Introducing G2.ai, the future of software buying.Try now

Top Free Cloud Security Posture Management (CSPM) Software

Check out our list of free Cloud Security Posture Management (CSPM) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Cloud Security Posture Management (CSPM) Software to ensure you get the right product.

View Free Cloud Security Posture Management (CSPM) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
32 Cloud Security Posture Management (CSPM) Products Available
(702)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.8
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.8
9.1
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,406 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(221)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Configuration Monitoring
    Average: 8.8
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.5
Configuration Monitoring
Average: 8.8
9.1
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,853 Twitter followers
LinkedIn® Page
www.linkedin.com
456 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(108)4.9 out of 5
8th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.8
    Configuration Monitoring
    Average: 8.8
    9.9
    Vulnerability Scanning
    Average: 8.9
    9.9
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.8
Configuration Monitoring
Average: 8.8
9.9
Vulnerability Scanning
Average: 8.9
9.9
Threat Hunting
Average: 8.6
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(186)4.5 out of 5
21st Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.8
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.9
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nico John C.
    NC
    It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
    Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.8
9.1
Vulnerability Scanning
Average: 8.9
8.9
Threat Hunting
Average: 8.6
Nico John C.
NC
It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(182)4.8 out of 5
Optimized for quick response
9th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consumer Goods
    EC
    Accurate and actionable results that my staff and I can easily understand and resolve. Intruder.io is constantly updated with the latest... Read review
    David C.
    DC
    Their quality of service and expertise are both of high standard and I'd have no hesitation in recommending to others who are serious about security. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    952 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Consumer Goods
EC
Accurate and actionable results that my staff and I can easily understand and resolve. Intruder.io is constantly updated with the latest... Read review
David C.
DC
Their quality of service and expertise are both of high standard and I'd have no hesitation in recommending to others who are serious about security. Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
952 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
(124)4.7 out of 5
Optimized for quick response
12th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

    Users
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 75% Mid-Market
    • 17% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeBase features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.8
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Hana M.
    HM
    The AI works very well and the customer support is stellar. I am new to enterprise sales, and the help from the team in understanding security... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SafeBase
    Company Website
    Year Founded
    2020
    HQ Location
    San Francisco, California
    Twitter
    @getsafebase
    279 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

Users
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 75% Mid-Market
  • 17% Enterprise
SafeBase features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.8
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Hana M.
HM
The AI works very well and the customer support is stellar. I am new to enterprise sales, and the help from the team in understanding security... Read review
Seller Details
Seller
SafeBase
Company Website
Year Founded
2020
HQ Location
San Francisco, California
Twitter
@getsafebase
279 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
(97)4.1 out of 5
Optimized for quick response
24th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.3
    7.6
    Configuration Monitoring
    Average: 8.8
    7.9
    Vulnerability Scanning
    Average: 8.9
    7.8
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Herberth S.
    HS
    Their platform is easy to use, and having good integration with other brands facilitates its implementation, it is a solution that has several... Read review
    Verified User in Computer Software
    UC
    Having worked on some in-house AI driven security solutions I can say this gives a very nice turn-key solution. The fact it's a cloud native... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 32% Small-Business
Cortex Cloud features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.3
7.6
Configuration Monitoring
Average: 8.8
7.9
Vulnerability Scanning
Average: 8.9
7.8
Threat Hunting
Average: 8.6
Herberth S.
HS
Their platform is easy to use, and having good integration with other brands facilitates its implementation, it is a solution that has several... Read review
Verified User in Computer Software
UC
Having worked on some in-house AI driven security solutions I can say this gives a very nice turn-key solution. The fact it's a cloud native... Read review
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(55)4.7 out of 5
Optimized for quick response
11th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    7.7
    Configuration Monitoring
    Average: 8.8
    8.7
    Vulnerability Scanning
    Average: 8.9
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    Our dev team loves the self-serve approach on Aikido. Read review
    Tamara F.
    TF
    I love couple of things - first one is that it is really-really user friendly. For me interface is really user friendly, it was very quick to set... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    2,538 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
7.7
Configuration Monitoring
Average: 8.8
8.7
Vulnerability Scanning
Average: 8.9
0.0
No information available
Verified User in Information Technology and Services
UI
Our dev team loves the self-serve approach on Aikido. Read review
Tamara F.
TF
I love couple of things - first one is that it is really-really user friendly. For me interface is really user friendly, it was very quick to set... Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
2,538 Twitter followers
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
(136)4.8 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The nOps cloud optimization platform makes it easy for DevOps and FinOps teams to allocate and manage your AWS usage, commitments, and spend. Our platform intelligently optimizes all your compute auto

