Introducing G2.ai, the future of software buying.Try now

Top Free Attack Surface Management Software

Check out our list of free Attack Surface Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Attack Surface Management Software to ensure you get the right product.

View Free Attack Surface Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
42 Attack Surface Management Products Available
(702)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Attack Surface Management software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    8.7
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
8.7
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 9.0
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,406 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(286)4.5 out of 5
Optimized for quick response
19th Easiest To Use in Attack Surface Management software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 32% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    7.8
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abhishek Kumar G.
    AG
    1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
    DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 32% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
7.8
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 9.0
Abhishek Kumar G.
AG
1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(182)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 9.0
    9.2
    Compliance Monitoring
    Average: 8.6
    9.5
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consumer Goods
    EC
    Accurate and actionable results that my staff and I can easily understand and resolve. Intruder.io is constantly updated with the latest... Read review
    David C.
    DC
    Their quality of service and expertise are both of high standard and I'd have no hesitation in recommending to others who are serious about security. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    952 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 9.0
9.2
Compliance Monitoring
Average: 8.6
9.5
Ease of Admin
Average: 9.0
Verified User in Consumer Goods
EC
Accurate and actionable results that my staff and I can easily understand and resolve. Intruder.io is constantly updated with the latest... Read review
David C.
DC
Their quality of service and expertise are both of high standard and I'd have no hesitation in recommending to others who are serious about security. Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
952 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
(108)4.9 out of 5
10th Easiest To Use in Attack Surface Management software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    9.8
    Compliance Monitoring
    Average: 8.6
    9.8
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
9.8
Compliance Monitoring
Average: 8.6
9.8
Ease of Admin
Average: 9.0
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 67% Mid-Market
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.9
    Continuous Monitoring
    Average: 9.0
    9.9
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Krishna Chaitanya P.
    KP
    Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
    Tanuj M.
    TM
    Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    178 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 67% Mid-Market
  • 32% Small-Business
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.9
Continuous Monitoring
Average: 9.0
9.9
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 9.0
Krishna Chaitanya P.
KP
Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
Tanuj M.
TM
Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
178 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 8.9
    9.0
    Continuous Monitoring
    Average: 9.0
    9.0
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
    SV
    I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 8.9
9.0
Continuous Monitoring
Average: 9.0
9.0
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 9.0
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
SV
I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(52)4.8 out of 5
5th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Airlines/Aviation
    Market Segment
    • 44% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    The simplicity of Clousek is what I appreciate most about it. We use CloudSEK's XVigil product for our daily security monitoring. It's easy to get... Read review
    Verified User in Financial Services
    UF
    It's proactive approach to threat intelligence and digital risk monitoring allows for realtime insights into emerging cyber threats. It's AI driven... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    220 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Airlines/Aviation
Market Segment
  • 44% Enterprise
  • 31% Mid-Market
CloudSEK features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Verified User in Financial Services
UF
The simplicity of Clousek is what I appreciate most about it. We use CloudSEK's XVigil product for our daily security monitoring. It's easy to get... Read review
Verified User in Financial Services
UF
It's proactive approach to threat intelligence and digital risk monitoring allows for realtime insights into emerging cyber threats. It's AI driven... Read review
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,253 Twitter followers
LinkedIn® Page
www.linkedin.com
220 employees on LinkedIn®
(51)4.5 out of 5
21st Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at €82.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.6
    8.7
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    Easy to use. At the same time it saves us a lot of the guessing work. Read review
    Verified User in Gambling & Casinos
    AG
    The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.6
8.7
Ease of Admin
Average: 9.0
Verified User in Computer Software
AC
Easy to use. At the same time it saves us a lot of the guessing work. Read review
Verified User in Gambling & Casinos
AG
The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,354 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.9
    Continuous Monitoring
    Average: 9.0
    9.6
    Compliance Monitoring
    Average: 8.6
    8.5
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.9
Continuous Monitoring
Average: 9.0
9.6
Compliance Monitoring
Average: 8.6
8.5
Ease of Admin
Average: 9.0
Verified User in Information Technology and Services
CI
Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
(40)4.7 out of 5
12th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a cybersecurity platform that provides real-time threat detection, external attack surface management, and rapid incident response to protect organizations from digital threats.
    • Reviewers appreciate the platform's proactive approach to cybersecurity, its comprehensive features, ease of use, and the responsive support team that helps enhance overall security posture effectively.
    • Users reported that integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments, and the platform doesn't focus enough on region or industry-specific threats.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 8.9
    8.8
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    9.5
    Ease of Admin
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a cybersecurity platform that provides real-time threat detection, external attack surface management, and rapid incident response to protect organizations from digital threats.
  • Reviewers appreciate the platform's proactive approach to cybersecurity, its comprehensive features, ease of use, and the responsive support team that helps enhance overall security posture effectively.
  • Users reported that integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments, and the platform doesn't focus enough on region or industry-specific threats.
CTM360 features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 8.9
8.8
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
9.5
Ease of Admin
Average: 9.0
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
968 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
(39)4.8 out of 5
14th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.7
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Edwin P.
    EP
    Cybersecurity is an increasingly latent issue, there are multiple factors to consider within the possible attack scenarios, the tools alone can not... Read review
    Daniel E.
    DE
    What stands out most about SOCRadar XTI is its ability to provide comprehensive, real-time, and actionable threat intelligence through an... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.7
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 9.0
Edwin P.
EP
Cybersecurity is an increasingly latent issue, there are multiple factors to consider within the possible attack scenarios, the tools alone can not... Read review
Daniel E.
DE
What stands out most about SOCRadar XTI is its ability to provide comprehensive, real-time, and actionable threat intelligence through an... Read review
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,121 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(31)4.7 out of 5
Optimized for quick response
8th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 74% Enterprise
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    II
    Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    18,518 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    230 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 74% Enterprise
  • 19% Mid-Market
Cyble features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Verified User in Information Technology and Services
II
Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
18,518 Twitter followers
LinkedIn® Page
www.linkedin.com
230 employees on LinkedIn®
(26)4.3 out of 5
23rd Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Small-Business
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    8.6
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Small-Business
  • 35% Enterprise
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
8.6
Ease of Admin
Average: 9.0
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.6
    8.8
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Raj kumar k.
    RK
    By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
    Deep Shree V.
    DV
    Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

