Introducing G2.ai, the future of software buying.Try now

Best Exposure Management Platforms

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Exposure management platforms contain software solutions that allow organizations to understand their attack surface and then enable them to address it. These platforms help continuously prevent and mitigate security risks. This suite of software solutions aims not only to prevent likely attacks but also to accurately report cyber risks to ensure there is no business interruption.

Oftentimes, exposure management products are composed of two distinct parts: attack surface management software and vulnerability scanner software. This combination of features makes exposure management platforms capable of continuously monitoring an organization’s network, assets, and cloud services while simultaneously monitoring applications and networks to identify security vulnerabilities. More often than not, exposure management platforms are packaged as a single product with these two types of software capabilities as features within it. These core software solutions for exposure management help organizations understand what cyber threats are attacking their business and what parts of the business are most vulnerable. These solutions also help companies to continuously identify, prevent, and understand attack surface threats and vulnerabilities.

Exposure management platforms sometimes offer risk-based vulnerability management functionality, which identifies and prioritizes vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning (ML) algorithms. Additionally, in some cloud environments, exposure management platforms may also include container-security features, which are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks.

To qualify for inclusion in the Exposure Management category, a product must:

Manage an organization’s exposure to potential cyber threats
Proactively identify security vulnerabilities
Monitor and identify potential security breaches continuously
Proactively block and remediate ongoing attacks
Report the above activity so the organization knows how to address potential cyber risks

Best Exposure Management Platforms At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
37 Listings in Exposure Management Platforms Available
(702)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Exposure Management Platforms software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • Security Engineer
    • CISO
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    100
    Features
    91
    Security
    86
    Visibility
    69
    Easy Setup
    68
    Cons
    Improvement Needed
    31
    Feature Limitations
    29
    Improvements Needed
    28
    Missing Features
    26
    Learning Curve
    24
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,423 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • Security Engineer
  • CISO
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
100
Features
91
Security
86
Visibility
69
Easy Setup
68
Cons
Improvement Needed
31
Feature Limitations
29
Improvements Needed
28
Missing Features
26
Learning Curve
24
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,423 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(143)4.9 out of 5
Optimized for quick response
1st Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

    Users
    • Security Engineer
    • Security Analyst
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 55% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cymulate: Security Validation and Exposure Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    63
    Features
    38
    Security
    36
    Customer Support
    32
    Vulnerability Identification
    30
    Cons
    Improvement Needed
    10
    Integration Issues
    8
    Lack of Integration
    6
    Inefficient Alert System
    5
    Complexity
    4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymulate
    Company Website
    Year Founded
    2016
    HQ Location
    Holon, Israel
    Twitter
    @CymulateLtd
    1,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    268 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

Users
  • Security Engineer
  • Security Analyst
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 55% Enterprise
  • 43% Mid-Market
Cymulate: Security Validation and Exposure Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
63
Features
38
Security
36
Customer Support
32
Vulnerability Identification
30
Cons
Improvement Needed
10
Integration Issues
8
Lack of Integration
6
Inefficient Alert System
5
Complexity
4
Seller Details
Seller
Cymulate
Company Website
Year Founded
2016
HQ Location
Holon, Israel
Twitter
@CymulateLtd
1,085 Twitter followers
LinkedIn® Page
www.linkedin.com
268 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 68% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    41
    Customer Support
    22
    Easy Integrations
    20
    Time-saving
    19
    Ease of Use
    18
    Cons
    Difficult Learning
    8
    Learning Curve
    8
    Complexity
    7
    Complex Setup
    7
    Learning Difficulty
    7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    178 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 68% Mid-Market
  • 31% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
41
Customer Support
22
Easy Integrations
20
Time-saving
19
Ease of Use
18
Cons
Difficult Learning
8
Learning Curve
8
Complexity
7
Complex Setup
7
Learning Difficulty
7
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
178 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
(138)4.5 out of 5
Optimized for quick response
6th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    46
    Security
    45
    Ease of Use
    43
    Automation
    32
    Vulnerability Detection
    32
    Cons
    Expensive
    12
    Limited Scope
    12
    Technical Issues
    11
    Limited Features
    10
    Inadequate Reporting
    9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,355 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    411 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 38% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
46
Security
45
Ease of Use
43
Automation
32
Vulnerability Detection
32
Cons
Expensive
12
Limited Scope
12
Technical Issues
11
Limited Features
10
Inadequate Reporting
9
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,355 Twitter followers
LinkedIn® Page
www.linkedin.com
411 employees on LinkedIn®
(46)4.9 out of 5
Optimized for quick response
4th Easiest To Use in Exposure Management Platforms software
Save to My Lists
Entry Level Price:Starting at $499.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • vRx by Vicarius Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    23
    Automation
    20
    Patch Management
    20
    Features
    14
    Vulnerability Identification
    13
    Cons
    Missing Features
    12
    Inaccurate Information
    3
    Inadequate Reporting
    3
    Poor Reporting
    3
    Complexity
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vicarius
    Company Website
    Year Founded
    2016
    HQ Location
    New York, New York
    Twitter
    @vicariusltd
    2,172 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    112 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
vRx by Vicarius Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
23
Automation
20
Patch Management
20
Features
14
Vulnerability Identification
13
Cons
Missing Features
12
Inaccurate Information
3
Inadequate Reporting
3
Poor Reporting
3
Complexity
2
Seller Details
Seller
Vicarius
Company Website
Year Founded
2016
HQ Location
New York, New York
Twitter
@vicariusltd
2,172 Twitter followers
LinkedIn® Page
www.linkedin.com
112 employees on LinkedIn®
(41)4.7 out of 5
3rd Easiest To Use in Exposure Management Platforms software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 51% Enterprise
    • 37% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is an external threat management solution that integrates functions such as intelligence gathering, monitoring, protection against digital risks, and takedown services.
    • Reviewers appreciate the platform's user-friendly interface, its proactive approach to cybersecurity, real-time threat detection, and the responsiveness of the support team.
    • Users experienced issues with the overwhelming amount of features and modules, lack of customization in reporting views, performance lag during peak usage times, and limitations in the takedown process.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CTM360 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Features
    8
    Detection
    7
    Threat Detection
    7
    Ease of Use
    6
    Cons
    Complexity
    2
    Limited Customization
    2
    Limited Features
    2
    Complex Searching
    1
    Complex Setup
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, Capital Governate
    Twitter
    @teamCTM360
    968 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 51% Enterprise
  • 37% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is an external threat management solution that integrates functions such as intelligence gathering, monitoring, protection against digital risks, and takedown services.
  • Reviewers appreciate the platform's user-friendly interface, its proactive approach to cybersecurity, real-time threat detection, and the responsiveness of the support team.
  • Users experienced issues with the overwhelming amount of features and modules, lack of customization in reporting views, performance lag during peak usage times, and limitations in the takedown process.
CTM360 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Features
8
Detection
7
Threat Detection
7
Ease of Use
6
Cons
Complexity
2
Limited Customization
2
Limited Features
2
Complex Searching
1
Complex Setup
1
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, Capital Governate
Twitter
@teamCTM360
968 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    11
    Vulnerability Detection
    11
    Vulnerability Identification
    9
    Ease of Use
    8
    Monitoring
    7
    Cons
    Cloud Dependency
    1
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Inefficient Alert System
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    34 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
11
Vulnerability Detection
11
Vulnerability Identification
9
Ease of Use
8
Monitoring
7
Cons
Cloud Dependency
1
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Inefficient Alert System
1
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
34 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
(83)4.5 out of 5
5th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Automation
    23
    Vulnerability Identification
    23
    Automation Testing
    19
    Features
    16
    Cons
    Limited Scope
    8
    Missing Features
    8
    Limited Features
    7
    Complexity
    6
    Expensive
    6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,281 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 46% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Automation
23
Vulnerability Identification
23
Automation Testing
19
Features
16
Cons
Limited Scope
8
Missing Features
8
Limited Features
7
Complexity
6
Expensive
6
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,281 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike Falcon Exposure Management gives complete attack-surface visibility and AI-powered vulnerability management to shut down adversary opportunities.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    6
    Risk Management
    3
    Ease of Use
    2
    Easy Integrations
    2
    Visibility
    2
    Cons
    Complex Setup
    2
    Complexity
    1
    Expensive
    1
    False Positives
    1
    Poor UI Design
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,236 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,347 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike Falcon Exposure Management gives complete attack-surface visibility and AI-powered vulnerability management to shut down adversary opportunities.

Users
No information available
Industries
No information available
Market Segment
  • 63% Mid-Market
  • 38% Enterprise
CrowdStrike Falcon Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
6
Risk Management
3
Ease of Use
2
Easy Integrations
2
Visibility
2
Cons
Complex Setup
2
Complexity
1
Expensive
1
False Positives
1
Poor UI Design
1
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,236 Twitter followers
LinkedIn® Page
www.linkedin.com
10,347 employees on LinkedIn®
Ownership
NASDAQ: CRWD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    9
    Threat Detection
    8
    Vulnerability Identification
    8
    Ease of Use
    7
    Features
    7
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Complexity
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
9
Threat Detection
8
Vulnerability Identification
8
Ease of Use
7
Features
7
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Complexity
2
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
(183)4.8 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 61% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Customer Support
    11
    Vulnerability Detection
    11
    Security
    9
    Vulnerability Identification
    9
    Cons
    Expensive
    5
    Limited Features
    4
    Complex Setup
    3
    Pricing Issues
    3
    Slow Scanning
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    955 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    80 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 61% Small-Business
  • 34% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Customer Support
11
Vulnerability Detection
11
Security
9
Vulnerability Identification
9
Cons
Expensive
5
Limited Features
4
Complex Setup
3
Pricing Issues
3
Slow Scanning
3
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
955 Twitter followers
LinkedIn® Page
www.linkedin.com
80 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saner CVEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Ease of Use
    22
    Features
    19
    Customer Support
    16
    Patch Management
    14
    Cons
    Integration Issues
    8
    Expensive
    7
    Missing Features
    6
    Slow Performance
    6
    Learning Curve
    5
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    559 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Ease of Use
22
Features
19
Customer Support
16
Patch Management
14
Cons
Integration Issues
8
Expensive
7
Missing Features
6
Slow Performance
6
Learning Curve
5
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
559 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(13)4.9 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

    Users
    No information available
    Industries
    • Consulting
    Market Segment
    • 46% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PlexTrac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    7
    Ease of Use
    6
    Reporting Efficiency
    6
    Customer Support
    5
    Integrations
    4
    Cons
    Missing Features
    2
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    Inadequate Reporting
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PlexTrac
    Company Website
    Year Founded
    2016
    HQ Location
    Boise, Idaho
    Twitter
    @plextrac
    1,665 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

Users
No information available
Industries
  • Consulting
Market Segment
  • 46% Enterprise
  • 31% Small-Business
PlexTrac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
7
Ease of Use
6
Reporting Efficiency
6
Customer Support
5
Integrations
4
Cons
Missing Features
2
Complexity
1
Complex Setup
1
Difficult Learning
1
Inadequate Reporting
1
Seller Details
Seller
PlexTrac
Company Website
Year Founded
2016
HQ Location
Boise, Idaho
Twitter
@plextrac
1,665 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UncommonX is an Exposure Management solution designed to help customers achieve comprehensive, real-time visibility across their entire network. This innovative platform uses AI-powered software and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UncommonX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    24/7 Availability
    2
    Compliance Management
    2
    Cybersecurity
    2
    Dashboard Customization
    2
    Cons
    Communication Issues
    1
    Reporting Issues
    1
    Slow Performance
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    UncommonX
    Company Website
    Year Founded
    2012
    HQ Location
    Chicago, US
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UncommonX is an Exposure Management solution designed to help customers achieve comprehensive, real-time visibility across their entire network. This innovative platform uses AI-powered software and m

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
UncommonX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
24/7 Availability
2
Compliance Management
2
Cybersecurity
2
Dashboard Customization
2
Cons
Communication Issues
1
Reporting Issues
1
Slow Performance
1
Seller Details
Seller
UncommonX
Company Website
Year Founded
2012
HQ Location
Chicago, US
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darwin Attack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Vulnerability Identification
    8
    Remediation Efficiency
    7
    Remediation Solutions
    6
    Communication
    5
    Cons
    Poor Notifications
    2
    Authentication Issues
    1
    Difficult Navigation
    1
    Filtering Problems
    1
    Inadequate Remediation
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chicago, Illinois
    Twitter
    @theevolvesec
    802 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 19% Small-Business
Darwin Attack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Vulnerability Identification
8
Remediation Efficiency
7
Remediation Solutions
6
Communication
5
Cons
Poor Notifications
2
Authentication Issues
1
Difficult Navigation
1
Filtering Problems
1
Inadequate Remediation
1
Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
802 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(5)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, US
    Twitter
    @CyCognito
    10,545 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
Seller Details
Seller
CyCognito
Company Website
Year Founded
2017
HQ Location
Palo Alto, US
Twitter
@CyCognito
10,545 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Features
    7
    Security
    6
    Ease of Use
    5
    Pentesting Efficiency
    5
    Cons
    Slow Performance
    2
    Slow Scanning
    2
    Bugs
    1
    Difficult Setup
    1
    Inadequate Reporting
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,304 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Features
7
Security
6
Ease of Use
5
Pentesting Efficiency
5
Cons
Slow Performance
2
Slow Scanning
2
Bugs
1
Difficult Setup
1
Inadequate Reporting
1
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,304 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Seattle, WA
    Twitter
    @preludeorg
    1,530 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Year Founded
2020
HQ Location
Seattle, WA
Twitter
@preludeorg
1,530 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    4
    Visibility
    3
    Features
    2
    Innovation
    2
    Risk Management
    2
    Cons
    Complex UI
    1
    Dashboard Issues
    1
    Expensive
    1
    Inadequate Security
    1
    Inefficient Alert System
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @RedHuntLabs
    3,622 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
4
Visibility
3
Features
2
Innovation
2
Risk Management
2
Cons
Complex UI
1
Dashboard Issues
1
Expensive
1
Inadequate Security
1
Inefficient Alert System
1
Seller Details
Twitter
@RedHuntLabs
3,622 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Risk Management
    6
    Assessment Process
    5
    Helpful
    5
    Ease of Use
    4
    Cons
    Poor Notifications
    3
    Delay Issues
    2
    Improvement Needed
    2
    Learning Curve
    2
    Vendor Management
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    740 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 30% Mid-Market
Bitsight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Risk Management
6
Assessment Process
5
Helpful
5
Ease of Use
4
Cons
Poor Notifications
3
Delay Issues
2
Improvement Needed
2
Learning Curve
2
Vendor Management
2
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,464 Twitter followers
LinkedIn® Page
www.linkedin.com
740 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cybersixgill Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    2
    Detailed Information
    2
    Actionable Intelligence
    1
    Customer Support
    1
    Customizability
    1
    Cons
    This product has not yet received any negative sentiments.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    740 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybersixgill was founded in 2014 with a single mission: To disrupt the threat intelligence sector by improving the availability of threat intelligence from the clear, deep and dark web. Fast forward

