability
    2
    Features
    2
    Cons
    Expensive
    2
    Complexity
    1
    Complex Queries
    1
    Complex Setup
    1
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.6
    8.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Automation Testing
3
Automated Scanning
2
Customizability
2
Features
2
Cons
Expensive
2
Complexity
1
Complex Queries
1
Complex Setup
1
Inaccuracy
1
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.6
8.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,354 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
(58)4.3 out of 5
7th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VIPRE Endpoint Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    1
    Antivirus Software
    1
    Ease of Use
    1
    Easy Installation
    1
    Easy Setup
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    5.0
    Compliance Monitoring
    Average: 8.6
    8.5
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
1
Antivirus Software
1
Ease of Use
1
Easy Installation
1
Easy Setup
1
Cons
This product has not yet received any negative sentiments.
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
5.0
Compliance Monitoring
Average: 8.6
8.5
Ease of Admin
Average: 9.0
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
(26)4.3 out of 5
23rd Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    9
    Threat Detection
    8
    Vulnerability Identification
    8
    Ease of Use
    7
    Features
    7
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    8.6
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
9
Threat Detection
8
Vulnerability Identification
8
Ease of Use
7
Features
7
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Complexity
2
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
8.6
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(13)4.9 out of 5
17th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cavelo helps businesses achieve attack surface management with automated data discovery, classification and reporting. Its cloud compatible cyber asset attack surface management (CAASM) platform conti

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cavelo features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cavelo
    Year Founded
    2021
    HQ Location
    Kitchener, CA
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cavelo helps businesses achieve attack surface management with automated data discovery, classification and reporting. Its cloud compatible cyber asset attack surface management (CAASM) platform conti

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 38% Small-Business
Cavelo features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
0.0
No information available
0.0
No information available
8.9
Ease of Admin
Average: 9.0
Seller Details
Seller
Cavelo
Year Founded
2021
HQ Location
Kitchener, CA
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Small-Business
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CODA Footprint features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 9.0
    9.0
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Greater Boston Area, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Small-Business
  • 18% Mid-Market
CODA Footprint features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 9.0
9.0
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2015
HQ Location
Greater Boston Area, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Features
    7
    Security
    6
    Ease of Use
    5
    Pentesting Efficiency
    5
    Cons
    Slow Performance
    2
    Slow Scanning
    2
    Bugs
    1
    Difficult Setup
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Features
7
Security
6
Ease of Use
5
Pentesting Efficiency
5
Cons
Slow Performance
2
Slow Scanning
2
Bugs
1
Difficult Setup
1
Inadequate Reporting
1
Edgescan features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    11
    Vulnerability Detection
    11
    Vulnerability Identification
    9
    Ease of Use
    8
    Monitoring
    7
    Cons
    Cloud Dependency
    1
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Vulnerability Intelligence
    Average: 8.9
    9.7
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    34 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
11
Vulnerability Detection
11
Vulnerability Identification
9
Ease of Use
8
Monitoring
7
Cons
Cloud Dependency
1
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Inefficient Alert System
1
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Vulnerability Intelligence
Average: 8.9
9.7
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
34 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.0
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HostedScan.com Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Affordable
    1
    Alert Notifications
    1
    Cloud Services
    1
    Communication
    1
    Cons
    Excessive Notifications
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Affordable
1
Alert Notifications
1
Cloud Services
1
Communication
1
Cons
Excessive Notifications
1
Limited Features
1
HostedScan.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Offensity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Dashboard Usability
    1
    Ease of Use
    1
    Features
    1
    Innovation
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Offensity features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    7.2
    Continuous Monitoring
    Average: 9.0
    7.8
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Offensity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Dashboard Usability
1
Ease of Use
1
Features
1
Innovation
1
Cons
This product has not yet received any negative sentiments.
Offensity features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
7.2
Continuous Monitoring
Average: 9.0
7.8
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
266 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.9
    Compliance Monitoring
    Average: 8.6
    9.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    586 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.9
Compliance Monitoring
Average: 8.6
9.3
Ease of Admin
Average: 9.0
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
586 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Ranger is a real-time network attack surface control solution that finds and fingerprints all IP-enabled devices on your network, to deliver global visibility with zero additional agents,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Network Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    Detection
    1
    Easy Setup
    1
    Efficiency Improvement
    1
    Cons
    Expensive
    2
    Complex Setup
    1
    False Positives
    1
    Limited Customization
    1
    Poor Support Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Network Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 9.0
    8.9
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Ranger is a real-time network attack surface control solution that finds and fingerprints all IP-enabled devices on your network, to deliver global visibility with zero additional agents,

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
SentinelOne Singularity Network Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
Detection
1
Easy Setup
1
Efficiency Improvement
1
Cons
Expensive
2
Complex Setup
1
False Positives
1
Limited Customization
1
Poor Support Management
1
SentinelOne Singularity Network Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 9.0
8.9
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Brinqa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    2
    Coverage Effectiveness
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Security
    1
    Cons
    Cloud Dependency
    1
    Complex Setup
    1
    Difficult Learning
    1
    Information Management
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brinqa features and usability ratings that predict user satisfaction
    3.9
    Vulnerability Intelligence
    Average: 8.9
    6.7
    Continuous Monitoring
    Average: 9.0
    4.4
    Compliance Monitoring
    Average: 8.6
    5.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    brinqa
    Year Founded
    2009
    HQ Location
    Austin, TX
    Twitter
    @brinqa
    487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 19% Mid-Market
Brinqa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
2
Coverage Effectiveness
1
Customer Support
1
Cybersecurity
1
Data Security
1
Cons
Cloud Dependency
1
Complex Setup
1
Difficult Learning
1
Information Management
1
Learning Curve
1
Brinqa features and usability ratings that predict user satisfaction
3.9
Vulnerability Intelligence
Average: 8.9
6.7
Continuous Monitoring
Average: 9.0
4.4
Compliance Monitoring
Average: 8.6
5.2
Ease of Admin
Average: 9.0
Seller Details
Seller
brinqa
Year Founded
2009
HQ Location
Austin, TX
Twitter
@brinqa
487 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Features
    1
    Cons
    CDN Limitations
    1
    Difficult Setup
    1
    Hidden Costs
    1
    Inflexible Pricing
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgio
    Year Founded
    2001
    HQ Location
    Scottsdale, Arizona
    LinkedIn® Page
    www.linkedin.com
    719 employees on LinkedIn®
    Ownership
    NASDAQ:LLNW
    Total Revenue (USD mm)
    $200
Product Description
How are these determined?Information
This description is provided by the seller.

Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Edgio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Features
1
Cons
CDN Limitations
1
Difficult Setup
1
Hidden Costs
1
Inflexible Pricing
1
Integration Issues
1
Edgio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.3
Ease of Admin
Average: 9.0
Seller Details
Seller
Edgio
Year Founded
2001
HQ Location
Scottsdale, Arizona
LinkedIn® Page
www.linkedin.com
719 employees on LinkedIn®
Ownership
NASDAQ:LLNW
Total Revenue (USD mm)
$200
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    2
    Automation
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Discovery
    1
    Cons
    Lack of Automation
    1
    Lack of Integration
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    3.3
    Compliance Monitoring
    Average: 8.6
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Palo Alto, California
    Twitter
    @ArmisSecurity
    2,702 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Mid-Market
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
2
Automation
1
Customer Support
1
Cybersecurity
1
Data Discovery
1
Cons
Lack of Automation
1
Lack of Integration
1
Missing Features
1
Armis features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
3.3
Compliance Monitoring
Average: 8.6
8.3
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2015
HQ Location
Palo Alto, California
Twitter
@ArmisSecurity
2,702 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    4
    Visibility
    3
    Features
    2
    Innovation
    2
    Risk Management
    2
    Cons
    Complex UI
    1
    Dashboard Issues
    1
    Expensive
    1
    Inadequate Security
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
    9.3
    Vulnerability Intelligence
    Average: 8.9
    9.3
    Continuous Monitoring
    Average: 9.0
    7.7
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @RedHuntLabs
    3,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
4
Visibility
3
Features
2
Innovation
2
Risk Management
2
Cons
Complex UI
1
Dashboard Issues
1
Expensive
1
Inadequate Security
1
Inefficient Alert System
1
RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
9.3
Vulnerability Intelligence
Average: 8.9
9.3
Continuous Monitoring
Average: 9.0
7.7
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Seller Details
Twitter
@RedHuntLabs
3,617 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JupiterOne Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Technology
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JupiterOne features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Morrisville, North Carolina
    LinkedIn® Page
    www.linkedin.com
    171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
JupiterOne Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Technology
1
Security
1
Cons
This product has not yet received any negative sentiments.
JupiterOne features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 9.0
Seller Details
HQ Location
Morrisville, North Carolina
LinkedIn® Page
www.linkedin.com
171 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Maltego Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    2
    Artificial Intelligence
    1
    Data Protection
    1
    Detailed Analysis
    1
    Easy Integrations
    1
    Cons
    Access Limitations
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    13,804 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
2
Artificial Intelligence
1
Data Protection
1
Detailed Analysis
1
Easy Integrations
1
Cons
Access Limitations
1
Maltego features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
0.0
No information available
0.0
No information available
9.2
Ease of Admin
Average: 9.0
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
13,804 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
(8)5.0 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    By combining automation with expert-driven human testing, Sprocket Security delivers Continuous Penetration Testing to help businesses continuously validate their security posture and resilience. This

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 13% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sprocket Security features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Madison, US
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

By combining automation with expert-driven human testing, Sprocket Security delivers Continuous Penetration Testing to help businesses continuously validate their security posture and resilience. This

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 13% Enterprise
Sprocket Security features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2017
HQ Location
Madison, US
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As the SAP-endorsed and most widely used solution to protect SAP, the Onapsis Platform empowers Cybersecurity and SAP teams with automated compliance, vulnerability management, threat detection, and s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • The Onapsis Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Cloud Management
    1
    Compliance
    1
    Customer Support
    1
    Implementation Ease
    1
    Cons
    Expensive
    2
    Poor UI
    2
    UX Design
    2
    UX Improvement
    2
    Slow Loading
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The Onapsis Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Onapsis
    Year Founded
    2009
    HQ Location
    Boston, Massachusetts
    Twitter
    @onapsis
    4,490 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    360 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

As the SAP-endorsed and most widely used solution to protect SAP, the Onapsis Platform empowers Cybersecurity and SAP teams with automated compliance, vulnerability management, threat detection, and s

Users
No information available
Industries
No information available
Market Segment
  • 43% Enterprise
  • 43% Mid-Market
The Onapsis Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Cloud Management
1
Compliance
1
Customer Support
1
Implementation Ease
1
Cons
Expensive
2
Poor UI
2
UX Design
2
UX Improvement
2
Slow Loading
1
The Onapsis Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Onapsis
Year Founded
2009
HQ Location
Boston, Massachusetts
Twitter
@onapsis
4,490 Twitter followers
LinkedIn® Page
www.linkedin.com
360 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Truzta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    18
    Customer Support
    15
    Compliance Support
    10
    Compliance
    9
    Ease of Use
    9
    Cons
    Login Issues
    2
    Technical Glitches
    2
    Bugs
    1
    Complex Setup
    1
    Complex UI
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Truzta features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 35% Mid-Market
Truzta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
18
Customer Support
15
Compliance Support
10
Compliance
9
Ease of Use
9
Cons
Login Issues
2
Technical Glitches
2
Bugs
1
Complex Setup
1
Complex UI
1
Truzta features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Company Website
Year Founded
2021
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Axonius is the cybersecurity asset management platform that lets IT and Security teams see devices for what they are in order to manage and secure all.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Axonius Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    2
    Useful
    2
    Ease of Use
    1
    Easy Setup
    1
    Features
    1
    Cons
    Filtering Problems
    1
    Improvements Needed
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axonius features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    6.7
    Compliance Monitoring
    Average: 8.6
    7.8
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Axonius
    Year Founded
    2017
    HQ Location
    New York, NY
    Twitter
    @AxoniusInc
    1,813 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    580 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Axonius is the cybersecurity asset management platform that lets IT and Security teams see devices for what they are in order to manage and secure all.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Axonius Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
2
Useful
2
Ease of Use
1
Easy Setup
1
Features
1
Cons
Filtering Problems
1
Improvements Needed
1
Missing Features
1
Axonius features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
6.7
Compliance Monitoring
Average: 8.6
7.8
Ease of Admin
Average: 9.0
Seller Details
Seller
Axonius
Year Founded
2017
HQ Location
New York, NY
Twitter
@AxoniusInc
1,813 Twitter followers
LinkedIn® Page
www.linkedin.com
580 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Censys Attack Surface Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Cons
    Data Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censys Attack Surface Management features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censys
    Year Founded
    2017
    HQ Location
    Ann Arbor, MI
    Twitter
    @censysio
    10,142 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize,

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Censys Attack Surface Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Cons
Data Management
1
Censys Attack Surface Management features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Seller Details
Seller
Censys
Year Founded
2017
HQ Location
Ann Arbor, MI
Twitter
@censysio
10,142 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(5)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyCognito features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, US
    Twitter
    @CyCognito
    10,545 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
CyCognito features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
CyCognito
Company Website
Year Founded
2017
HQ Location
Palo Alto, US
Twitter
@CyCognito
10,545 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Halo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Automation
    1
    Cloud Management
    1
    Ease of Use
    1
    Features
    1
    Cons
    Expensive
    1
    Slow Scanning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Halo Security features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    7.8
    Compliance Monitoring
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Miami Beach, US
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Halo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Automation
1
Cloud Management
1
Ease of Use
1
Features
1
Cons
Expensive
1
Slow Scanning
1
Halo Security features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
7.8
Compliance Monitoring
Average: 8.6
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Miami Beach, US
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ImmuniWeb Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    1
    Detection
    1
    Monitoring
    1
    Monitoring Efficiency
    1
    Vulnerability Detection
    1
    Cons
    Limited Flexibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    N/A
    Twitter
    @immuniweb
    8,577 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ImmuniWeb Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
1
Detection
1
Monitoring
1
Monitoring Efficiency
1
Vulnerability Detection
1
Cons
Limited Flexibility
1
ImmuniWeb Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
N/A
Twitter
@immuniweb
8,577 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatConnect RQ is the only data-driven, automated cyber risk quantification product that prioritizes security initiatives by their financial risk reduction. RQ leverages industry data (loss and tech