Users
No information available
Industries
No information available
Market Segment
  • 36% Small-Business
  • 36% Mid-Market
Glasstrail features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.6
8.8
Ease of Admin
Average: 9.0
Raj kumar k.
RK
By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
Deep Shree V.
DV
Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
(58)4.3 out of 5
7th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    5.0
    Compliance Monitoring
    Average: 8.6
    8.5
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Malcolm T.
    MT
    It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
    Timothy D.
    TD
    Centrally managed control panel and easy to deploy Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,570 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    207 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
5.0
Compliance Monitoring
Average: 8.6
8.5
Ease of Admin
Average: 9.0
Malcolm T.
MT
It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
Timothy D.
TD
Centrally managed control panel and easy to deploy Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,570 Twitter followers
LinkedIn® Page
www.linkedin.com
207 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Evan B.
    EB
    The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
    Mark H.
    MH
    Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Evan B.
EB
The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
Mark H.
MH
Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Vulnerability Intelligence
    Average: 8.9
    9.7
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Reinier M.
    RM
    We needed to integrate threat detection on our website since we have multiple materials vendors, B2B customers and several inventories, warehouses,... Read review
    AH
    ResilientX Security Platforms is a tool that allows us as a company to have all the documentation properly related and aligned with the industry... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    34 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Vulnerability Intelligence
Average: 8.9
9.7
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 9.0
Reinier M.
RM
We needed to integrate threat detection on our website since we have multiple materials vendors, B2B customers and several inventories, warehouses,... Read review
AH
ResilientX Security Platforms is a tool that allows us as a company to have all the documentation properly related and aligned with the industry... Read review
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
34 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ER
    The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
    Jon R.
    JR
    Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Admin
Average: 9.0
ER
The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
Jon R.
JR
Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Offensity features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    7.2
    Continuous Monitoring
    Average: 9.0
    7.8
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Hafeezurrahman A.
    HA
    Feedback and reports and fixes most common issues with no cost. Read review
    Verified User in Computer & Network Security
    CC
    Offensity is a really good vulnerability scanner and the best part is that it's pricing is very reasonable, especially for smaller organizations.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Offensity features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
7.2
Continuous Monitoring
Average: 9.0
7.8
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 9.0
Hafeezurrahman A.
HA
Feedback and reports and fixes most common issues with no cost. Read review
Verified User in Computer & Network Security
CC
Offensity is a really good vulnerability scanner and the best part is that it's pricing is very reasonable, especially for smaller organizations.... Read review
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
266 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.3
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Cony R.
    CR
    The Limelight Video Platform is the powerful plateform for the distribution of online video to media devices al around.It is very simple and easy... Read review
    Lion F.
    LF
    The Limelight Networks is CDN is an amazing platform with great security.It is the best content delivery service provider.It is good for video... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgio
    Year Founded
    2001
    HQ Location
    Scottsdale, Arizona
    LinkedIn® Page
    www.linkedin.com
    719 employees on LinkedIn®
    Ownership
    NASDAQ:LLNW
    Total Revenue (USD mm)
    $200
Product Description
How are these determined?Information
This description is provided by the seller.

Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Edgio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.3
Ease of Admin
Average: 9.0
Cony R.
CR
The Limelight Video Platform is the powerful plateform for the distribution of online video to media devices al around.It is very simple and easy... Read review
Lion F.
LF
The Limelight Networks is CDN is an amazing platform with great security.It is the best content delivery service provider.It is good for video... Read review
Seller Details
Seller
Edgio
Year Founded
2001
HQ Location
Scottsdale, Arizona
LinkedIn® Page
www.linkedin.com
719 employees on LinkedIn®
Ownership
NASDAQ:LLNW
Total Revenue (USD mm)
$200
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JupiterOne features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jasmine H.
    JH
    Every aspect of using JupiterOne and self-serve product onboarding is simple, painless, and intuitive. Compliance is complicated and this is a VERY... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Morrisville, North Carolina
    LinkedIn® Page
    www.linkedin.com
    171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
JupiterOne features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 9.0
Jasmine H.
JH
Every aspect of using JupiterOne and self-serve product onboarding is simple, painless, and intuitive. Compliance is complicated and this is a VERY... Read review
Seller Details
HQ Location
Morrisville, North Carolina
LinkedIn® Page
www.linkedin.com
171 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in International Affairs
    UI
    Intuitive and easy to use even without a robust background in computer science. Read review
    NZ
    It is all about the Data Aggregation! Maltego integrates with numerous data sources and APIs, allowing me to aggregate information from various... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    13,804 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
0.0
No information available
0.0
No information available
9.2
Ease of Admin
Average: 9.0
Verified User in International Affairs
UI
Intuitive and easy to use even without a robust background in computer science. Read review
NZ
It is all about the Data Aggregation! Maltego integrates with numerous data sources and APIs, allowing me to aggregate information from various... Read review
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
13,804 Twitter followers
LinkedIn® Page
www.linkedin.com
152 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Truzta features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.2
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HS
    The support throughout the Cyber Essentials Certification process was exceptional. The team demonstrated immense patience and professionalism,... Read review
    Verified User in Information Technology and Services
    II
    Truzta Accelerates ISO 27001 compliance with end to end assistance. They resolved complex compliance requirements with dedicated support. The... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 35% Mid-Market
Truzta features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.2
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
HS
The support throughout the Cyber Essentials Certification process was exceptional. The team demonstrated immense patience and professionalism,... Read review
Verified User in Information Technology and Services
II
Truzta Accelerates ISO 27001 compliance with end to end assistance. They resolved complex compliance requirements with dedicated support. The... Read review
Seller Details
Company Website
Year Founded
2021
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Halo Security features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 9.0
    7.8
    Compliance Monitoring
    Average: 8.6
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SR
    It gives 100% security for our company websites and monitors all activities to avoid hacking. Read review
    RK
    Halo security we were using since last year the things that i like the most is that this is an fully agentless solution provider and automated.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Miami Beach, US
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Halo Security features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 9.0
7.8
Compliance Monitoring
Average: 8.6
0.0
No information available
SR
It gives 100% security for our company websites and monitors all activities to avoid hacking. Read review
RK
Halo security we were using since last year the things that i like the most is that this is an fully agentless solution provider and automated.... Read review
Seller Details
Year Founded
2013
HQ Location
Miami Beach, US
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mayur S.
    MS
    Our security team does not need to build scripts or in-house tools to have 360 degrees of asset management, especially monitoring the dark web,... Read review
    Oleksandr M.
    OM
    Continuously monitoring attack surface. Repeatedly informed about critical things for the company, which could lead to large financial and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    N/A
    Twitter
    @immuniweb
    8,577 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ImmuniWeb Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 9.0
Mayur S.
MS
Our security team does not need to build scripts or in-house tools to have 360 degrees of asset management, especially monitoring the dark web,... Read review
Oleksandr M.
OM
Continuously monitoring attack surface. Repeatedly informed about critical things for the company, which could lead to large financial and... Read review
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
N/A
Twitter
@immuniweb
8,577 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy... Read review
    MG
    Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.7
Ease of Admin
Average: 9.0
Verified User in Information Technology and Services
CI
The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy... Read review
MG
Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Read review
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
Entry Level Price:Starting at $129.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panop is a Extended Security Posture Management Platform It enables customers to understand in minutes their degree of exposure to external attacks, classify the findings according to their risk appe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Panop features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nuria U.
    NU
    Panop excels in attack surface management with outstanding performance, providing real-time insights and prioritized vulnerability alerts. Its... Read review
    Jean-Loup R.
    JR
    We use Panop as part of our cyber consulting engagements. It allows to accelerate the discovery of clients' infrastructure and to see it through... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Panop SA
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Panop is a Extended Security Posture Management Platform It enables customers to understand in minutes their degree of exposure to external attacks, classify the findings according to their risk appe

