Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Vulnerability Management Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
176 Listings in Risk-Based Vulnerability Management Available
(273)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Arctic Wolf
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

    Users
    • IT Manager
    • IT Director
    Industries
    • Hospital & Health Care
    • Financial Services
    Market Segment
    • 71% Mid-Market
    • 19% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arctic Wolf Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    58
    Threat Detection
    47
    Ease of Use
    29
    Cybersecurity
    28
    Alerts
    18
    Cons
    Expensive
    10
    Learning Curve
    7
    False Positives
    6
    Inefficient Ticketing System
    6
    Cybersecurity Risks
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arctic Wolf features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Reporting
    Average: 8.7
    9.6
    Vulnerability Intelligence
    Average: 8.6
    9.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Eden Prairie, MN
    Twitter
    @AWNetworks
    4,173 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,983 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

Users
  • IT Manager
  • IT Director
Industries
  • Hospital & Health Care
  • Financial Services
Market Segment
  • 71% Mid-Market
  • 19% Enterprise
Arctic Wolf Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
58
Threat Detection
47
Ease of Use
29
Cybersecurity
28
Alerts
18
Cons
Expensive
10
Learning Curve
7
False Positives
6
Inefficient Ticketing System
6
Cybersecurity Risks
5
Arctic Wolf features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.5
Reporting
Average: 8.7
9.6
Vulnerability Intelligence
Average: 8.6
9.6
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Eden Prairie, MN
Twitter
@AWNetworks
4,173 Twitter followers
LinkedIn® Page
www.linkedin.com
2,983 employees on LinkedIn®
(138)4.6 out of 5
10th Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Recorded Future
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
    • Users like the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the support from the responsive and helpful team.
    • Reviewers experienced difficulties with the complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    Features
    64
    Threat Intelligence
    47
    Threat Detection
    45
    Insights
    42
    Cons
    Expensive
    28
    Complexity
    26
    Learning Curve
    19
    Information Overload
    18
    Difficult Learning
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.9
    Vulnerability Intelligence
    Average: 8.6
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    109,059 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,047 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence through rich context, intuitive visuals, and seamless integrations.
  • Users like the platform's ability to provide precise and actionable threat intelligence, its intuitive visuals, seamless integrations, and the support from the responsive and helpful team.
  • Reviewers experienced difficulties with the complex interface, high cost, steep learning curve, and overwhelming volume of data and alerts, which can lead to alert fatigue if not carefully fine-tuned.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
Features
64
Threat Intelligence
47
Threat Detection
45
Insights
42
Cons
Expensive
28
Complexity
26
Learning Curve
19
Information Overload
18
Difficult Learning
16
Recorded Future features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.9
Vulnerability Intelligence
Average: 8.6
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
109,059 Twitter followers
LinkedIn® Page
www.linkedin.com
1,047 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(474)4.3 out of 5
17th Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Palo Alto Cortex XSIAM
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    29
    Cybersecurity
    26
    Easy Integrations
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    16
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.5
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
    Ownership
    NYSE: PANW
Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
29
Cybersecurity
26
Easy Integrations
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
16
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.5
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.5
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
Ownership
NYSE: PANW
(119)4.6 out of 5
4th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 70% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    Threat Intelligence
    46
    Threat Detection
    37
    Insights
    34
    Customer Support
    30
    Cons
    Inefficient Alerts
    19
    Inefficient Alert System
    13
    False Positives
    10
    Integration Issues
    10
    Missing Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.6
    9.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,861 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    161 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 70% Enterprise
  • 20% Mid-Market
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
Threat Intelligence
46
Threat Detection
37
Insights
34
Customer Support
30
Cons
Inefficient Alerts
19
Inefficient Alert System
13
False Positives
10
Integration Issues
10
Missing Features
9
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.6
9.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,861 Twitter followers
LinkedIn® Page
www.linkedin.com
161 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    41
    Customer Support
    22
    Easy Integrations
    20
    Time-saving
    19
    Ease of Use
    18
    Cons
    Difficult Learning
    8
    Learning Curve
    8
    Complexity
    7
    Complex Setup
    7
    Learning Difficulty
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.9
    Reporting
    Average: 8.7
    9.9
    Vulnerability Intelligence
    Average: 8.6
    9.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    178 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 32% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
41
Customer Support
22
Easy Integrations
20
Time-saving
19
Ease of Use
18
Cons
Difficult Learning
8
Learning Curve
8
Complexity
7
Complex Setup
7
Learning Difficulty
7
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.9
Reporting
Average: 8.7
9.9
Vulnerability Intelligence
Average: 8.6
9.9
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
178 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
(110)4.5 out of 5
Optimized for quick response
6th Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Tenable Vulnerability Management
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    12
    Ease of Use
    8
    Automated Scanning
    7
    Scanning Efficiency
    7
    Features
    6
    Cons
    Insufficient Information
    4
    Lack of Information
    4
    Complexity
    3
    Difficult Learning
    3
    Expensive
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.6
    8.8
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
12
Ease of Use
8
Automated Scanning
7
Scanning Efficiency
7
Features
6
Cons
Insufficient Information
4
Lack of Information
4
Complexity
3
Difficult Learning
3
Expensive
3
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.6
8.8
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 62% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ServiceNow Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integration Capabilities
    8
    Integration Support
    7
    Ease of Use
    5
    Implementation Ease
    5
    Incident Management
    5
    Cons
    Difficult Setup
    3
    Integration Issues
    3
    Expensive
    2
    Learning Curve
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Security Operations features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    9.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    51,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30,776 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 62% Enterprise
  • 21% Small-Business
ServiceNow Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integration Capabilities
8
Integration Support
7
Ease of Use
5
Implementation Ease
5
Incident Management
5
Cons
Difficult Setup
3
Integration Issues
3
Expensive
2
Learning Curve
2
Licensing Issues
2
ServiceNow Security Operations features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
9.7
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
51,662 Twitter followers
LinkedIn® Page
www.linkedin.com
30,776 employees on LinkedIn®
(217)4.3 out of 5
20th Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Cisco Vulnerability Management (formerly Kenna.VM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 76% Enterprise
    • 17% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Vulnerability Management (formerly Kenna.VM) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    2
    Dashboard Design
    1
    Data Discovery
    1
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    API Limitations
    1
    Deployment Issues
    1
    Excessive Notifications
    1
    Filtering Issues
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Vulnerability Management (formerly Kenna.VM) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Reporting
    Average: 8.7
    8.7
    Vulnerability Intelligence
    Average: 8.6
    9.1
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 76% Enterprise
  • 17% Mid-Market
Cisco Vulnerability Management (formerly Kenna.VM) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
2
Dashboard Design
1
Data Discovery
1
Ease of Use
1
Implementation Ease
1
Cons
API Limitations
1
Deployment Issues
1
Excessive Notifications
1
Filtering Issues
1
Integration Issues
1
Cisco Vulnerability Management (formerly Kenna.VM) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Reporting
Average: 8.7
8.7
Vulnerability Intelligence
Average: 8.6
9.1
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(46)4.9 out of 5
Optimized for quick response
5th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Starting at $499.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • vRx by Vicarius Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    23
    Automation
    20
    Patch Management
    20
    Features
    14
    Vulnerability Identification
    13
    Cons
    Missing Features
    12
    Inaccurate Information
    3
    Inadequate Reporting
    3
    Poor Reporting
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vRx by Vicarius features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.6
    9.5
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vicarius
    Company Website
    Year Founded
    2016
    HQ Location
    New York, New York
    Twitter
    @vicariusltd
    2,172 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    112 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
vRx by Vicarius Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
23
Automation
20
Patch Management
20
Features
14
Vulnerability Identification
13
Cons
Missing Features
12
Inaccurate Information
3
Inadequate Reporting
3
Poor Reporting
3
Complexity
2
vRx by Vicarius features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.6
9.5
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Vicarius
Company Website
Year Founded
2016
HQ Location
New York, New York
Twitter
@vicariusltd
2,172 Twitter followers
LinkedIn® Page
www.linkedin.com
112 employees on LinkedIn®
(82)4.6 out of 5
18th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

    Users
    No information available
    Industries
    • Computer & Network Security
    • Financial Services
    Market Segment
    • 60% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Security Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    3
    Dashboard Design
    2
    Dashboard Usability
    2
    Data Discovery
    2
    Features
    2
    Cons
    Complex Queries
    2
    Complexity
    1
    Complex Setup
    1
    Difficult Setup
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Security Center features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    9.5
    Vulnerability Intelligence
    Average: 8.6
    9.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

Users
No information available
Industries
  • Computer & Network Security
  • Financial Services
Market Segment
  • 60% Enterprise
  • 23% Mid-Market
Tenable Security Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
3
Dashboard Design
2
Dashboard Usability
2
Data Discovery
2
Features
2
Cons
Complex Queries
2
Complexity
1
Complex Setup
1
Difficult Setup
1
False Positives
1
Tenable Security Center features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
9.5
Vulnerability Intelligence
Average: 8.6
9.4
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB
(166)4.4 out of 5
14th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

    Users
    • Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VMDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Features
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Alerting System
    1
    Cons
    Complexity
    2
    Complex Reporting
    1
    Complex Setup
    1
    Difficult Learning
    1
    Feature Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VMDR features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.7
    Vulnerability Intelligence
    Average: 8.6
    8.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,094 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,905 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

Users
  • Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 28% Mid-Market
Qualys VMDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Features
2
Vulnerability Detection
2
Vulnerability Identification
2
Alerting System
1
Cons
Complexity
2
Complex Reporting
1
Complex Setup
1
Difficult Learning
1
Feature Complexity
1
Qualys VMDR features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.7
Vulnerability Intelligence
Average: 8.6
8.4
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,094 Twitter followers
LinkedIn® Page
www.linkedin.com
2,905 employees on LinkedIn®
(138)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    46
    Security
    45
    Ease of Use
    43
    Automation
    32
    Vulnerability Detection
    32
    Cons
    Expensive
    12
    Limited Scope
    12
    Technical Issues
    11
    Limited Features
    10
    Inadequate Reporting
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.1
    Reporting
    Average: 8.7
    8.2
    Vulnerability Intelligence
    Average: 8.6
    8.5
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,347 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 38% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
46
Security
45
Ease of Use
43
Automation
32
Vulnerability Detection
32
Cons
Expensive
12
Limited Scope
12
Technical Issues
11
Limited Features
10
Inadequate Reporting
9
Pentera features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.1
Reporting
Average: 8.7
8.2
Vulnerability Intelligence
Average: 8.6
8.5
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,347 Twitter followers
LinkedIn® Page
www.linkedin.com
410 employees on LinkedIn®
(32)4.4 out of 5
22nd Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Deployment Ease
    1
    Ease of Use
    1
    Efficiency
    1
    Efficiency Improvement
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender Vulnerability Management features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.8
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    237,523 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 34% Enterprise
Microsoft Defender Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Deployment Ease
1
Ease of Use
1
Efficiency
1
Efficiency Improvement
1
Cons
This product has not yet received any negative sentiments.
Microsoft Defender Vulnerability Management features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.7
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.8
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
237,523 employees on LinkedIn®
Ownership
MSFT
(97)4.1 out of 5
Optimized for quick response
26th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    38
    Security
    36
    Features
    35
    Cloud Services
    28
    Cloud Integration
    27
    Cons
    Expensive
    24
    Learning Curve
    21
    Pricing Issues
    20
    Difficult Learning
    18
    Not User-Friendly
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.2
    7.8
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.6
    8.1
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 32% Small-Business
Cortex Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
38
Security
36
Features
35
Cloud Services
28
Cloud Integration
27
Cons
Expensive
24
Learning Curve
21
Pricing Issues
20
Difficult Learning
18
Not User-Friendly
17
Cortex Cloud features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.2
7.8
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.6
8.1
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,221 employees on LinkedIn®
(77)4.4 out of 5
8th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:$22 /asset*
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightVM (Nexpose) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    3
    Vulnerability Management
    3
    Automated Scanning
    2
    Dashboard Design
    2
    Dashboard Features
    2
    Cons
    Complexity
    2
    Difficult Setup
    2
    Inaccuracy Issues
    2
    Integration Issues
    2
    Lack of Remediation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.6
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 31% Mid-Market
InsightVM (Nexpose) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
3
Vulnerability Management
3
Automated Scanning
2
Dashboard Design
2
Dashboard Features
2
Cons
Complexity
2
Difficult Setup
2
Inaccuracy Issues
2
Integration Issues
2
Lack of Remediation
2
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.4
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.6
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
(13)4.9 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

    Users
    No information available
    Industries
    • Consulting
    Market Segment
    • 46% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PlexTrac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    7
    Ease of Use
    6
    Reporting Efficiency
    6
    Customer Support
    5
    Integrations
    4
    Cons
    Missing Features
    2
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PlexTrac features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.9
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.6
    9.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PlexTrac
    Company Website
    Year Founded
    2016
    HQ Location
    Boise, Idaho
    Twitter
    @plextrac
    1,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

Users
No information available
Industries
  • Consulting
Market Segment
  • 46% Enterprise
  • 31% Small-Business
PlexTrac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
7
Ease of Use
6
Reporting Efficiency
6
Customer Support
5
Integrations
4
Cons
Missing Features
2
Complexity
1
Complex Setup
1
Difficult Learning
1
Inadequate Reporting
1
PlexTrac features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.9
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.6
9.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
PlexTrac
Company Website
Year Founded
2016
HQ Location
Boise, Idaho
Twitter
@plextrac
1,661 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
(621)4.4 out of 5
Optimized for quick response
16th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Complete DevOps solution. CloudBees empowers your software delivery teams to transform your business. CloudBees solution brings together development, operations, IT, security, and business teams t

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudBees Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Reliability
    12
    Features
    11
    Deployment
    10
    Automation
    9
    Cons
    Expensive
    7
    Learning Difficulty
    4
    Slow Performance
    4
    Steep Learning Curve
    4
    Beginner Unfriendliness
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudBees features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.8
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudBees
    Company Website
    Year Founded
    2010
    HQ Location
    San Jose, CA
    Twitter
    @CloudBees
    39,782 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    581 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Complete DevOps solution. CloudBees empowers your software delivery teams to transform your business. CloudBees solution brings together development, operations, IT, security, and business teams t

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 40% Mid-Market
CloudBees Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Reliability
12
Features
11
Deployment
10
Automation
9
Cons
Expensive
7
Learning Difficulty
4
Slow Performance
4
Steep Learning Curve
4
Beginner Unfriendliness
3
CloudBees features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.8
Risk-Prioritization
Average: 8.7
Seller Details
Seller
CloudBees
Company Website
Year Founded
2010
HQ Location
San Jose, CA
Twitter
@CloudBees
39,782 Twitter followers
LinkedIn® Page
www.linkedin.com
581 employees on LinkedIn®
(22)4.9 out of 5
2nd Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    10
    Monitoring
    9
    Ease of Use
    6
    Threat Intelligence
    6
    Alerts
    5
    Cons
    Information Overload
    4
    Limited Features
    4
    Lack of Customization
    3
    Missing Features
    3
    Poor UI Design
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.7
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    9.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    14,043 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

Users
No information available
Industries
No information available
Market Segment
  • 41% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
10
Monitoring
9
Ease of Use
6
Threat Intelligence
6
Alerts
5
Cons
Information Overload
4
Limited Features
4
Lack of Customization
3
Missing Features
3
Poor UI Design
3
ThreatMon features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.7
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
9.4
Risk-Prioritization
Average: 8.7
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
14,043 Twitter followers
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
(46)4.3 out of 5
Optimized for quick response
19th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Starting at $5,000.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bugcrowd frees organizations with a low tolerance for risk from chronic talent shortages, noisy tools that breed false positives, and the fear of critical hidden or emerging vulnerabilities. Our SaaS

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 43% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bugcrowd Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    9
    Ease of Use
    7
    Team Quality
    7
    Features
    5
    Team Expertise
    5
    Cons
    Difficult Setup
    2
    Poor Customer Support
    2
    Slow Implementation
    2
    Additional Costs
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bugcrowd features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    8.9
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bugcrowd
    Company Website
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @Bugcrowd
    183,034 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,127 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bugcrowd frees organizations with a low tolerance for risk from chronic talent shortages, noisy tools that breed false positives, and the fear of critical hidden or emerging vulnerabilities. Our SaaS

