G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Hexiosec ASM is an attack surface management solution built and supported by ex-UK Government and Defence cyber security engineers in Cheltenham, UK. Using powerful enumeration capabilities, Hexio
Interpres is a Threat Informed Defense Surface Management platform that fuses and operationalizes and prioritizes adversarial techniques, tactics, and procedures with your unique threat profile, uniqu
IONIX is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your real attack surface and its digital supply chain. Only IONIX dis
Lantern by MokN is an advanced External Attack Surface Management (EASM) solution designed to help organizations identify, monitor, and secure exposed assets before they become entry points for cyber
NetSPI CAASM gives you visibility across your users, applications, devices, and clouds so you can understand your assets, find contextual relationships, and identify risks. Rapidly identify security c
NetSPI Attack Surface Management (ASM) continuously scans your external perimeter. Our technology, process, and human intelligence discover both known and unknown assets. Our security experts manually
Noetic’s full-stack visibility and effective controls monitoring empowers enterprises to see the full picture and truly understand significance of relationships between entities, so you can identify g
NoPorts is a zero-trust VPN replacement solution that allows you to remotely access devices no matter where they are, without needing to open any ports. Here's a breakdown: Key Features: -
Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us
External Attack Surface Management (EASM) is the process of continuously discovering, monitoring, evaluating, prioritising and remediating possible entry points within an organisation’s IT infrastruct
Orbit Security Ratings are an automated, powerful way to continuously monitor the cyber security posture of your organisation and the third parties it relies on, with data-driven analytics so you can
Security isn’t a one-time activity, our vulnerability management tools continuously discover infrastructure vulnerabilities and perimeter security flaws that could disrupt your business, and use risk
Paladin Cloud combines Cyber Asset Attack Surface Management and Cloud Security Posture Management in a unified cloud security platform. This enables developers and security teams to take a holistic v
A continuous controls monitoring platform
Penetration Test Automation Platform. Your automated shield against cyber threats Offers Vulnerability Assessment, Management, Cyber Threat Intelligence and Attack Surface Management
Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test
Racid is an External Attack Surface Management platform designed to provide organizations with comprehensive visibility and control over digital assets. It aims to identify, monitor and mitigate risks
RECONIZER is an artificial intelligence-driven external attack surface management platform that prioritizes and mitigates your attack vectors before hackers can exploit them. Its AI module gathers i
Redjack delivers cyber resilience by providing total visibility of assets and dependencies with AI-powered business insights. Our advanced platform delivers objective data to align priorities across I
ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo
runZero delivers the most complete security visibility possible, providing organizations the ultimate foundation for successfully managing risk and exposure. Rated number one on Gartner Peer Insights,
Securing your cloud apps was never going to be easy, but once you factor in multiple vendors, staff in different time-zones, and systems that auto-scale, then you are left with an attack surface that
Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,
StackSciences provides a SaaS platform to centralize your #devops environment risk analysis, policy compliance and runtime enforcement. On a single view, you can measure your attack surface, view what
Strobes ASM stands out in the crowded asset management market for its intuitive interface, real-time scanning capabilities, and comprehensive data insights. Unlike many solutions that offer static, ou
Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,
In late 2018, it developed the first product that provides one-time digital asset issuance, called SwordEye Recon. In this process, it served dozens of customers until 2020. Thanks to the feedback rec
Unified Attack Surface Management Built for MSPs ThreatMate empowers MSPs with a single platform to monitor, manage, and secure every attack surface—external, internal, and cloud—all from one power
Tresal is a European cybersecurity platform that provides visibility into your external attack surface. It scans and monitors internet-facing assets and cloud environments, including domains, IPs, sto
Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar
Continuous monitoring CTEM platform
Uni5 Xposure brings together your most fragmented security data: assets, exploits, vulnerabilities, threat intel, and control gaps into one unified exposure map, revealing what’s truly at risk and wha