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Panop features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 9.0
Nuria U.
NU
Panop excels in attack surface management with outstanding performance, providing real-time insights and prioritized vulnerability alerts. Its... Read review
Jean-Loup R.
JR
We use Panop as part of our cyber consulting engagements. It allows to accelerate the discovery of clients' infrastructure and to see it through... Read review
Seller Details
Seller
Panop SA
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quantum Armor features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yuri M.
    YM
    Very intuitive and easy to use the software even for non Cybersecurity experts. This tool gives the ability to gain essential information to... Read review
    Verified User in Market Research
    AM
    The dashboard is extremely to use and a great help in monitoring assets for unauthorized changes and vulnerabilities. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    New York, NY
    Twitter
    @SilentBreach
    4,839 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
Quantum Armor features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Yuri M.
YM
Very intuitive and easy to use the software even for non Cybersecurity experts. This tool gives the ability to gain essential information to... Read review
Verified User in Market Research
AM
The dashboard is extremely to use and a great help in monitoring assets for unauthorized changes and vulnerabilities. Read review
Seller Details
Year Founded
2015
HQ Location
New York, NY
Twitter
@SilentBreach
4,839 Twitter followers
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.6
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dan M.
    DM
    I help to run a complicated service which runs tens of thousands of rapidly evolving disparate processes across a distributed compute cluster.... Read review
    Verified User in Information Technology and Services
    AI
    I like how flexible their policy engine is, which allows me to spot the anomaly in the environment easily. The enforcement feature is helpful in... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.6
0.0
No information available
Dan M.
DM
I help to run a complicated service which runs tens of thousands of rapidly evolving disparate processes across a distributed compute cluster.... Read review
Verified User in Information Technology and Services
AI
I like how flexible their policy engine is, which allows me to spot the anomaly in the environment easily. The enforcement feature is helpful in... Read review
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Khalish Y.
    KY
    It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Khalish Y.
KY
It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
Entry Level Price:$129.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Attaxion EASM Platform is designed to provide businesses with full visibility over their external attack surfaces. It offers features like asset discovery, risk prioritization, and continuous moni

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Attaxion EASM Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Attaxion
    Year Founded
    2024
    HQ Location
    8 The Green, STE A, Dover, DE 19901, USA
    Twitter
    @attaxion
    12 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Attaxion EASM Platform is designed to provide businesses with full visibility over their external attack surfaces. It offers features like asset discovery, risk prioritization, and continuous moni

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Attaxion EASM Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Attaxion
Year Founded
2024
HQ Location
8 The Green, STE A, Dover, DE 19901, USA
Twitter
@attaxion
12 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul W.
    RW
    Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
    Alan Salvador A.
    AA
    Data is mostly relevant, also dashboards can be granular or how we need them Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 9.0
Rahul W.
RW
Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
Alan Salvador A.
AA
Data is mostly relevant, also dashboards can be granular or how we need them Read review
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chariot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Chariot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@praetorianlabs
8,283 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive thr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Deepinfo Attack Surface Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Deepinfo
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Deepinfo has the most comprehensive Internet-wide data and has been using this data for years to empower cybersecurity of all sizes of organizations worldwide. Deepinfo also provides comprehensive thr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Deepinfo Attack Surface Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Deepinfo
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgewatch is an Attack Surface Management Platform that assists companies in discovering, monitoring, and analyzing devices accessible from the Internet. Edgewatch continuously scans public IP address