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • nOps features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Configuration Monitoring
    Average: 8.8
    9.2
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Seenivasan V.
    SV
    We have saved our AWS recurring bills by nOPS team using cost optimization and Commitment management. Read review
    Chetan C.
    CC
    1. No need to worry about reserving ec2 instances wether my work load is running for long or short time 2. Clear picture about how much cost save... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    nOps
    Company Website
    Year Founded
    2017
    HQ Location
    San Francisco, California
    Twitter
    @nopsio
    1,522 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The nOps cloud optimization platform makes it easy for DevOps and FinOps teams to allocate and manage your AWS usage, commitments, and spend. Our platform intelligently optimizes all your compute auto

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 41% Mid-Market
nOps features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.9
Configuration Monitoring
Average: 8.8
9.2
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Seenivasan V.
SV
We have saved our AWS recurring bills by nOPS team using cost optimization and Commitment management. Read review
Chetan C.
CC
1. No need to worry about reserving ec2 instances wether my work load is running for long or short time 2. Clear picture about how much cost save... Read review
Seller Details
Seller
nOps
Company Website
Year Founded
2017
HQ Location
San Francisco, California
Twitter
@nopsio
1,522 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
(43)4.5 out of 5
17th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    9.0
    Configuration Monitoring
    Average: 8.8
    9.6
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abdurrahman A.
    AA
    This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
    Mandira G.
    MG
    I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Company Website
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
ARMO Platform features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
9.0
Configuration Monitoring
Average: 8.8
9.6
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Abdurrahman A.
AA
This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
Mandira G.
MG
I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
Seller Details
Seller
ARMO
Company Website
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,144 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
(17)4.9 out of 5
2nd Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudMatos stands as a game-changing solution in the realm of cloud & cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and ef

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MatosSphere features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Configuration Monitoring
    Average: 8.8
    9.6
    Vulnerability Scanning
    Average: 8.9
    9.6
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AP
    The CSPM and AI-SPM featrures are great; they keep our cloud security and give us peace oif mind. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    N/A
    Twitter
    @RestoLabs
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudMatos stands as a game-changing solution in the realm of cloud & cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and ef

Users
No information available
Industries
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
MatosSphere features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Configuration Monitoring
Average: 8.8
9.6
Vulnerability Scanning
Average: 8.9
9.6
Threat Hunting
Average: 8.6
AP
The CSPM and AI-SPM featrures are great; they keep our cloud security and give us peace oif mind. Read review
Seller Details
Year Founded
2022
HQ Location
N/A
Twitter
@RestoLabs
5 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(20)4.8 out of 5
13th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BL
    Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,145 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
BL
Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,145 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Configuration Monitoring
    Average: 8.8
    9.0
    Vulnerability Scanning
    Average: 8.9
    9.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NS
    It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
    PS
    What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.3
Configuration Monitoring
Average: 8.8
9.0
Vulnerability Scanning
Average: 8.9
9.3
Threat Hunting
Average: 8.6
NS
It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
PS
What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
442 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
(13)4.8 out of 5
10th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:$30.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find & Fix 350+ security issues in you AWS, Google Cloud, DigitalOcean, Kubernetes clouds. Kloudle scans your cloud like a security expert so that you don't need to. With automated scans, detailed

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 69% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kloudle features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Configuration Monitoring
    Average: 8.8
    9.2
    Vulnerability Scanning
    Average: 8.9
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rohith V.
    RV
    - Quick 5m onboarding. - Automated results of assets available right after onboarding. - Helps identify the right configurations for cloud... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kloulde
    Year Founded
    2020
    HQ Location
    Wilmington, US
    Twitter
    @Kloudleinc
    639 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Find & Fix 350+ security issues in you AWS, Google Cloud, DigitalOcean, Kubernetes clouds. Kloudle scans your cloud like a security expert so that you don't need to. With automated scans, detailed

Users
No information available
Industries
  • Computer Software
Market Segment
  • 69% Small-Business
  • 8% Mid-Market
Kloudle features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.2
Configuration Monitoring
Average: 8.8
9.2
Vulnerability Scanning
Average: 8.9
0.0
No information available
Rohith V.
RV
- Quick 5m onboarding. - Automated results of assets available right after onboarding. - Helps identify the right configurations for cloud... Read review
Seller Details
Seller
Kloulde
Year Founded
2020
HQ Location
Wilmington, US
Twitter
@Kloudleinc
639 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
(26)4.4 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 42% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico Cloud features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.3
    7.8
    Configuration Monitoring
    Average: 8.8
    9.4
    Vulnerability Scanning
    Average: 8.9
    7.5
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RK
    Calico helps us roll up multiple security features in a single place through a single installer. This makes administration and deployment... Read review
    Verified User in International Trade and Development
    AI
    1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,958 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    123 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico Cloud is a fully-managed SaaS platform that provides unified network security and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is built on Calico O

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 42% Enterprise
  • 35% Mid-Market
Calico Cloud features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.3
7.8
Configuration Monitoring
Average: 8.8
9.4
Vulnerability Scanning
Average: 8.9
7.5
Threat Hunting
Average: 8.6
RK
Calico helps us roll up multiple security features in a single place through a single installer. This makes administration and deployment... Read review
Verified User in International Trade and Development
AI
1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,958 Twitter followers
LinkedIn® Page
www.linkedin.com
123 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudanix features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anurag  G.
    AG
    The tool gives you a detailed insight about threats and vulnerabilities while taking a very basic access of your account and without fetching... Read review
    Raghav A.
    RA
    Overall, Cloudanix is a robust, reliable tool for any organization looking to strengthen their cloud infrastructure’s security, compliance, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cloudanix
    Year Founded
    2020
    HQ Location
    Sunnyvale, CA
    Twitter
    @cloudanix
    95 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudanix is a Ycombinator-backed security platform for your code, cloud, identities, and workloads. Cloudanix provides solutions for your multi-environments which may include multi-clouds, multi-acco

Users
No information available
Industries
No information available
Market Segment
  • 60% Mid-Market
  • 40% Small-Business
Cloudanix features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Anurag  G.
AG
The tool gives you a detailed insight about threats and vulnerabilities while taking a very basic access of your account and without fetching... Read review
Raghav A.
RA
Overall, Cloudanix is a robust, reliable tool for any organization looking to strengthen their cloud infrastructure’s security, compliance, and... Read review
Seller Details
Seller
Cloudanix
Year Founded
2020
HQ Location
Sunnyvale, CA
Twitter
@cloudanix
95 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security de

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 39% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sonrai Security features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.4
    Configuration Monitoring
    Average: 8.8
    8.8
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NL
    Sonrai Security has simplified DSP that allows us to navigate all the data leaks. The scanning of vulnerability of data is systematically... Read review
    Naveen K.
    NK
    Sonrai security is best for cloud security and vulnerability management. It's simulates attack paths. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    LinkedIn® Page
    www.linkedin.com
    74 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sonrai Security is a leading public cloud identity and access management solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security de

Users
No information available
Industries
No information available
Market Segment
  • 39% Enterprise
  • 33% Mid-Market
Sonrai Security features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.3
9.4
Configuration Monitoring
Average: 8.8
8.8
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
NL
Sonrai Security has simplified DSP that allows us to navigate all the data leaks. The scanning of vulnerability of data is systematically... Read review
Naveen K.
NK
Sonrai security is best for cloud security and vulnerability management. It's simulates attack paths. Read review
Seller Details
Year Founded
2017
HQ Location
New York, US
LinkedIn® Page
www.linkedin.com
74 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, Monit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloudaware features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.8
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Suru S.
    SS
    Been using it for quite some time and I make use of the "Monitoring" module and the "Backup & Replication" module in which taking care of managing... Read review
    Anubhav N.
    AN
    They make it straightforward to deploy everything in the cloud -Amazon, Azure and Google clouds. Super simple to use. takes less time than other... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    New York, NY
    Twitter
    @socialcloudops
    500 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    46 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloudaware is a cloud management platform with such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, Monit

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 33% Enterprise
Cloudaware features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.8
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Suru S.
SS
Been using it for quite some time and I make use of the "Monitoring" module and the "Backup & Replication" module in which taking care of managing... Read review
Anubhav N.
AN
They make it straightforward to deploy everything in the cloud -Amazon, Azure and Google clouds. Super simple to use. takes less time than other... Read review
Seller Details
Year Founded
2007
HQ Location
New York, NY
Twitter
@socialcloudops
500 Twitter followers
LinkedIn® Page
www.linkedin.com
46 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Truzta features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Configuration Monitoring
    Average: 8.8
    9.6
    Vulnerability Scanning
    Average: 8.9
    8.8
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HS
    The support throughout the Cyber Essentials Certification process was exceptional. The team demonstrated immense patience and professionalism,... Read review
    Verified User in Information Technology and Services
    II
    Truzta Accelerates ISO 27001 compliance with end to end assistance. They resolved complex compliance requirements with dedicated support. The... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Small-Business
  • 35% Mid-Market
Truzta features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
9.6
Configuration Monitoring
Average: 8.8
9.6
Vulnerability Scanning
Average: 8.9
8.8
Threat Hunting
Average: 8.6
HS
The support throughout the Cyber Essentials Certification process was exceptional. The team demonstrated immense patience and professionalism,... Read review
Verified User in Information Technology and Services
II
Truzta Accelerates ISO 27001 compliance with end to end assistance. They resolved complex compliance requirements with dedicated support. The... Read review
Seller Details
Company Website
Year Founded
2021
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudWize features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Shreya B.
    SB
    We manage the cost metrics of our associated AWS accounts using various features such as cost views, monthly breakdowns & reports offered by... Read review
    Igor R.
    IR
    Cloudwize.io is an incredible AI-powered cloud management platform. Its real-time optimization, proactive monitoring, intuitive interface, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudWize
    Year Founded
    2019
    HQ Location
    Netanya, IL
    Twitter
    @cloud_wize
    94 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudWize is a no-code Cloud Security Center of Excellence that gives you maximum cloud compliance & security. Get 360° Protection from Architecture Design to Runtime. CludWize enforces cloud reg

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
CloudWize features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Shreya B.
SB
We manage the cost metrics of our associated AWS accounts using various features such as cost views, monthly breakdowns & reports offered by... Read review
Igor R.
IR
Cloudwize.io is an incredible AI-powered cloud management platform. Its real-time optimization, proactive monitoring, intuitive interface, and... Read review
Seller Details
Seller
CloudWize
Year Founded
2019
HQ Location
Netanya, IL
Twitter
@cloud_wize
94 Twitter followers
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyscale offers a unified cloud security platform (CNAPP) that constantly monitors your cloud for risks and compliance issues. It includes CSPM, KSPM, CWPP, vulnerability management, CIEM, DSPM, and Co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyscale Cloud Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.4
    Configuration Monitoring
    Average: 8.8
    9.4
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HS
    We are from Brazil and We are usin Cyscale for security assessment in Microsoft Azure and later we will use it for AWS too. The tool is helping us... Read review
    Verified User in Computer Software
    EC
    its super easy to integrate our cloud platforms, and their findings are presented in a range of different reports that suit different... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyscale
    Year Founded
    2019
    HQ Location
    London, GB
    Twitter
    @cyscale
    51 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyscale offers a unified cloud security platform (CNAPP) that constantly monitors your cloud for risks and compliance issues. It includes CSPM, KSPM, CWPP, vulnerability management, CIEM, DSPM, and Co

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Cyscale Cloud Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.4
Configuration Monitoring
Average: 8.8
9.4
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
HS
We are from Brazil and We are usin Cyscale for security assessment in Microsoft Azure and later we will use it for AWS too. The tool is helping us... Read review
Verified User in Computer Software
EC
its super easy to integrate our cloud platforms, and their findings are presented in a range of different reports that suit different... Read review
Seller Details
Seller
Cyscale
Year Founded
2019
HQ Location
London, GB
Twitter
@cyscale
51 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero known security vulnerabilities. It gives your software team the power to find and fix thousan