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Cybersixgill Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
2
Detailed Information
2
Actionable Intelligence
1
Customer Support
1
Customizability
1
Cons
This product has not yet received any negative sentiments.
Seller Details
Seller
Bitsight
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,464 Twitter followers
LinkedIn® Page
www.linkedin.com
740 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Detectify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Automation Testing
    3
    Automated Scanning
    2
    Customizability
    2
    Features
    2
    Cons
    Expensive
    2
    Complexity
    1
    Complex Queries
    1
    Complex Setup
    1
    Inaccuracy
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,353 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Automation Testing
3
Automated Scanning
2
Customizability
2
Features
2
Cons
Expensive
2
Complexity
1
Complex Queries
1
Complex Setup
1
Inaccuracy
1
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,353 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reveald's Epiphany Intelligence Platform offers advanced attack graph analysis of a client's digital estate, identifying the most likely path of exploitation and prioritizing vulnerabilities and misco

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    New York, NY, USA
    Twitter
    @RevealdCyber
    354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    46 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reveald's Epiphany Intelligence Platform offers advanced attack graph analysis of a client's digital estate, identifying the most likely path of exploitation and prioritizing vulnerabilities and misco

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2016
HQ Location
New York, NY, USA
Twitter
@RevealdCyber
354 Twitter followers
LinkedIn® Page
www.linkedin.com
46 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hacknoid
    Year Founded
    2013
    HQ Location
    Montevideo, UY
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Seller Details
Seller
Hacknoid
Year Founded
2013
HQ Location
Montevideo, UY
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    234,872 employees on LinkedIn®
    Ownership
    MSFT
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,134 Twitter followers
LinkedIn® Page
www.linkedin.com
234,872 employees on LinkedIn®
Ownership
MSFT
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Noetic’s full-stack visibility and effective controls monitoring empowers enterprises to see the full picture and truly understand significance of relationships between entities, so you can identify g

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Boston, Massachusetts
    Twitter
    @NoeticCyber
    121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Noetic’s full-stack visibility and effective controls monitoring empowers enterprises to see the full picture and truly understand significance of relationships between entities, so you can identify g

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
2020
HQ Location
Boston, Massachusetts
Twitter
@NoeticCyber
121 Twitter followers
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
(30)4.6 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the re

    Users
    No information available
    Industries
    • Airlines/Aviation
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 37% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Sarasota, Florida
    Twitter
    @nucleussec
    548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the re

Users
No information available
Industries
  • Airlines/Aviation
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 37% Mid-Market
Seller Details
Company Website
Year Founded
2018
HQ Location
Sarasota, Florida
Twitter
@nucleussec
548 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Offensity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Dashboard Usability
    1
    Ease of Use
    1
    Features
    1
    Innovation
    1
    Cons
    This product has not yet received any negative sentiments.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Offensity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Dashboard Usability
1
Ease of Use
1
Features
1
Innovation
1
Cons
This product has not yet received any negative sentiments.
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
266 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Red Sift ASM (Attack Surface Management), you can continuously discover, inventory and manage your business’s critical external-facing and cloud assets. With Red Sift ASM, you: 1) Get complete v

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Red Sift ASM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Automation Testing
    1
    Comprehensive Monitoring
    1
    Detection
    1
    Cons
    This product has not yet received any negative sentiments.
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Sift
    Year Founded
    2015
    HQ Location
    London, England, United Kingdom
    Twitter
    @redsift
    1,312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    110 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

With Red Sift ASM (Attack Surface Management), you can continuously discover, inventory and manage your business’s critical external-facing and cloud assets. With Red Sift ASM, you: 1) Get complete v

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Red Sift ASM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Automation Testing
1
Comprehensive Monitoring
1
Detection
1
Cons
This product has not yet received any negative sentiments.
Seller Details
Seller
Red Sift
Year Founded
2015
HQ Location
London, England, United Kingdom
Twitter
@redsift
1,312 Twitter followers
LinkedIn® Page
www.linkedin.com
110 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2007
    HQ Location
    Tampa, FL
    Twitter
    @ReliaQuest
    2,496 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    254 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReliaQuest exists to Make Security Possible. Our agentic AI-powered security operations platform, GreyMatter, allows security teams to detect threats at the source, and contain, investigate, and respo

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Company Website
Year Founded
2007
HQ Location
Tampa, FL
Twitter
@ReliaQuest
2,496 Twitter followers
LinkedIn® Page
www.linkedin.com
254 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Resilience is the only risk management solution that leverages real loss data to help you reduce your cyber risk. With our Edge Solution, you get our full range of tools to monitor and manage your cyb

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Resilience Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Ease of Use
    1
    Risk Management
    1
    Cons
    Complex Setup
    1
    Integration Issues
    1
    Setup Difficulties
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    New York, US
    Twitter
    @ResilienceSays
    354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    223 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Resilience is the only risk management solution that leverages real loss data to help you reduce your cyber risk. With our Edge Solution, you get our full range of tools to monitor and manage your cyb

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Resilience Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Ease of Use
1
Risk Management
1
Cons
Complex Setup
1
Integration Issues
1
Setup Difficulties
1
Seller Details
Year Founded
2016
HQ Location
New York, US
Twitter
@ResilienceSays
354 Twitter followers
LinkedIn® Page
www.linkedin.com
223 employees on LinkedIn®
(108)4.9 out of 5
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    38
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,528 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,917 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
38
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,528 Twitter followers
LinkedIn® Page
www.linkedin.com
2,917 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tanium Autonomous Endpoint Management (AEM) offers the most comprehensive solution for intelligently managing endpoints across industries, providing capabilities for asset discovery and inventory, end

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tanium Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    4
    Security
    3
    Asset Management
    2
    Easy Installation
    2
    Cons
    Complexity
    2
    Learning Curve
    2
    Difficult Learning
    1
    Inaccurate Information
    1
    Limited Features
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tanium
    Company Website
    Year Founded
    2007
    HQ Location
    Seattle area, WA
    Twitter
    @Tanium
    7,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,289 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tanium Autonomous Endpoint Management (AEM) offers the most comprehensive solution for intelligently managing endpoints across industries, providing capabilities for asset discovery and inventory, end

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Tanium Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
4
Security
3
Asset Management
2
Easy Installation
2
Cons
Complexity
2
Learning Curve
2
Difficult Learning
1
Inaccurate Information
1
Limited Features
1
Seller Details
Seller
Tanium
Company Website
Year Founded
2007
HQ Location
Seattle area, WA
Twitter
@Tanium
7,171 Twitter followers
LinkedIn® Page
www.linkedin.com
2,289 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,849 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,751 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,849 Twitter followers
LinkedIn® Page
www.linkedin.com
7,751 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trickest
    HQ Location
    Dover, Delaware
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trickest provides an innovative approach to offensive cybersecurity automation, assets, and vulnerability discovery. The platform combines extensive adversary tactics and techniques with full transpar

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Seller Details
Seller
Trickest
HQ Location
Dover, Delaware
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,914 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,914 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. By continuously uncovering hidden attack paths to businesses’ critical assets

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    XM Cyber
    Year Founded
    2016
    HQ Location
    Tel Aviv-Yafo, IL
    Twitter
    @XMCyber_
    3,249 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    398 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. By continuously uncovering hidden attack paths to businesses’ critical assets

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Seller Details
Seller
XM Cyber
Year Founded
2016
HQ Location
Tel Aviv-Yafo, IL
Twitter
@XMCyber_
3,249 Twitter followers
LinkedIn® Page
www.linkedin.com
398 employees on LinkedIn®