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EdgeWatch Attack Surface Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgewatch
    Year Founded
    2019
    HQ Location
    Paterna, es
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgewatch is an Attack Surface Management Platform that assists companies in discovering, monitoring, and analyzing devices accessible from the Internet. Edgewatch continuously scans public IP address

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EdgeWatch Attack Surface Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Edgewatch
Year Founded
2019
HQ Location
Paterna, es
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Group-IB Attack Surface Management improves security by continuously discovering all external IT assets, assessing risk using threat intelligence data, and prioritizing issues to enable high-impact re

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Group-IB Attack Surface Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Group-IB
    Year Founded
    2003
    HQ Location
    Singapore
    Twitter
    @GroupIB
    8,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Group-IB Attack Surface Management improves security by continuously discovering all external IT assets, assessing risk using threat intelligence data, and prioritizing issues to enable high-impact re

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Group-IB Attack Surface Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Group-IB
Year Founded
2003
HQ Location
Singapore
Twitter
@GroupIB
8,853 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hexiosec ASM is an attack surface management solution built and supported by ex-UK Government and Defence cyber security engineers in Cheltenham, UK. Using powerful enumeration capabilities, Hexio

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hexiosec ASM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Cheltenham, England
    Twitter
    @hexiosec
    137 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Hexiosec ASM is an attack surface management solution built and supported by ex-UK Government and Defence cyber security engineers in Cheltenham, UK. Using powerful enumeration capabilities, Hexio

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Hexiosec ASM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Cheltenham, England
Twitter
@hexiosec
137 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NoPorts is a zero-trust VPN replacement solution that allows you to remotely access devices no matter where they are, without needing to open any ports. Here's a breakdown: Key Features: -

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NoPorts features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Atsign
    Year Founded
    2019
    HQ Location
    San Jose, US
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NoPorts is a zero-trust VPN replacement solution that allows you to remotely access devices no matter where they are, without needing to open any ports. Here's a breakdown: Key Features: -

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NoPorts features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Atsign
Year Founded
2019
HQ Location
San Jose, US
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security isn’t a one-time activity, our vulnerability management tools continuously discover infrastructure vulnerabilities and perimeter security flaws that could disrupt your business, and use risk

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Outpost24 Vulnerability Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Outpost24
    HQ Location
    Karlskrona, SE
    LinkedIn® Page
    www.linkedin.com
    252 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security isn’t a one-time activity, our vulnerability management tools continuously discover infrastructure vulnerabilities and perimeter security flaws that could disrupt your business, and use risk

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Outpost24 Vulnerability Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Outpost24
HQ Location
Karlskrona, SE
LinkedIn® Page
www.linkedin.com
252 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    runZero delivers the most complete security visibility possible, providing organizations the ultimate foundation for successfully managing risk and exposure. Rated number one on Gartner Peer Insights,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • runZero features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Christian F.
    CF
    It gives a good overview of network topology Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    runZero
    Year Founded
    2018
    HQ Location
    Austin, TX
    Twitter
    @runZeroInc
    2,342 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

runZero delivers the most complete security visibility possible, providing organizations the ultimate foundation for successfully managing risk and exposure. Rated number one on Gartner Peer Insights,

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
runZero features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Christian F.
CF
It gives a good overview of network topology Read review
Seller Details
Seller
runZero
Year Founded
2018
HQ Location
Austin, TX
Twitter
@runZeroInc
2,342 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sn1per Professional features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Military
    UM
    This particular software helped (and continues to help me) in the automatic execution of several tasks. Inside this software are a lot of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Scottsdale, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Sn1per Professional features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Military
UM
This particular software helped (and continues to help me) in the automatic execution of several tasks. Inside this software are a lot of... Read review
Seller Details
HQ Location
Scottsdale, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StyxView features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Vancouver, CA
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StyxView features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Vancouver, CA
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®