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect Risk Quantifier Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Easy Integrations
    1
    Platform Usability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect Risk Quantifier features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,337 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatConnect RQ is the only data-driven, automated cyber risk quantification product that prioritizes security initiatives by their financial risk reduction. RQ leverages industry data (loss and tech

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
ThreatConnect Risk Quantifier Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Easy Integrations
1
Platform Usability
1
Security
1
Cons
This product has not yet received any negative sentiments.
ThreatConnect Risk Quantifier features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
8.3
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,337 Twitter followers
LinkedIn® Page
www.linkedin.com
167 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Build your own SOC with our advanced cybersecurity platform - DefenceScout

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DefenceScout Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Easy Integrations
    1
    Features
    1
    Real-time Notifications
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DefenceScout features and usability ratings that predict user satisfaction
    7.5
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    7.5
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Trivandrum, IN
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Build your own SOC with our advanced cybersecurity platform - DefenceScout

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
DefenceScout Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Easy Integrations
1
Features
1
Real-time Notifications
1
Cons
This product has not yet received any negative sentiments.
DefenceScout features and usability ratings that predict user satisfaction
7.5
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
7.5
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2021
HQ Location
Trivandrum, IN
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM). FireCompass continuously indexes and monitors the deep, dark, and surface webs using nat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FireCompass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring Efficiency
    1
    Security
    1
    Cons
    Bugs
    1
    Technical Glitches
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FireCompass features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Boston, Massachusetts, United States
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM). FireCompass continuously indexes and monitors the deep, dark, and surface webs using nat

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
FireCompass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring Efficiency
1
Security
1
Cons
Bugs
1
Technical Glitches
1
FireCompass features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2019
HQ Location
Boston, Massachusetts, United States
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortifyData Continuous Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Deployment Ease
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    6.7
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Kennesaw, Georgia
    Twitter
    @fortifydata
    87 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
FortifyData Continuous Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Deployment Ease
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Cons
This product has not yet received any negative sentiments.
FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
6.7
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2015
HQ Location
Kennesaw, Georgia
Twitter
@fortifydata
87 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hacknoid features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hacknoid
    Year Founded
    2013
    HQ Location
    Montevideo, UY
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Hacknoid features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Hacknoid
Year Founded
2013
HQ Location
Montevideo, UY
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Holm Security VMP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Aware
    1
    Awareness Increase
    1
    Innovation
    1
    Scanning Efficiency
    1
    Cons
    False Positives
    1
    Scanning Issues
    1
    Technical Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Aware
1
Awareness Increase
1
Innovation
1
Scanning Efficiency
1
Cons
False Positives
1
Scanning Issues
1
Technical Issues
1
Holm Security VMP features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.7
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
Entry Level Price:Starting at $129.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panop is a Extended Security Posture Management Platform It enables customers to understand in minutes their degree of exposure to external attacks, classify the findings according to their risk appe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Panop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Vulnerability Detection
    2
    Communication
    1
    Customization
    1
    Detection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Panop features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Panop SA
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Panop is a Extended Security Posture Management Platform It enables customers to understand in minutes their degree of exposure to external attacks, classify the findings according to their risk appe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Panop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Vulnerability Detection
2
Communication
1
Customization
1
Detection
1
Cons
This product has not yet received any negative sentiments.
Panop features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Panop SA
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quantum Armor features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @SilentBreach
    4,839 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
Quantum Armor features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
New York, NY
Twitter
@SilentBreach
4,839 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MazeBolt RADAR is a patented DDoS Vulnerability Management solution. Using thousands of non-disruptive DDoS attack simulations and without affecting online services, RADAR identifies and enables the r

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RADAR™ features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Ramat Gan, IL
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MazeBolt RADAR is a patented DDoS Vulnerability Management solution. Using thousands of non-disruptive DDoS attack simulations and without affecting online services, RADAR identifies and enables the r

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
RADAR™ features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2013
HQ Location
Ramat Gan, IL
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Reposify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    User Interface
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Reposify features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Reposify
    HQ Location
    San Francisco, California
    Twitter
    @reposify
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Reposify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
User Interface
1
Cons
Expensive
1
Reposify features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Admin
Average: 9.0
Seller Details
Seller
Reposify
HQ Location
San Francisco, California
Twitter
@reposify
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Lumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Focus
    1
    Monitoring
    1
    Reporting
    1
    Cons
    Expensive
    1
    Integration Issues
    1
    Poor Visibility
    1
    Pricing Issues
    1
    Risk Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Lumin features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Tenable Lumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Focus
1
Monitoring
1
Reporting
1
Cons
Expensive
1
Integration Issues
1
Poor Visibility
1
Pricing Issues
1
Risk Management
1
Tenable Lumin features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
8.3
Ease of Admin
Average: 9.0
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Security
    1
    Threat Detection
    1
    Vulnerability Detection
    1
    Cons
    Limited Features
    2
    Asset Management
    1
    Complexity
    1
    Limited Detection
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable OT Security features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    5.0
    Compliance Monitoring
    Average: 8.6
    7.5
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tenable OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Security
1
Threat Detection
1
Vulnerability Detection
1
Cons
Limited Features
2
Asset Management
1
Complexity
1
Limited Detection
1
Missing Features
1
Tenable OT Security features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
5.0
Compliance Monitoring
Average: 8.6
7.5
Ease of Admin
Average: 9.0
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Araali Network Security Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    API Integration
    1
    Detection Efficiency
    1
    Integrations
    1
    Onboarding
    1
    Cons
    Complex Coding
    1
    Delayed Detection
    1
    Ineffective Alerts
    1
    Inefficient Alert System
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
API Integration
1
Detection Efficiency
1
Integrations
1
Onboarding
1
Cons
Complex Coding
1
Delayed Detection
1
Ineffective Alerts
1
Inefficient Alert System
1
Network Issues
1
Araali Network Security Pro features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brandefense is a proactive digital risk protection solution for organizations. Our AI-driven technology constantly scans the online world, including the dark, deep and surface web, to discover unknown

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Brandefense Digital Risk Protection Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Centralization
    1
    Detailed Analysis
    1
    Ease of Use
    1
    Monitoring
    1
    Monitoring Efficiency
    1
    Cons
    Bugs
    1
    Update Issues
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brandefense Digital Risk Protection Platform features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Wilmington, Delaware
    Twitter
    @Brandefense
    1,061 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Brandefense is a proactive digital risk protection solution for organizations. Our AI-driven technology constantly scans the online world, including the dark, deep and surface web, to discover unknown

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Brandefense Digital Risk Protection Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Centralization
1
Detailed Analysis
1
Ease of Use
1
Monitoring
1
Monitoring Efficiency
1
Cons
Bugs
1
Update Issues
1
UX Improvement
1
Brandefense Digital Risk Protection Platform features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2018
HQ Location
Wilmington, Delaware
Twitter
@Brandefense
1,061 Twitter followers
LinkedIn® Page
www.linkedin.com
61 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    cDFN WatchTower is a CAASM (Cyber Asset Attack Surface Management) solution that integrates risk-based vulnerability management, external attack surface monitoring, dark web surveillance, vendor risk

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • cloudDFN cDFN WatchTower Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dark Web Monitoring
    1
    Helpful
    1
    Monitoring
    1
    Monitoring Efficiency
    1
    Response Time
    1
    Cons
    Complex Navigation
    1
    Dashboard Issues
    1
    Difficult Navigation
    1
    Poor Navigation
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • cloudDFN cDFN WatchTower features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    cloudDFN
    Year Founded
    2019
    HQ Location
    Thane, IN
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

cDFN WatchTower is a CAASM (Cyber Asset Attack Surface Management) solution that integrates risk-based vulnerability management, external attack surface monitoring, dark web surveillance, vendor risk

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
cloudDFN cDFN WatchTower Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dark Web Monitoring
1
Helpful
1
Monitoring
1
Monitoring Efficiency
1
Response Time
1
Cons
Complex Navigation
1
Dashboard Issues
1
Difficult Navigation
1
Poor Navigation
1
UX Improvement
1
cloudDFN cDFN WatchTower features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
cloudDFN
Year Founded
2019
HQ Location
Thane, IN
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CybelAngel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    2
    Accuracy of Information
    1
    Actionable Intelligence
    1
    Alert Notifications
    1
    Communication
    1
    Cons
    False Positives
    1
    Poor Detection Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CybelAngel features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Paris, FR
    Twitter
    @CybelAngel
    3,442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
CybelAngel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
2
Accuracy of Information
1
Actionable Intelligence
1
Alert Notifications
1
Communication
1
Cons
False Positives
1
Poor Detection Performance
1
CybelAngel features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Admin
Average: 9.0
Seller Details
Year Founded
2013
HQ Location
Paris, FR
Twitter
@CybelAngel
3,442 Twitter followers
LinkedIn® Page
www.linkedin.com
169 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Informer's Attack Surface Management (ASM) and Pentesting platform helps CISOs, CTOs and IT teams map external assets and identify vulnerabilities in real-time so they can be remediated before attacke

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Informer Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    1
    Scanning Efficiency
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Informer features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Informer
    Year Founded
    2014
    HQ Location
    Brighton, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Informer's Attack Surface Management (ASM) and Pentesting platform helps CISOs, CTOs and IT teams map external assets and identify vulnerabilities in real-time so they can be remediated before attacke

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Informer Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
1
Scanning Efficiency
1
Security
1
Cons
This product has not yet received any negative sentiments.
Informer features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Informer
Year Founded
2014
HQ Location
Brighton, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iRisk Platform features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    6.7
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    C2SEC
    Year Founded
    2016
    HQ Location
    Redmond, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
iRisk Platform features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
6.7
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
8.3
Ease of Admin
Average: 9.0
Seller Details
Seller
C2SEC
Year Founded
2016
HQ Location
Redmond, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lucidum is an attack surface management platform that uses proprietary Machine Learning to discover, identify, and classify all of your assets, users, and data. We help you find your risk factors, foc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lucidum - Attack Surface Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lucidum
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Lucidum is an attack surface management platform that uses proprietary Machine Learning to discover, identify, and classify all of your assets, users, and data. We help you find your risk factors, foc

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Lucidum - Attack Surface Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Lucidum
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack Surface Management Discover and analyze internet assets across today’s dynamic, distributed and shared environments. Continually monitor discovered assets for exposures and enable intelligence

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Manidant Attack surface management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    Search Difficulties
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Manidant Attack surface management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,061 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Attack Surface Management Discover and analyze internet assets across today’s dynamic, distributed and shared environments. Continually monitor discovered assets for exposures and enable intelligence

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Manidant Attack surface management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
Search Difficulties
1
Manidant Attack surface management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,061 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Red Sift ASM (Attack Surface Management), you can continuously discover, inventory and manage your business’s critical external-facing and cloud assets. With Red Sift ASM, you: 1) Get complete v

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Red Sift ASM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Automation Testing
    1
    Comprehensive Monitoring
    1
    Detection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Sift ASM features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Sift
    Year Founded
    2015
    HQ Location
    London, England, United Kingdom
    Twitter
    @redsift
    1,311 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    114 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Red Sift ASM (Attack Surface Management), you can continuously discover, inventory and manage your business’s critical external-facing and cloud assets. With Red Sift ASM, you: 1) Get complete v

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Red Sift ASM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Automation Testing
1
Comprehensive Monitoring
1
Detection
1
Cons
This product has not yet received any negative sentiments.
Red Sift ASM features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
0.0
No information available
Seller Details
Seller
Red Sift
Year Founded
2015
HQ Location
London, England, United Kingdom
Twitter
@redsift
1,311 Twitter followers
LinkedIn® Page
www.linkedin.com
114 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Synack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    1
    Vulnerability Identification
    1
    Cons
    Asset Management
    1
    Poor Management
    1
    Poor Security Management
    1
    Poor Support Management
    1
    Security Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Synack features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Synack
    Twitter
    @synack
    26,896 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategi

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
Synack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
1
Vulnerability Identification
1
Cons
Asset Management
1
Poor Management
1
Poor Security Management
1
Poor Support Management
1
Security Issues
1
Synack features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Synack
Twitter
@synack
26,896 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Attack Surface Management features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    6.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Tenable Attack Surface Management features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
6.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tromzo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Dashboard Design
    1
    Easy Integrations
    1
    Integration Capabilities
    1
    Cons
    Complex UI
    1
    Limited Features
    1
    Poor UI Design
    1
    Slow Loading
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tromzo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tromzo
    Year Founded
    2021
    HQ Location
    Mountain View, CA
    Twitter
    @TromzoSecurity
    128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Tromzo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Dashboard Design
1
Easy Integrations
1
Integration Capabilities
1
Cons
Complex UI
1
Limited Features
1
Poor UI Design
1
Slow Loading
1
Slow Performance
1
Tromzo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.9
Ease of Admin
Average: 9.0
Seller Details
Seller
Tromzo
Year Founded
2021
HQ Location
Mountain View, CA
Twitter
@TromzoSecurity
128 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. By continuously uncovering hidden attack paths to businesses’ critical assets

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • XM Cyber Exposure Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    XM Cyber
    Year Founded
    2016
    HQ Location
    Tel Aviv-Yafo, IL
    Twitter
    @XMCyber_
    3,236 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    398 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. By continuously uncovering hidden attack paths to businesses’ critical assets

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
XM Cyber Exposure Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
XM Cyber
Year Founded
2016
HQ Location
Tel Aviv-Yafo, IL
Twitter
@XMCyber_
3,236 Twitter followers
LinkedIn® Page
www.linkedin.com
398 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aptori autonomously tests your APIs to ensure security, compliance, and availability. Our proprietary Semantic Reasoning Platform uses AI to construct a semantic model of your API and autonomously int

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aptori Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Capabilities
    1
    Cons
    Complexity
    1
    Poor UI
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aptori features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Aptori
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Aptori autonomously tests your APIs to ensure security, compliance, and availability. Our proprietary Semantic Reasoning Platform uses AI to construct a semantic model of your API and autonomously int

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Aptori Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Capabilities
1
Cons
Complexity
1
Poor UI
1
Aptori features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Aptori
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scout provides organizations with continuous, automated, and comprehensive coverage of their organization’s attack surface from the perspective of an attacker. It focuses on discovering assets and fac

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • arctonyx Scout features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    arctonyx
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scout provides organizations with continuous, automated, and comprehensive coverage of their organization’s attack surface from the perspective of an attacker. It focuses on discovering assets and fac

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
arctonyx Scout features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
arctonyx
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ArmorCode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    2
    Centralization
    1
    Cloud Management
    1
    Coverage Effectiveness
    1
    Cybersecurity
    1
    Cons
    Inadequate Reporting
    1
    Information Management
    1
    Information Overload
    1
    Limited Customization
    1
    Needs Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ArmorCode features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ArmorCode
    Year Founded
    2020
    HQ Location
    Palo Alto, California, United States
    LinkedIn® Page
    www.linkedin.com
    173 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
ArmorCode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
2
Centralization
1
Cloud Management
1
Coverage Effectiveness
1
Cybersecurity
1
Cons
Inadequate Reporting
1
Information Management
1
Information Overload
1
Limited Customization
1
Needs Improvement
1
ArmorCode features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Admin
Average: 9.0
Seller Details
Seller
ArmorCode
Year Founded
2020
HQ Location
Palo Alto, California, United States
LinkedIn® Page
www.linkedin.com
173 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Assetnote automatically maps your external assets and monitors them for changes and security issues to help prevent serious breaches.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AssetNote features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AssetNote
    HQ Location
    Brisbane, Australia
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Assetnote automatically maps your external assets and monitors them for changes and security issues to help prevent serious breaches.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AssetNote features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AssetNote
HQ Location
Brisbane, Australia
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
Entry Level Price:$129.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Attaxion EASM Platform is designed to provide businesses with full visibility over their external attack surfaces. It offers features like asset discovery, risk prioritization, and continuous moni

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Attaxion EASM Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Attaxion
    Year Founded
    2024
    HQ Location
    8 The Green, STE A, Dover, DE 19901, USA
    Twitter
    @attaxion
    12 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Attaxion EASM Platform is designed to provide businesses with full visibility over their external attack surfaces. It offers features like asset discovery, risk prioritization, and continuous moni

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Attaxion EASM Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Attaxion
Year Founded
2024
HQ Location
8 The Green, STE A, Dover, DE 19901, USA
Twitter
@attaxion
12 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Balbix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Design
    1
    Dashboard Usability
    1
    Cons
    Risk Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Design
1
Dashboard Usability
1
Cons
Risk Management
1
Balbix features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 9.0
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and applicatio

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bishop Fox features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BishopFox
    Year Founded
    2005
    LinkedIn® Page
    linkedin.com
    381 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bishop Fox is the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and applicatio

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Bishop Fox features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BishopFox
Year Founded
2005
LinkedIn® Page
linkedin.com
381 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Your company has internet-accessible technology. Domain names, subdomains, IP address, servers, web pages – things that anyone can access on the internet. We discover every little bit of that for you.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bit Discovery features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Santa Clara, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Your company has internet-accessible technology. Domain names, subdomains, IP address, servers, web pages – things that anyone can access on the internet. We discover every little bit of that for you.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Bit Discovery features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Santa Clara, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Ceeyu SaaS platform periodically performs automated scans and risk analysis of the digital footprint of companies (aka Attack Surface Management or ASM) and their suppliers or partners (aka Third

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ceeyu features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ceeyu.io
    Year Founded
    2020
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Ceeyu SaaS platform periodically performs automated scans and risk analysis of the digital footprint of companies (aka Attack Surface Management or ASM) and their suppliers or partners (aka Third

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Ceeyu features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ceeyu.io
Year Founded
2020
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chariot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Chariot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@praetorianlabs
8,283 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identify the Security Score associated with any Android Mobile App on your phone.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK BeVigil features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Identify the Security Score associated with any Android Mobile App on your phone.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CloudSEK BeVigil features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,253 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Criminal IP Attack Surface Management solution that helps you proactively understand your cyber space's security posture by automatically detecting and monitoring all your cyber assets, while leveragi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Criminal IP ASM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AI Spera
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Criminal IP Attack Surface Management solution that helps you proactively understand your cyber space's security posture by automatically detecting and monitoring all your cyber assets, while leveragi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Criminal IP ASM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
AI Spera
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Empower your organization with unmatched protection, proactively safeguarding every step from inception to implementation.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Attack Surface Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Bangalore, IN
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Empower your organization with unmatched protection, proactively safeguarding every step from inception to implementation.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cyber Attack Surface Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Bangalore, IN
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyberShield360 is an advanced and comprehensive Penetration Testing and Attack Surface Management (ASM) product designed to safeguard modern organizations from cyber threats by proactively identifying

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberShield360 features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Invia
    Year Founded
    2007
    HQ Location
    Macquarie Park, New South Wales
    Twitter
    @Invia_Ltd
    8 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    116 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyberShield360 is an advanced and comprehensive Penetration Testing and Attack Surface Management (ASM) product designed to safeguard modern organizations from cyber threats by proactively identifying

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CyberShield360 features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Invia
Year Founded
2007
HQ Location
Macquarie Park, New South Wales
Twitter
@Invia_Ltd
8 Twitter followers
LinkedIn® Page
www.linkedin.com
116 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cybersixgill Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    2
    Detailed Information
    2
    Actionable Intelligence
    1
    Customer Support
    1
    Customizability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybersixgill features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Cybersixgill Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
2
Detailed Information
2
Actionable Intelligence
1
Customer Support
1
Customizability
1
Cons
This product has not yet received any negative sentiments.
Cybersixgill features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.7
Ease of Admin
Average: 9.0
Seller Details
Seller
Bitsight
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,462 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYE provides continuous adaptive and proactive assessment of attack surfaces to highlight potential vulnerabilities, delivering an independent evaluation of a customer security posture.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYE
    Twitter
    @CyesecLtd
    1,260 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYE provides continuous adaptive and proactive assessment of attack surfaces to highlight potential vulnerabilities, delivering an independent evaluation of a customer security posture.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CYE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CYE
Twitter
@CyesecLtd
1,260 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive thr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deepinfo Attack Surface Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepinfo
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive thr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Deepinfo Attack Surface Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Deepinfo
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    To help enterprises improve their external cyber security posture and providing 24/7 monitoring of publicly exposed assets, DISCOVERY is intended to compliment security solutions already used within t

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Discovery features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ORYXLABS
    Year Founded
    2020
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

To help enterprises improve their external cyber security posture and providing 24/7 monitoring of publicly exposed assets, DISCOVERY is intended to compliment security solutions already used within t

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Discovery features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ORYXLABS
Year Founded
2020
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Echelon — your cybersecurity check-up solution. Just like a health check-up prevents illness, our AI-driven solution for ongoing cybersecurity audits prevents cyber threats — before they lead to fi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Echelon features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Abu Dhabi, AE
    Twitter
    @laolab_org
    101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Echelon — your cybersecurity check-up solution. Just like a health check-up prevents illness, our AI-driven solution for ongoing cybersecurity audits prevents cyber threats — before they lead to fi

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Echelon features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 9.0
Seller Details
HQ Location
Abu Dhabi, AE
Twitter
@laolab_org
101 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgewatch is an Attack Surface Management Platform that assists companies in discovering, monitoring, and analyzing devices accessible from the Internet. Edgewatch continuously scans public IP address

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EdgeWatch Attack Surface Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgewatch
    Year Founded
    2019
    HQ Location
    Paterna, es
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgewatch is an Attack Surface Management Platform that assists companies in discovering, monitoring, and analyzing devices accessible from the Internet. Edgewatch continuously scans public IP address

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EdgeWatch Attack Surface Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Edgewatch
Year Founded
2019
HQ Location
Paterna, es
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ethiack helps keep companies safe from cybercrime by combining Machine and Human Ethical Hacking for both in-depth and in-breadth security testing.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ethiack features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ethiack
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Ethiack helps keep companies safe from cybercrime by combining Machine and Human Ethical Hacking for both in-depth and in-breadth security testing.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Ethiack features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ethiack
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by u

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Expanse features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.3
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Expanse
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by u

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Expanse features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.3
Ease of Admin
Average: 9.0
Seller Details
Seller
Expanse
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Group-IB Attack Surface Management improves security by continuously discovering all external IT assets, assessing risk using threat intelligence data, and prioritizing issues to enable high-impact re

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Attack Surface Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    8,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Group-IB Attack Surface Management improves security by continuously discovering all external IT assets, assessing risk using threat intelligence data, and prioritizing issues to enable high-impact re

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Group-IB Attack Surface Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Group-IB
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
8,853 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®