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 43% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Chief features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.8
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Todor P.
    TP
    We are just starting our jouney with Cyber Chief, but we have a solid history with Audacix, the company behind it. They are actually using Cyber... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Audacix
    Year Founded
    2015
    HQ Location
    Melbourne, Victoria
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero known security vulnerabilities. It gives your software team the power to find and fix thousan

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 43% Small-Business
Cyber Chief features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.8
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Todor P.
TP
We are just starting our jouney with Cyber Chief, but we have a solid history with Audacix, the company behind it. They are actually using Cyber... Read review
Seller Details
Seller
Audacix
Year Founded
2015
HQ Location
Melbourne, Victoria
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Configuration Monitoring
    Average: 8.8
    10.0
    Vulnerability Scanning
    Average: 8.9
    10.0
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Reinier M.
    RM
    We needed to integrate threat detection on our website since we have multiple materials vendors, B2B customers and several inventories, warehouses,... Read review
    AH
    ResilientX Security Platforms is a tool that allows us as a company to have all the documentation properly related and aligned with the industry... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    34 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
10.0
Configuration Monitoring
Average: 8.8
10.0
Vulnerability Scanning
Average: 8.9
10.0
Threat Hunting
Average: 8.6
Reinier M.
RM
We needed to integrate threat detection on our website since we have multiple materials vendors, B2B customers and several inventories, warehouses,... Read review
AH
ResilientX Security Platforms is a tool that allows us as a company to have all the documentation properly related and aligned with the industry... Read review
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
34 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenacity is a Cloud Cost Optimization and Management platform that maximizes public cloud discounts and savings opportunities, eliminates billing surprises, and helps organizations allocate their cost

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenacity features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    UC
    The Tenacity product is new, and features are being rolled out into the production environment wonderfully quickly. The best thing about this is... Read review
    BN
    Tenacity proves their value during the live demo where they hook up your account to Tenacity so you know the value you are getting before you sign... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenacity
    Year Founded
    2020
    HQ Location
    Ann Arbor, US
    Twitter
    @tenacitycloud
    46 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tenacity is a Cloud Cost Optimization and Management platform that maximizes public cloud discounts and savings opportunities, eliminates billing surprises, and helps organizations allocate their cost

Users
No information available
Industries
No information available
Market Segment
  • 64% Small-Business
  • 27% Mid-Market
Tenacity features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Computer & Network Security
UC
The Tenacity product is new, and features are being rolled out into the production environment wonderfully quickly. The best thing about this is... Read review
BN
Tenacity proves their value during the live demo where they hook up your account to Tenacity so you know the value you are getting before you sign... Read review
Seller Details
Seller
Tenacity
Year Founded
2020
HQ Location
Ann Arbor, US
Twitter
@tenacitycloud
46 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 54% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Uptycs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    5.0
    Configuration Monitoring
    Average: 8.8
    4.2
    Vulnerability Scanning
    Average: 8.9
    6.7
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    - Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
    Verified User in Computer & Network Security
    UC
    Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Uptycs
    Year Founded
    2016
    HQ Location
    Waltham, US
    Twitter
    @uptycs
    1,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Uptycs unified CNAPP and XDR platform is a comprehensive security solution designed to protect the full spectrum of modern attack surfaces in your cloud, data centers, user devices, build pipelines, a

Users
No information available
Industries
  • Financial Services
Market Segment
  • 54% Mid-Market
  • 38% Enterprise
Uptycs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
5.0
Configuration Monitoring
Average: 8.8
4.2
Vulnerability Scanning
Average: 8.9
6.7
Threat Hunting
Average: 8.6
Verified User in Financial Services
UF
- Great for managing osquery on all kinds of assets - Can forward telemetry to an s3 bucket for SIEM consumption - Provides some active... Read review
Verified User in Computer & Network Security
UC
Very good tool for monitoring security, compliant with CIS or PCI DSS standards. I like the ability to create your own SQL queries in network... Read review
Seller Details
Seller
Uptycs
Year Founded
2016
HQ Location
Waltham, US
Twitter
@uptycs
1,508 Twitter followers
LinkedIn® Page
www.linkedin.com
178 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymptom's Network Security Posture Management platform is the only solution that provides continuous full visibility of the entire hybrid network threat landscape in real-time. Cymptom maps all misco

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cymptom features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • OB
    - Cymptom gives me the clarity I need in order to see all the risks in my network in real-time, in one place. Very clean UI/UX. - Cymptom's... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymptom
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Cymptom's Network Security Posture Management platform is the only solution that provides continuous full visibility of the entire hybrid network threat landscape in real-time. Cymptom maps all misco

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Cymptom features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
OB
- Cymptom gives me the clarity I need in order to see all the risks in my network in real-time, in one place. Very clean UI/UX. - Cymptom's... Read review
Seller Details
Seller
Cymptom
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireMon Cloud Defense is the only distributed cloud security operations platform with real-time cloud security posture management, threat detection and response, and enhanced identity protection.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FireMon Cloud Defense features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Configuration Monitoring
    Average: 8.8
    10.0
    Vulnerability Scanning
    Average: 8.9
    10.0
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BK
    DisruptOps allows for an easy way of monitoring security issues in real time and pre-define actions to take in critical situations, enabling quick... Read review
    Ana M.
    AM
    It's a solution to fully understand the security risk that your business may have in the cloud, reduces response times and is compatible with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FireMon
    Year Founded
    2004
    HQ Location
    Overland Park, KS
    Twitter
    @FireMon
    2,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    243 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireMon Cloud Defense is the only distributed cloud security operations platform with real-time cloud security posture management, threat detection and response, and enhanced identity protection.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
FireMon Cloud Defense features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Configuration Monitoring
Average: 8.8
10.0
Vulnerability Scanning
Average: 8.9
10.0
Threat Hunting
Average: 8.6
BK
DisruptOps allows for an easy way of monitoring security issues in real time and pre-define actions to take in critical situations, enabling quick... Read review
Ana M.
AM
It's a solution to fully understand the security risk that your business may have in the cloud, reduces response times and is compatible with... Read review
Seller Details
Seller
FireMon
Year Founded
2004
HQ Location
Overland Park, KS
Twitter
@FireMon
2,454 Twitter followers
LinkedIn® Page
www.linkedin.com
243 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatKey features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.8
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DJ
    It's user-friendly and integrates seamlessly with our existing systems. It helps us quickly identify and address security threats, which has... Read review
    SS
    I have found ThreatKey by Vijilan useful for my small business. I agree with Vijilan’s terms of deployment, monitoring, and incident handling... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatKey
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatKey is a highly automated security operations SaaS solution. It gathers enough context about your environments to fix security issues at the click of a button. With the information gathered from

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ThreatKey features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.8
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
DJ
It's user-friendly and integrates seamlessly with our existing systems. It helps us quickly identify and address security threats, which has... Read review
SS
I have found ThreatKey by Vijilan useful for my small business. I agree with Vijilan’s terms of deployment, monitoring, and incident handling... Read review
Seller Details
Seller
ThreatKey
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul W.
    RW
    Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
    Alan Salvador A.
    AA
    Data is mostly relevant, also dashboards can be granular or how we need them Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Rahul W.
RW
Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
Alan Salvador A.
AA
Data is mostly relevant, also dashboards can be granular or how we need them Read review
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
0 ratings
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plerion is an Australian, AI-driven cloud security platform, with an AI teammate. We help our customers achieve better security outcomes in less time, by simplifying cloud security. Challenges we h

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Plerion features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Plerion
    Company Website
    Year Founded
    2021
    HQ Location
    Sydney Australia
    Twitter
    @PlerionHQ
    137 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    39 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plerion is an Australian, AI-driven cloud security platform, with an AI teammate. We help our customers achieve better security outcomes in less time, by simplifying cloud security. Challenges we h

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Plerion features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Plerion
Company Website
Year Founded
2021
HQ Location
Sydney Australia
Twitter
@PlerionHQ
137 Twitter followers
LinkedIn® Page
www.linkedin.com
39 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Detection & Response fused with real-time Posture. Transform risk detection with dynamic posture and behavior analysis. Gain all the context necessary to effectively triage, investigate, and

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stream Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Detection & Response fused with real-time Posture. Transform risk detection with dynamic posture and behavior analysis. Gain all the context necessary to effectively triage, investigate, and

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Stream Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2020
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Khalish Y.
    KY
    It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Khalish Y.
KY
It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF