G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at
Picus Security is a sophisticated Security Validation and Exposure Management Platform designed to assist organizations in continuously assessing, prioritizing, and mitigating cyber risks. By simulati
Adaptive Security is OpenAI’s investment for AI cyber threats. The company was founded in 2024 by serial entrepreneurs Brian Long and Andrew Jones. Adaptive has raised $50M+ from investors like OpenAI
Sophos PhishThreat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture. Phish Threat educates and tests your end users
Vonahi Security is building the future of offensive cybersecurity by delivering automated, high-quality penetration testing through its SaaS platform, vPenTest. Designed to replicate the tools, techni
RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat
Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers
SaaS Defense is an advanced threat protection [ATP] and spam filtering solution that detects zero-day threats. This means it identifies and prevents threats that competitive solutions are missing. It
By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.
IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th
MazeBolt RADAR is a patented DDoS Vulnerability Management solution. Using thousands of non-disruptive DDoS attack simulations and without affecting online services, RADAR identifies and enables the r
AttackIQ, the leading independent vendor of breach and attack simulation solutions, built the industry’s first Breach and Attack Simulation Platform for continuous security control validation and impr
CyBot is a next-generation vulnerability management tool as well as the world first Automated pen testing solution, that continuously showcases validated, global, multi-vector, Attack Path Scenarios
FourCore ATTACK provides a comprehensive view of security effectiveness by validating controls with realistic attacks. • Identify gaps in endpoint, email and network security controls before real att
OpenBAS, an open-source platform, to create attack simulations, stress tests, and crisis management exercises. It allows cybersecurity teams to design scenarios ranging from simple to complex, adapt r
SafeBreach is a platform that automates adversary breach methods across the entire kill chain, without impacting users or infrastructure.
SCYTHE is an adversary emulation platform (BAS+) catering to the commercial, government, and cybersecurity consulting market. The SCYTHE platform empowers Red, Blue, and Purple teams to swiftly constr
Validato is a continuous security validation platform that uses safe-to-use in production Breach & Attack Simulations, simulating offensive cyber attack methods to test and validate security contr
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. By continuously uncovering hidden attack paths to businesses’ critical assets
Enkrypt AI's Risk Detection with Red Teaming is a comprehensive solution designed to identify and mitigate vulnerabilities in Large Language Models (LLMs) and Generative AI applications. By simulating
The premier cyber security company that protects you before, during and after a breach
ARTEMIS by Repello AI hunts for vulnerabilities in your AI applications by simulating attacks that malicious actors would use. ARTEMIS tests, identifies, and helps remediate security risks before they
BlackNoise is the first European cyber defense validation platform, available SaaS and On-Premise. It helps users across all industries to continuously validate and enhance cyber defense capabilitie
Validate the effectiveness of your cyber defenses with BlackNoise, the European leader in multi-environment Breach and Attack Simulation and Security Validation (cloud, networks, endpoints). Measure
Cytomate's Breach+ is a Breach and Attack Simulation (BAS) solution designed to rigorously assess and strengthen an organization's security posture. By emulating real-world attack scenarios using a co
Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos
Help companies to identify and manage cyber threats that affect their business.
Exploit Pack is a multiplatform exploitation framework including zero-days from own lab, a growing collection of 39.000+ exploits and post-exploitation modules. It has been designed by an experienced
Nemesis is a Breach and Attack Simulation (BAS) software as a service (SaaS), which simulates malicious activities against your critical infrastructure. 100% EU based, Nemesis allows you to: Simulate
NeSSi² is an open source project developed at the DAI-Labor and sponsored by Deutsche Telekom Laboratories. NeSSi (Network Security Simulator) is a novel network simulation tool which incorporates a v
NetSPI BAS blends technology with human intelligence to validate the efficacy of your existing security controls. NetSPI BAS allows you to leverage pre-built plays and create your own custom playbooks
ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo
securiCAD is a foreseeti product, developed to perform virtual attack simulations on models of IT architectures. Based on decades of research at the Royal Institute of Technology in Stockholm (KTH), s
Threatcare is a cybersecurity platform that allows organizations to simulate intrusions on their network to help improve their people's performance, their processes, and their product utilization.
Threat Simulator is a SaaS-based breach and attack simulation (BAS) platform built on 20+ years of leadership in network security testing. Threat Simulator enables you to safely simulate attacks on y
WhiteHaX currently is the only solution that provides an in-depth, real-life simulation verification for this purpose. WhiteHaX helps the businesses identify security holes in their detection/preventi