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 43% Enterprise
  • 33% Small-Business
Bugcrowd Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
9
Ease of Use
7
Team Quality
7
Features
5
Team Expertise
5
Cons
Difficult Setup
2
Poor Customer Support
2
Slow Implementation
2
Additional Costs
1
Complexity
1
Bugcrowd features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
8.9
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Bugcrowd
Company Website
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@Bugcrowd
183,034 Twitter followers
LinkedIn® Page
www.linkedin.com
3,127 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecOps Solution is a next-gen, agentless patch and vulnerability management platform that helps organizations fix vulnerabilities fast — without agents, manual effort, or complex setups. We automat

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 69% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecOps Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Patch Management
    6
    Customer Support
    5
    Reporting
    5
    Detailed Explanation
    4
    Reporting Efficiency
    4
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecOps Solution features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.6
    9.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Mountain View, California, USA
    Twitter
    @secopsolution
    35 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecOps Solution is a next-gen, agentless patch and vulnerability management platform that helps organizations fix vulnerabilities fast — without agents, manual effort, or complex setups. We automat

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 69% Small-Business
  • 25% Mid-Market
SecOps Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Patch Management
6
Customer Support
5
Reporting
5
Detailed Explanation
4
Reporting Efficiency
4
Cons
This product has not yet received any negative sentiments.
SecOps Solution features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.6
9.6
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2021
HQ Location
Mountain View, California, USA
Twitter
@secopsolution
35 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
(59)4.6 out of 5
21st Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYRISMA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Customer Support
    13
    Features
    13
    Time-saving
    13
    Vulnerability Identification
    12
    Cons
    Missing Features
    6
    Learning Curve
    4
    Not User-Friendly
    4
    Poor Interface Design
    4
    Poor Navigation
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYRISMA features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.2
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYRISMA
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @CYRISMA_USA
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
CYRISMA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Customer Support
13
Features
13
Time-saving
13
Vulnerability Identification
12
Cons
Missing Features
6
Learning Curve
4
Not User-Friendly
4
Poor Interface Design
4
Poor Navigation
4
CYRISMA features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.2
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.6
Risk-Prioritization
Average: 8.7
Seller Details
Seller
CYRISMA
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@CYRISMA_USA
40 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
(44)4.6 out of 5
23rd Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 68% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Cyber Risk Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Risk Management
    6
    Assessment Process
    5
    Helpful
    5
    Ease of Use
    4
    Cons
    Poor Notifications
    3
    Delay Issues
    2
    Improvement Needed
    2
    Learning Curve
    2
    Vendor Management
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight Cyber Risk Intelligence features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    748 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 68% Enterprise
  • 30% Mid-Market
Bitsight Cyber Risk Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Risk Management
6
Assessment Process
5
Helpful
5
Ease of Use
4
Cons
Poor Notifications
3
Delay Issues
2
Improvement Needed
2
Learning Curve
2
Vendor Management
2
Bitsight Cyber Risk Intelligence features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,462 Twitter followers
LinkedIn® Page
www.linkedin.com
748 employees on LinkedIn®
(83)4.5 out of 5
11th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Automation
    23
    Vulnerability Identification
    23
    Automation Testing
    19
    Features
    16
    Cons
    Limited Scope
    8
    Missing Features
    8
    Limited Features
    7
    Complexity
    6
    Expensive
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RidgeBot features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.6
    9.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,280 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 46% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Automation
23
Vulnerability Identification
23
Automation Testing
19
Features
16
Cons
Limited Scope
8
Missing Features
8
Limited Features
7
Complexity
6
Expensive
6
RidgeBot features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.6
9.4
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,280 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BugBase is a Continuous Vulnerability Assessment Platform that conducts comprehensive security operations such as bug bounty programs and next-gen pentesting (VAPT) to assist startups and enterprises

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 60% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BugBase Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    26
    User Interface
    13
    Cybersecurity
    10
    Features
    10
    Team Collaboration
    9
    Cons
    Slow Performance
    8
    Expensive
    6
    Difficult Setup
    5
    Learning Curve
    5
    Difficult Learning
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BugBase features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.6
    9.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BugBase
    Year Founded
    2021
    HQ Location
    Singapore, US
    Twitter
    @BugBase
    1,654 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BugBase is a Continuous Vulnerability Assessment Platform that conducts comprehensive security operations such as bug bounty programs and next-gen pentesting (VAPT) to assist startups and enterprises

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 60% Small-Business
  • 20% Enterprise
BugBase Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
26
User Interface
13
Cybersecurity
10
Features
10
Team Collaboration
9
Cons
Slow Performance
8
Expensive
6
Difficult Setup
5
Learning Curve
5
Difficult Learning
4
BugBase features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.6
9.4
Risk-Prioritization
Average: 8.7
Seller Details
Seller
BugBase
Year Founded
2021
HQ Location
Singapore, US
Twitter
@BugBase
1,654 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
(106)4.2 out of 5
Optimized for quick response
24th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 67% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VulScan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Features
    20
    Scanning Efficiency
    20
    Automated Scanning
    17
    Reporting Features
    17
    Cons
    Inadequate Reporting
    9
    Limited Reporting
    9
    Setup Difficulties
    9
    UX Improvement
    9
    Difficult Setup
    8
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VulScan features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    7.6
    Reporting
    Average: 8.7
    7.9
    Vulnerability Intelligence
    Average: 8.6
    7.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,018 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 67% Small-Business
  • 31% Mid-Market
VulScan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Features
20
Scanning Efficiency
20
Automated Scanning
17
Reporting Features
17
Cons
Inadequate Reporting
9
Limited Reporting
9
Setup Difficulties
9
UX Improvement
9
Difficult Setup
8
VulScan features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
7.6
Reporting
Average: 8.7
7.9
Vulnerability Intelligence
Average: 8.6
7.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,550 Twitter followers
LinkedIn® Page
www.linkedin.com
5,018 employees on LinkedIn®
(68)4.3 out of 5
12th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 47% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortra VM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Reliability
    2
    Customer Support
    1
    Data Security
    1
    Ease of Use
    1
    Incident Management
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra VM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.6
    Vulnerability Intelligence
    Average: 8.6
    8.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 47% Mid-Market
  • 34% Small-Business
Fortra VM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Reliability
2
Customer Support
1
Data Security
1
Ease of Use
1
Incident Management
1
Cons
This product has not yet received any negative sentiments.
Fortra VM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.6
Vulnerability Intelligence
Average: 8.6
8.7
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
(54)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 63% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adlumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    14
    Ease of Use
    14
    Features
    14
    Visibility
    10
    Cybersecurity
    9
    Cons
    False Positives
    4
    Inefficient Alerting
    3
    Inefficient Alert System
    3
    Information Management
    3
    Insufficient Detail
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adlumin features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Reporting
    Average: 8.7
    8.7
    Vulnerability Intelligence
    Average: 8.6
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-able
    Company Website
    HQ Location
    Morrisville, North Carolina
    Twitter
    @Nable
    16,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,892 employees on LinkedIn®
    Ownership
    NYSE: NABL
Product Description
How are these determined?Information
This description is provided by the seller.

Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 63% Mid-Market
  • 20% Small-Business
Adlumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
14
Ease of Use
14
Features
14
Visibility
10
Cybersecurity
9
Cons
False Positives
4
Inefficient Alerting
3
Inefficient Alert System
3
Information Management
3
Insufficient Detail
3
Adlumin features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.1
Reporting
Average: 8.7
8.7
Vulnerability Intelligence
Average: 8.6
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
N-able
Company Website
HQ Location
Morrisville, North Carolina
Twitter
@Nable
16,217 Twitter followers
LinkedIn® Page
www.linkedin.com
1,892 employees on LinkedIn®
Ownership
NYSE: NABL
(63)4.6 out of 5
25th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

    Users
    No information available
    Industries
    • Financial Services
    • Security and Investigations
    Market Segment
    • 57% Enterprise
    • 27% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint Ignite is a platform that provides extensive collections of surface, deep, and dark web data for cybersecurity purposes, with features such as a search bar, keyword alerts, and integrations with messaging platforms.
    • Reviewers appreciate the platform's user-friendly interface, the ability to easily narrow down searches, the convenience of keyword alerts for tracking emerging threats, and the community feature that allows for collaboration and advice-seeking among users.
    • Users experienced issues with the platform's mobile browser compatibility, the lack of direct chat medium for discussing RFI cases, the generation of false positives from alerts, and the difficulty in navigating the dashboard.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Flashpoint Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    17
    Features
    16
    Search Functionality
    13
    Helpful
    12
    Insights
    11
    Cons
    Search Complexity
    6
    User Frustration
    6
    Information Overload
    5
    Lack of Features
    5
    Limited Features
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.6
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    14,098 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    395 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

Users
No information available
Industries
  • Financial Services
  • Security and Investigations
Market Segment
  • 57% Enterprise
  • 27% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint Ignite is a platform that provides extensive collections of surface, deep, and dark web data for cybersecurity purposes, with features such as a search bar, keyword alerts, and integrations with messaging platforms.
  • Reviewers appreciate the platform's user-friendly interface, the ability to easily narrow down searches, the convenience of keyword alerts for tracking emerging threats, and the community feature that allows for collaboration and advice-seeking among users.
  • Users experienced issues with the platform's mobile browser compatibility, the lack of direct chat medium for discussing RFI cases, the generation of false positives from alerts, and the difficulty in navigating the dashboard.
Flashpoint Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
17
Features
16
Search Functionality
13
Helpful
12
Insights
11
Cons
Search Complexity
6
User Frustration
6
Information Overload
5
Lack of Features
5
Limited Features
5
Flashpoint features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.6
6.7
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
14,098 Twitter followers
LinkedIn® Page
www.linkedin.com
395 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saner CVEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    23
    Ease of Use
    22
    Features
    19
    Customer Support
    16
    Patch Management
    14
    Cons
    Integration Issues
    8
    Expensive
    7
    Missing Features
    6
    Slow Performance
    6
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.6
    9.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
23
Ease of Use
22
Features
19
Customer Support
16
Patch Management
14
Cons
Integration Issues
8
Expensive
7
Missing Features
6
Slow Performance
6
Learning Curve
5
Saner CVEM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.6
9.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(57)4.2 out of 5
27th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aqua Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Security
    18
    User Interface
    11
    Vulnerability Detection
    11
    Vulnerability Identification
    11
    Cons
    Missing Features
    12
    Lack of Features
    7
    Limited Features
    6
    Improvement Needed
    5
    UX Improvement
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aqua Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    4.2
    Reporting
    Average: 8.7
    7.8
    Vulnerability Intelligence
    Average: 8.6
    7.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Burlington, US
    Twitter
    @AquaSecTeam
    7,598 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    583 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 56% Enterprise
  • 39% Mid-Market
Aqua Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Security
18
User Interface
11
Vulnerability Detection
11
Vulnerability Identification
11
Cons
Missing Features
12
Lack of Features
7
Limited Features
6
Improvement Needed
5
UX Improvement
5
Aqua Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
4.2
Reporting
Average: 8.7
7.8
Vulnerability Intelligence
Average: 8.6
7.2
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Burlington, US
Twitter
@AquaSecTeam
7,598 Twitter followers
LinkedIn® Page
www.linkedin.com
583 employees on LinkedIn®
(24)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and manage

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAFE features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.6
    8.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Palo Alto, US
    Twitter
    @safecrq
    3,299 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    902 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and manage

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Enterprise
  • 21% Mid-Market
SAFE features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.6
8.7
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Palo Alto, US
Twitter
@safecrq
3,299 Twitter followers
LinkedIn® Page
www.linkedin.com
902 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    9
    Threat Detection
    8
    Vulnerability Identification
    8
    Ease of Use
    7
    Features
    7
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
9
Threat Detection
8
Vulnerability Identification
8
Ease of Use
7
Features
7
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Complexity
2
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(81)4.5 out of 5
Optimized for quick response
7th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syxsense is the world’s leading automated endpoint and vulnerability software provider. The Syxsense platform offers real-time device status, robust endpoint management, vulnerability scanning and rem

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Syxsense Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Deployment Ease
    4
    Customer Support
    3
    Patch Management
    3
    Remote Access
    3
    Cons
    Delays
    2
    Needs Improvement
    2
    Patching Issues
    2
    Poor Customer Support
    2
    Access Control
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syxsense features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syxsense
    Company Website
    Year Founded
    2012
    HQ Location
    Aliso Viejo, CA
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syxsense is the world’s leading automated endpoint and vulnerability software provider. The Syxsense platform offers real-time device status, robust endpoint management, vulnerability scanning and rem

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Mid-Market
  • 30% Small-Business
Syxsense Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Deployment Ease
4
Customer Support
3
Patch Management
3
Remote Access
3
Cons
Delays
2
Needs Improvement
2
Patching Issues
2
Poor Customer Support
2
Access Control
1
Syxsense features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Syxsense
Company Website
Year Founded
2012
HQ Location
Aliso Viejo, CA
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – all

    Users
    No information available
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 62% Enterprise
    • 24% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KernelCare Enterprise features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TuxCare
    HQ Location
    Palo Alto, US
    Twitter
    @TuxCare_
    1,160 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – all

Users
No information available
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 62% Enterprise
  • 24% Small-Business
KernelCare Enterprise features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
TuxCare
HQ Location
Palo Alto, US
Twitter
@TuxCare_
1,160 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Certa is a SaaS based workflow automation platform that makes it easy for businesses to manage the lifecycle of their third parties. Certa’s powerful workflow engine enables businesses to streamline p

    Users
    No information available
    Industries
    • Retail
    • Financial Services
    Market Segment
    • 58% Enterprise
    • 22% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Certa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    11
    Implementation Ease
    7
    Customer Support
    6
    Integrations
    6
    Helpful
    5
    Cons
    Difficult Learning
    3
    Learning Curve
    3
    Implementation Issues
    2
    Integration Issues
    2
    Long Processing Time
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Certa features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Certa
    Year Founded
    2017
    HQ Location
    Saratoga, California
    Twitter
    @certa
    119 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Certa is a SaaS based workflow automation platform that makes it easy for businesses to manage the lifecycle of their third parties. Certa’s powerful workflow engine enables businesses to streamline p

Users
No information available
Industries
  • Retail
  • Financial Services
Market Segment
  • 58% Enterprise
  • 22% Small-Business
Certa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
11
Implementation Ease
7
Customer Support
6
Integrations
6
Helpful
5
Cons
Difficult Learning
3
Learning Curve
3
Implementation Issues
2
Integration Issues
2
Long Processing Time
2
Certa features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Certa
Year Founded
2017
HQ Location
Saratoga, California
Twitter
@certa
119 Twitter followers
LinkedIn® Page
www.linkedin.com
214 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Small-Business
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CODA Footprint features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.6
    9.1
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Greater Boston Area, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Small-Business
  • 18% Enterprise
CODA Footprint features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.1
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.6
9.1
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Greater Boston Area, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
(30)4.6 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the re

    Users
    No information available
    Industries
    • Airlines/Aviation
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nucleus features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.6
    9.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Sarasota, Florida
    Twitter
    @nucleussec
    548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the re

Users
No information available
Industries
  • Airlines/Aviation
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 37% Mid-Market
Nucleus features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.6
9.0
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2018
HQ Location
Sarasota, Florida
Twitter
@nucleussec
548 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Continuity Software Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    9
    Vulnerability Identification
    6
    Cybersecurity
    5
    Vulnerability Detection
    5
    Ease of Use
    4
    Cons
    Difficult Setup
    3
    Expensive
    3
    Integration Issues
    3
    Complexity
    2
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
9
Vulnerability Identification
6
Cybersecurity
5
Vulnerability Detection
5
Ease of Use
4
Cons
Difficult Setup
3
Expensive
3
Integration Issues
3
Complexity
2
Complex Setup
2
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.6
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
442 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HostedScan.com Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Affordable
    1
    Alert Notifications
    1
    Cloud Services
    1
    Communication
    1
    Cons
    Excessive Notifications
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.6
    7.5
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Affordable
1
Alert Notifications
1
Cloud Services
1
Communication
1
Cons
Excessive Notifications
1
Limited Features
1
HostedScan.com features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.6
7.5
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
(16)3.6 out of 5
28th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Brinqa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    2
    Coverage Effectiveness
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Security
    1
    Cons
    Cloud Dependency
    1
    Complex Setup
    1
    Difficult Learning
    1
    Information Management
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brinqa features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.7
    Reporting
    Average: 8.7
    5.6
    Vulnerability Intelligence
    Average: 8.6
    7.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    brinqa
    Year Founded
    2009
    HQ Location
    Austin, TX
    Twitter
    @brinqa
    487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 19% Mid-Market
Brinqa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
2
Coverage Effectiveness
1
Customer Support
1
Cybersecurity
1
Data Security
1
Cons
Cloud Dependency
1
Complex Setup
1
Difficult Learning
1
Information Management
1
Learning Curve
1
Brinqa features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
7.7
Reporting
Average: 8.7
5.6
Vulnerability Intelligence
Average: 8.6
7.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
brinqa
Year Founded
2009
HQ Location
Austin, TX
Twitter
@brinqa
487 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybeats is at the forefront of cybersecurity innovation and is focused explicitly on automating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) management. Our platfo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybeats features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYBEATS
    Year Founded
    2016
    HQ Location
    Toronto, Ontario
    Twitter
    @cybeatstech
    613 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybeats is at the forefront of cybersecurity innovation and is focused explicitly on automating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) management. Our platfo

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 33% Mid-Market
Cybeats features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CYBEATS
Year Founded
2016
HQ Location
Toronto, Ontario
Twitter
@cybeatstech
613 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Features
    7
    Security
    6
    Ease of Use
    5
    Pentesting Efficiency
    5
    Cons
    Slow Performance
    2
    Slow Scanning
    2
    Bugs
    1
    Difficult Setup
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Features
7
Security
6
Ease of Use
5
Pentesting Efficiency
5
Cons
Slow Performance
2
Slow Scanning
2
Bugs
1
Difficult Setup
1
Inadequate Reporting
1
Edgescan features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
(43)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 47% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroFox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    13
    Alerts
    10
    Alert Notifications
    9
    Ease of Use
    9
    Monitoring
    9
    Cons
    Inefficiency
    4
    Complexity
    3
    Missing Features
    3
    Confusing Interface
    2
    Data Breach
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroFox features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.6
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroFox
    Company Website
    Year Founded
    2013
    HQ Location
    Baltimore, MD
    Twitter
    @ZeroFOX
    5,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    847 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroFox is the architect of the world’s first unified end-to-end external cybersecurity platform. We empower security teams to regain the advantage against emergent threats by providing unprecedented

Users
No information available
Industries
  • Financial Services
Market Segment
  • 47% Mid-Market
  • 33% Enterprise
ZeroFox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
13
Alerts
10
Alert Notifications
9
Ease of Use
9
Monitoring
9
Cons
Inefficiency
4
Complexity
3
Missing Features
3
Confusing Interface
2
Data Breach
2
ZeroFox features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.6
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
ZeroFox
Company Website
Year Founded
2013
HQ Location
Baltimore, MD
Twitter
@ZeroFOX
5,262 Twitter followers
LinkedIn® Page
www.linkedin.com
847 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Created from three decades of expertise in security, risk, and compliance assurance, the TruOps governance, risk, and compliance platform transforms siloed risk functions into a comprehensive Risk Ope

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • TruOps Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    8
    Customizability
    7
    Customization
    6
    Integrations
    5
    Cons
    Complex Setup
    3
    Difficult Learning
    3
    Inadequate Reporting
    3
    Limited Reporting
    3
    Not Intuitive
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TruOps features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    6.0
    Reporting
    Average: 8.7
    7.7
    Vulnerability Intelligence
    Average: 8.6
    7.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TruOps
    HQ Location
    Norwalk, Connecticut
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Created from three decades of expertise in security, risk, and compliance assurance, the TruOps governance, risk, and compliance platform transforms siloed risk functions into a comprehensive Risk Ope

Users
No information available
Industries
No information available
Market Segment
  • 47% Enterprise
  • 47% Mid-Market
TruOps Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
8
Customizability
7
Customization
6
Integrations
5
Cons
Complex Setup
3
Difficult Learning
3
Inadequate Reporting
3
Limited Reporting
3
Not Intuitive
3
TruOps features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
6.0
Reporting
Average: 8.7
7.7
Vulnerability Intelligence
Average: 8.6
7.7
Risk-Prioritization
Average: 8.7
Seller Details
Seller
TruOps
HQ Location
Norwalk, Connecticut
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HeroDevs Never-Ending Support provides secure drop-in replacements and updates for end-of-life open source libraries, protecting businesses from vulnerabilities in deprecated software. Our team delive

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HeroDevs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Helpful
    4
    Support Availability
    4
    Customer Support
    3
    Security
    3
    Code Conversion
    2
    Cons
    Complex Implementation
    1
    Connectivity Issues
    1
    Dashboard Issues
    1
    Difficult Setup
    1
    Insufficient Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HeroDevs features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    6.0
    Reporting
    Average: 8.7
    7.3
    Vulnerability Intelligence
    Average: 8.6
    8.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HeroDevs
    Twitter
    @herodevs
    2,598 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

HeroDevs Never-Ending Support provides secure drop-in replacements and updates for end-of-life open source libraries, protecting businesses from vulnerabilities in deprecated software. Our team delive

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
HeroDevs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Helpful
4
Support Availability
4
Customer Support
3
Security
3
Code Conversion
2
Cons
Complex Implementation
1
Connectivity Issues
1
Dashboard Issues
1
Difficult Setup
1
Insufficient Documentation
1
HeroDevs features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
6.0
Reporting
Average: 8.7
7.3
Vulnerability Intelligence
Average: 8.6
8.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
HeroDevs
Twitter
@herodevs
2,598 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A complete platform to automate the most challenging aspects of access governance. Pathlock does this by focusing on the areas which offer the most impact when it comes to efficiency gains and cost sa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pathlock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    3
    Compliance Management
    2
    Customer Support
    2
    Features
    2
    Cons
    Confusing Interface
    1
    Confusing Terminology
    1
    Documentation
    1
    Error Handling
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pathlock features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    4.4
    Vulnerability Intelligence
    Average: 8.6
    5.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pathlock
    Company Website
    Year Founded
    2004
    HQ Location
    Dallas, US
    Twitter
    @pathlock
    306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    576 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A complete platform to automate the most challenging aspects of access governance. Pathlock does this by focusing on the areas which offer the most impact when it comes to efficiency gains and cost sa

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Small-Business
Pathlock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
3
Compliance Management
2
Customer Support
2
Features
2
Cons
Confusing Interface
1
Confusing Terminology
1
Documentation
1
Error Handling
1
Insufficient Information
1
Pathlock features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
4.4
Vulnerability Intelligence
Average: 8.6
5.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Pathlock
Company Website
Year Founded
2004
HQ Location
Dallas, US
Twitter
@pathlock
306 Twitter followers
LinkedIn® Page
www.linkedin.com
576 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The ThreatConnect Threat Intelligence Operations (TIOps) Platform lets organizations truly operationalize and evolve their cyber threat intel program, enabling cybersecurity operations teams to measur

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 58% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect Threat Intelligence Ops Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    3
    Threat Detection
    3
    Cybersecurity
    2
    Implementation Ease
    2
    Cons
    Inadequate Reporting
    1
    Navigation Issues
    1
    Poor Navigation
    1
    Poor Reporting
    1
    Software Bugs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect Threat Intelligence Ops Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,337 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    167 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The ThreatConnect Threat Intelligence Operations (TIOps) Platform lets organizations truly operationalize and evolve their cyber threat intel program, enabling cybersecurity operations teams to measur

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 58% Enterprise
  • 50% Mid-Market
ThreatConnect Threat Intelligence Ops Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
3
Threat Detection
3
Cybersecurity
2
Implementation Ease
2
Cons
Inadequate Reporting
1
Navigation Issues
1
Poor Navigation
1
Poor Reporting
1
Software Bugs
1
ThreatConnect Threat Intelligence Ops Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,337 Twitter followers
LinkedIn® Page
www.linkedin.com
167 employees on LinkedIn®
Entry Level Price:$128.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    8iSoft YODA, the ultimate AI-powered vulnerability remediation platform for tech professionals. YODA provides a comprehensive solution to the challenges of vulnerability management, significantly redu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 8iSoft YODA features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.6
    9.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    8iSoft
    Year Founded
    2020
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

8iSoft YODA, the ultimate AI-powered vulnerability remediation platform for tech professionals. YODA provides a comprehensive solution to the challenges of vulnerability management, significantly redu

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
8iSoft YODA features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.3
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.6
9.7
Risk-Prioritization
Average: 8.7
Seller Details
Seller
8iSoft
Year Founded
2020
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cytix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    4
    Customer Support
    3
    Automated Testing
    2
    Clear Interface
    2
    Ease of Use
    2
    Cons
    Confusing Interface
    1
    Difficult Learning
    1
    Expensive
    1
    False Positives
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cytix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    9.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cytix
    Year Founded
    2022
    HQ Location
    Manchester
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 36% Mid-Market
Cytix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
4
Customer Support
3
Automated Testing
2
Clear Interface
2
Ease of Use
2
Cons
Confusing Interface
1
Difficult Learning
1
Expensive
1
False Positives
1
Limited Customization
1
Cytix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
9.6
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Cytix
Year Founded
2022
HQ Location
Manchester
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DefenseStorm is a comprehensive cybersecurity platform specifically designed for financial institutions, focusing on cyber risk assessment, governance, security, and fraud prevention. This integrated

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 76% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DefenseStorm Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    14
    Team Quality
    8
    Ease of Use
    7
    Staff Expertise
    6
    Easy Integrations
    4
    Cons
    Difficult Navigation
    3
    Training Required
    3
    Asset Management
    2
    Difficult Organization
    2
    Inadequate Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DefenseStorm features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Reporting
    Average: 8.7
    5.0
    Vulnerability Intelligence
    Average: 8.6
    7.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Alpharetta, Georgia
    LinkedIn® Page
    www.linkedin.com
    90 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DefenseStorm is a comprehensive cybersecurity platform specifically designed for financial institutions, focusing on cyber risk assessment, governance, security, and fraud prevention. This integrated

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 76% Mid-Market
  • 24% Small-Business
DefenseStorm Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
14
Team Quality
8
Ease of Use
7
Staff Expertise
6
Easy Integrations
4
Cons
Difficult Navigation
3
Training Required
3
Asset Management
2
Difficult Organization
2
Inadequate Reporting
2
DefenseStorm features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
7.9
Reporting
Average: 8.7
5.0
Vulnerability Intelligence
Average: 8.6
7.9
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2014
HQ Location
Alpharetta, Georgia
LinkedIn® Page
www.linkedin.com
90 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Titania Nipper Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Titania Nipper features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    3.3
    Vulnerability Intelligence
    Average: 8.6
    5.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Titania
    Year Founded
    2012
    HQ Location
    London, England
    Twitter
    @TitaniaLtd
    2,863 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Titania Nipper Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Licensing Issues
1
Titania Nipper features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
3.3
Vulnerability Intelligence
Average: 8.6
5.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Titania
Year Founded
2012
HQ Location
London, England
Twitter
@TitaniaLtd
2,863 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    2
    Automation
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Discovery
    1
    Cons
    Lack of Automation
    1
    Lack of Integration
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    7.8
    Vulnerability Intelligence
    Average: 8.6
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Palo Alto, California
    Twitter
    @ArmisSecurity
    2,702 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Mid-Market
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
2
Automation
1
Customer Support
1
Cybersecurity
1
Data Discovery
1
Cons
Lack of Automation
1
Lack of Integration
1
Missing Features
1
Armis features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
7.8
Vulnerability Intelligence
Average: 8.6
6.7
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
Palo Alto, California
Twitter
@ArmisSecurity
2,702 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,142 employees on LinkedIn®
Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,429 Twitter followers
LinkedIn® Page
www.linkedin.com
1,142 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.6
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    586 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.6
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
586 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Reposify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    User Interface
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Reposify features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Reposify
    HQ Location
    San Francisco, California
    Twitter
    @reposify
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Reposify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
User Interface
1
Cons
Expensive
1
Reposify features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Reposify
HQ Location
San Francisco, California
Twitter
@reposify
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security leaders leverage Rivial's Data Security platform to accurately measure risk, automate compliance and easily manage their security program. Rivial leverages Monte Carlo analysis, Cyber Risk Q

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 90% Mid-Market
    • 10% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rivial Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Helpful
    6
    Document Management
    5
    Security
    5
    Communication
    4
    Compliance Management
    4
    Cons
    Learning Curve
    4
    Confusing Interface
    2
    Confusion
    2
    Difficult Learning
    2
    Lack of Clarity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rivial Data Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    West Lafayette, Indiana
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security leaders leverage Rivial's Data Security platform to accurately measure risk, automate compliance and easily manage their security program. Rivial leverages Monte Carlo analysis, Cyber Risk Q

Users
No information available
Industries
  • Financial Services
Market Segment
  • 90% Mid-Market
  • 10% Small-Business
Rivial Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Helpful
6
Document Management
5
Security
5
Communication
4
Compliance Management
4
Cons
Learning Curve
4
Confusing Interface
2
Confusion
2
Difficult Learning
2
Lack of Clarity
2
Rivial Data Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
West Lafayette, Indiana
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UncommonX is an Exposure Management solution designed to help customers achieve comprehensive, real-time visibility across their entire network. This innovative platform uses AI-powered software and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UncommonX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    24/7 Availability
    2
    Compliance Management
    2
    Cybersecurity
    2
    Dashboard Customization
    2
    Cons
    Communication Issues
    1
    Reporting Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UncommonX features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.6
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    UncommonX
    Company Website
    Year Founded
    2012
    HQ Location
    Chicago, US
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UncommonX is an Exposure Management solution designed to help customers achieve comprehensive, real-time visibility across their entire network. This innovative platform uses AI-powered software and m

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
UncommonX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
24/7 Availability
2
Compliance Management
2
Cybersecurity
2
Dashboard Customization
2
Cons
Communication Issues
1
Reporting Issues
1
Slow Performance
1
UncommonX features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.6
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
UncommonX
Company Website
Year Founded
2012
HQ Location
Chicago, US
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who unc

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 56% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • YesWeHack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Ease of Implementation
    3
    Features
    3
    Implementation Ease
    3
    Clear Interface
    2
    Cons
    Expensive
    3
    Pricing Issues
    2
    Bug Management
    1
    Complexity
    1
    Lack of Detail
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • YesWeHack features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    YesWeHack
    Year Founded
    2015
    HQ Location
    Paris, France
    LinkedIn® Page
    www.linkedin.com
    376 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who unc

Users
No information available
Industries
  • Computer Software
Market Segment
  • 56% Small-Business
  • 33% Mid-Market
YesWeHack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Ease of Implementation
3
Features
3
Implementation Ease
3
Clear Interface
2
Cons
Expensive
3
Pricing Issues
2
Bug Management
1
Complexity
1
Lack of Detail
1
YesWeHack features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
YesWeHack
Year Founded
2015
HQ Location
Paris, France
LinkedIn® Page
www.linkedin.com
376 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ArmorCode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    2
    Centralization
    1
    Cloud Management
    1
    Coverage Effectiveness
    1
    Cybersecurity
    1
    Cons
    Inadequate Reporting
    1
    Information Management
    1
    Information Overload
    1
    Limited Customization
    1
    Needs Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ArmorCode features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ArmorCode
    Year Founded
    2020
    HQ Location
    Palo Alto, California, United States
    LinkedIn® Page
    www.linkedin.com
    173 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
ArmorCode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
2
Centralization
1
Cloud Management
1
Coverage Effectiveness
1
Cybersecurity
1
Cons
Inadequate Reporting
1
Information Management
1
Information Overload
1
Limited Customization
1
Needs Improvement
1
ArmorCode features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
ArmorCode
Year Founded
2020
HQ Location
Palo Alto, California, United States
LinkedIn® Page
www.linkedin.com
173 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bacon Unlimited is a cross-platform endpoint management and vulnerability remediation platform designed to help IT teams manage vulnerabilities and system updates. Built for organizations that are tir

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bacon Unlimited Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Endpoint Management
    3
    Security
    3
    Cross-Platform Compatibility
    2
    Centralized Management
    1
    Customer Support
    1
    Cons
    Difficult Learning Curve
    1
    Difficulty in Use
    1
    Learning Curve
    1
    Missing Features
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bacon Unlimited features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Wilmington, US
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bacon Unlimited is a cross-platform endpoint management and vulnerability remediation platform designed to help IT teams manage vulnerabilities and system updates. Built for organizations that are tir

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Bacon Unlimited Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Endpoint Management
3
Security
3
Cross-Platform Compatibility
2
Centralized Management
1
Customer Support
1
Cons
Difficult Learning Curve
1
Difficulty in Use
1
Learning Curve
1
Missing Features
1
Poor Reporting
1
Bacon Unlimited features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2019
HQ Location
Wilmington, US
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hadrian features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hadrian
    Year Founded
    2021
    HQ Location
    Amsterdam, NL
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Hadrian features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Hadrian
Year Founded
2021
HQ Location
Amsterdam, NL
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Intelligence Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Insights
    4
    Detailed Analysis
    3
    Features
    3
    Accuracy of Information
    2
    Cons
    Difficult Learning
    3
    Difficult Learning Curve
    3
    Expensive
    3
    Learning Curve
    3
    Additional Costs
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Intelligence Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.6
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Splunk Intelligence Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Insights
4
Detailed Analysis
3
Features
3
Accuracy of Information
2
Cons
Difficult Learning
3
Difficult Learning Curve
3
Expensive
3
Learning Curve
3
Additional Costs
1
Splunk Intelligence Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.6
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threadfix features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @denimgroup
    1,390 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever.

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
Threadfix features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Twitter
@denimgroup
1,390 Twitter followers
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tromzo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Dashboard Design
    1
    Easy Integrations
    1
    Integration Capabilities
    1
    Cons
    Complex UI
    1
    Limited Features
    1
    Poor UI Design
    1
    Slow Loading
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tromzo features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.6
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tromzo
    Year Founded
    2021
    HQ Location
    Mountain View, CA
    Twitter
    @TromzoSecurity
    128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Tromzo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Dashboard Design
1
Easy Integrations
1
Integration Capabilities
1
Cons
Complex UI
1
Limited Features
1
Poor UI Design
1
Slow Loading
1
Slow Performance
1
Tromzo features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.6
6.7
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tromzo
Year Founded
2021
HQ Location
Mountain View, CA
Twitter
@TromzoSecurity
128 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Balbix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Design
    1
    Dashboard Usability
    1
    Cons
    Risk Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Design
1
Dashboard Usability
1
Cons
Risk Management
1
Balbix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BMC Helix Automation Console Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Simple
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Automation Console features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,760 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BMC Helix Automation Console Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Simple
1
Cons
This product has not yet received any negative sentiments.
BMC Helix Automation Console features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,477 Twitter followers
LinkedIn® Page
www.linkedin.com
9,760 employees on LinkedIn®
Phone
713 918 8800
(5)4.3 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyCognito features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, US
    Twitter
    @CyCognito
    10,545 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
CyCognito features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
CyCognito
Company Website
Year Founded
2017
HQ Location
Palo Alto, US
Twitter
@CyCognito
10,545 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Escape is the only DAST that works with your modern stack and tests business logic instead of missing headers Escape helps teams secure modern applications: • Document all your APIs in minutes a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Escape Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    5
    Cybersecurity
    3
    Easy Integrations
    3
    Customer Support
    2
    Cons
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    Difficult Learning Curve
    1
    Difficult Upgrades
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Escape features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    5.0
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Escape
    Year Founded
    2020
    HQ Location
    Paris, France
    Twitter
    @escapetechHQ
    334 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Escape is the only DAST that works with your modern stack and tests business logic instead of missing headers Escape helps teams secure modern applications: • Document all your APIs in minutes a

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 38% Mid-Market
Escape Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
5
Cybersecurity
3
Easy Integrations
3
Customer Support
2
Cons
Complexity
1
Complex Setup
1
Difficult Learning
1
Difficult Learning Curve
1
Difficult Upgrades
1
Escape features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
5.0
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Escape
Year Founded
2020
HQ Location
Paris, France
Twitter
@escapetechHQ
334 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortifyData Continuous Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Deployment Ease
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Kennesaw, Georgia
    Twitter
    @fortifydata
    87 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
FortifyData Continuous Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Deployment Ease
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Cons
This product has not yet received any negative sentiments.
FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Kennesaw, Georgia
Twitter
@fortifydata
87 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • H2Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    H2Cyber
    Year Founded
    2009
    HQ Location
    Prosper, Texas
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
H2Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
H2Cyber
Year Founded
2009
HQ Location
Prosper, Texas
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hacknoid features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hacknoid
    Year Founded
    2013
    HQ Location
    Montevideo, UY
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Hacknoid features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Hacknoid
Year Founded
2013
HQ Location
Montevideo, UY
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Holm Security VMP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Aware
    1
    Awareness Increase
    1
    Innovation
    1
    Scanning Efficiency
    1
    Cons
    False Positives
    1
    Scanning Issues
    1
    Technical Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    5.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Aware
1
Awareness Increase
1
Innovation
1
Scanning Efficiency
1
Cons
False Positives
1
Scanning Issues
1
Technical Issues
1
Holm Security VMP features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
5.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vul

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for RBVM features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,921 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vul

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Ivanti Neurons for RBVM features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,921 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetSPI PTaaS solves the challenges of traditional pentesting, using a powerful combination of people, processes, and technology to deliver contextualized outcomes in real time on a single platform. Mo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetSPI PTaaS (Penetration Testing as a Service) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Communication
    1
    Expertise
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetSPI PTaaS (Penetration Testing as a Service) features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetSPI
    Company Website
    Year Founded
    2001
    HQ Location
    Minneapolis, MN
    Twitter
    @NetSPI
    3,972 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    646 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetSPI PTaaS solves the challenges of traditional pentesting, using a powerful combination of people, processes, and technology to deliver contextualized outcomes in real time on a single platform. Mo

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 36% Mid-Market
NetSPI PTaaS (Penetration Testing as a Service) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Communication
1
Expertise
1
Cons
This product has not yet received any negative sentiments.
NetSPI PTaaS (Penetration Testing as a Service) features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
NetSPI
Company Website
Year Founded
2001
HQ Location
Minneapolis, MN
Twitter
@NetSPI
3,972 Twitter followers
LinkedIn® Page
www.linkedin.com
646 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    4
    Visibility
    3
    Features
    2
    Innovation
    2
    Risk Management
    2
    Cons
    Complex UI
    1
    Dashboard Issues
    1
    Expensive
    1
    Inadequate Security
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @RedHuntLabs
    3,617 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
4
Visibility
3
Features
2
Innovation
2
Risk Management
2
Cons
Complex UI
1
Dashboard Issues
1
Expensive
1
Inadequate Security
1
Inefficient Alert System
1
RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Twitter
@RedHuntLabs
3,617 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gain objective insight into your third-party security performance and IT landscape

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskRecon features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskRecon
    Year Founded
    2013
    HQ Location
    Salt Lake City, Utah
    Twitter
    @riskrecon
    657 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gain objective insight into your third-party security performance and IT landscape

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Enterprise
RiskRecon features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
RiskRecon
Year Founded
2013
HQ Location
Salt Lake City, Utah
Twitter
@riskrecon
657 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Small-Business
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Senteon System Hardening Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Policy Management
    2
    Simple
    2
    Automation
    1
    Compliance Management
    1
    Customer Support
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Senteon System Hardening features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    0.0
    No information available
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Senteon
    Year Founded
    2019
    HQ Location
    Marietta
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

Users
No information available
Industries
No information available
Market Segment
  • 88% Small-Business
  • 13% Mid-Market
Senteon System Hardening Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Policy Management
2
Simple
2
Automation
1
Compliance Management
1
Customer Support
1
Cons
Complexity
1
Difficult Learning
1
Learning Curve
1
Senteon System Hardening features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
0.0
No information available
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Senteon
Year Founded
2019
HQ Location
Marietta
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tripwire IP360 features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tripwire IP360 features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrueSight Vulnerability Management for Third-Party Applications features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,760 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
TrueSight Vulnerability Management for Third-Party Applications features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,477 Twitter followers
LinkedIn® Page
www.linkedin.com
9,760 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: compre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Visore Security Management Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rockville, MD
    LinkedIn® Page
    linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: compre

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Visore Security Management Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2019
HQ Location
Rockville, MD
LinkedIn® Page
linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AttackTree features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Isograph
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
AttackTree features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Isograph
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We pro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Autobahn Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.6
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We pro

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Autobahn Security features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.6
6.7
Risk-Prioritization
Average: 8.7
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Remediate features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,477 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,760 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
BMC Helix Remediate features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,477 Twitter followers
LinkedIn® Page
www.linkedin.com
9,760 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. Centraleyes provides an exceptional ability to see, understand

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centraleyes Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    1
    Compliance Simplification
    1
    Cybersecurity
    1
    Insights
    1
    Risk Management
    1
    Cons
    Filtering Issues
    1
    Inadequate Reporting
    1
    Lack of Clarity
    1
    Limited Reporting
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centraleyes features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. Centraleyes provides an exceptional ability to see, understand

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Centraleyes Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
1
Compliance Simplification
1
Cybersecurity
1
Insights
1
Risk Management
1
Cons
Filtering Issues
1
Inadequate Reporting
1
Lack of Clarity
1
Limited Reporting
1
Poor Reporting
1
Centraleyes features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CybelAngel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    2
    Accuracy of Information
    1
    Actionable Intelligence
    1
    Alert Notifications
    1
    Communication
    1
    Cons
    False Positives
    1
    Poor Detection Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CybelAngel features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Paris, FR
    Twitter
    @CybelAngel
    3,442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
CybelAngel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
2
Accuracy of Information
1
Actionable Intelligence
1
Alert Notifications
1
Communication
1
Cons
False Positives
1
Poor Detection Performance
1
CybelAngel features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Paris, FR
Twitter
@CybelAngel
3,442 Twitter followers
LinkedIn® Page
www.linkedin.com
169 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Echelon — your cybersecurity check-up solution. Just like a health check-up prevents illness, our AI-driven solution for ongoing cybersecurity audits prevents cyber threats — before they lead to fi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Echelon features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Abu Dhabi, AE
    Twitter
    @laolab_org
    101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Echelon — your cybersecurity check-up solution. Just like a health check-up prevents illness, our AI-driven solution for ongoing cybersecurity audits prevents cyber threats — before they lead to fi

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Echelon features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
HQ Location
Abu Dhabi, AE
Twitter
@laolab_org
101 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Faraday ingests thousands of vulnerabilities from various assets and visualizes findings in a clear, dynamic, and intuitive dashboard. It is a comprehensive vulnerability management tool that helps se

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Faraday Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Miami, US
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Faraday ingests thousands of vulnerabilities from various assets and visualizes findings in a clear, dynamic, and intuitive dashboard. It is a comprehensive vulnerability management tool that helps se

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Faraday Platform features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
Miami, US
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HackerOne Response is a leading Vulnerability Disclosure Program (VDP) platform, designed to streamline the management of third-party vulnerability reports. Ensure compliance and enhance collaboration

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 8% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HackerOne Response (VDP) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Discovery
    1
    Vulnerability Identification
    1
    Cons
    Excessive Notifications
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HackerOne Response (VDP) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HackerOne
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @Hacker0x01
    318,151 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,513 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HackerOne Response is a leading Vulnerability Disclosure Program (VDP) platform, designed to streamline the management of third-party vulnerability reports. Ensure compliance and enhance collaboration

Users
No information available
Industries
No information available
Market Segment
  • 8% Enterprise
HackerOne Response (VDP) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Discovery
1
Vulnerability Identification
1
Cons
Excessive Notifications
1
HackerOne Response (VDP) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
HackerOne
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@Hacker0x01
318,151 Twitter followers
LinkedIn® Page
www.linkedin.com
5,513 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hackuity.io features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hackuity
    Year Founded
    2018
    HQ Location
    Lyon, FR
    LinkedIn® Page
    www.linkedin.com
    38 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practi

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Hackuity.io features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Hackuity
Year Founded
2018
HQ Location
Lyon, FR
LinkedIn® Page
www.linkedin.com
38 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that ma

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NopSec Unified VRM features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NopSec
    HQ Location
    Brooklyn, NY
    Twitter
    @nopsec
    2,232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that ma

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
NopSec Unified VRM features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
NopSec
HQ Location
Brooklyn, NY
Twitter
@nopsec
2,232 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Phoenix Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Ease of Use
    1
    Easy Integrations
    1
    Monitoring
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phoenix Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    Twitter
    @sec_phoenix
    259 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phoenix Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Ease of Use
1
Easy Integrations
1
Monitoring
1
Cons
Complexity
1
Difficult Learning
1
Phoenix Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
London, GB
Twitter
@sec_phoenix
259 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PREDICTIVE - UNIFIED SECURITY AND OBSERVABILITY PLATFORM FOR ADVANCED THREAT DETECTION AND FASTER INCIDENT RESPONSE. Experience the power of Predictive, embed with ML and Artificial intelligence, it

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Predictive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Predictive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Cork, Ireland
    Twitter
    @tisalabs
    43 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

PREDICTIVE - UNIFIED SECURITY AND OBSERVABILITY PLATFORM FOR ADVANCED THREAT DETECTION AND FASTER INCIDENT RESPONSE. Experience the power of Predictive, embed with ML and Artificial intelligence, it

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Predictive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Features
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
Predictive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
Cork, Ireland
Twitter
@tisalabs
43 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prelude Detect features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Seattle, WA
    Twitter
    @preludeorg
    1,522 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Prelude Detect features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2020
HQ Location
Seattle, WA
Twitter
@preludeorg
1,522 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RankedRight features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RankedRight features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedSeal, the pioneer in network exposure analytics, delivers actionable insights to close defensive gaps across your entire network, in the cloud and on premises. Defenders gain the upper hand by know

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedSeal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RedSeal
    Year Founded
    2004
    Twitter
    @RedSeal_co
    2,247 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    182 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RedSeal, the pioneer in network exposure analytics, delivers actionable insights to close defensive gaps across your entire network, in the cloud and on premises. Defenders gain the upper hand by know

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RedSeal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
RedSeal
Year Founded
2004
Twitter
@RedSeal_co
2,247 Twitter followers
LinkedIn® Page
www.linkedin.com
182 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rescana is a cybersecurity company focused on Third-Party Risk Management (TPRM) and External Attack Surface Management (EASM). It was founded in 2016 and has evolved into a platform that uses AI-powe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rescana features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rescana
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Rescana is a cybersecurity company focused on Third-Party Risk Management (TPRM) and External Attack Surface Management (EASM). It was founded in 2016 and has evolved into a platform that uses AI-powe

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Rescana features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Rescana
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secureworks Taegis VDR delivers a fully integrated, comprehensive vulnerability management solution via an automated and configuration-free approach with machine learning and self-learning, and built-

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis VDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Secureworks Taegis VDR delivers a fully integrated, comprehensive vulnerability management solution via an automated and configuration-free approach with machine learning and self-learning, and built-

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Secureworks Taegis VDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entreda Unify is a cybersecurity platform built by Smarsh to automate your cybersecurity and compliance controls. It helps IT and Compliance leaders alike address their organization’s cybersecurity ri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smarsh Cyber Compliance features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Smarsh
    Year Founded
    2001
    HQ Location
    Portland, OR
    Twitter
    @SmarshInc
    5,732 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,522 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entreda Unify is a cybersecurity platform built by Smarsh to automate your cybersecurity and compliance controls. It helps IT and Compliance leaders alike address their organization’s cybersecurity ri

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smarsh Cyber Compliance features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Smarsh
Year Founded
2001
HQ Location
Portland, OR
Twitter
@SmarshInc
5,732 Twitter followers
LinkedIn® Page
www.linkedin.com
1,522 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Synack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    1
    Vulnerability Identification
    1
    Cons
    Asset Management
    1
    Poor Management
    1
    Poor Security Management
    1
    Poor Support Management
    1
    Security Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Synack features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Synack
    Twitter
    @synack
    26,896 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategi

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Enterprise
Synack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
1
Vulnerability Identification
1
Cons
Asset Management
1
Poor Management
1
Poor Security Management
1
Poor Support Management
1
Security Issues
1
Synack features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Synack
Twitter
@synack
26,896 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Identity Exposure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection Efficiency
    1
    Incident Management
    1
    Monitoring Efficiency
    1
    Real-time Monitoring
    1
    Threat Detection
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Identity Exposure features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Tenable Identity Exposure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection Efficiency
1
Incident Management
1
Monitoring Efficiency
1
Real-time Monitoring
1
Threat Detection
1
Cons
Expensive
1
Tenable Identity Exposure features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB