Introducing G2.ai, the future of software buying.Try now

Top Free Risk-Based Vulnerability Management Software

Check out our list of free Risk-Based Vulnerability Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Risk-Based Vulnerability Management Software to ensure you get the right product.

View Free Risk-Based Vulnerability Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
46 Risk-Based Vulnerability Management Products Available
(217)4.3 out of 5
20th Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Cisco Vulnerability Management (formerly Kenna.VM)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 76% Enterprise
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Vulnerability Management (formerly Kenna.VM) features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Reporting
    Average: 8.7
    8.7
    Vulnerability Intelligence
    Average: 8.6
    9.1
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rishabh S.
    RS
    Kenna Security: Streamlined excellence in vulnerability management. It redefines simplicity in securing your digital landscape from consolidated... Read review
    Harsh M.
    HM
    A clutter free minimal dashboard which shows a brief information on your assets, vulnerabilities and also possible fixes for vulnerabilities.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94,810 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 76% Enterprise
  • 17% Mid-Market
Cisco Vulnerability Management (formerly Kenna.VM) features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Reporting
Average: 8.7
8.7
Vulnerability Intelligence
Average: 8.6
9.1
Risk-Prioritization
Average: 8.7
Rishabh S.
RS
Kenna Security: Streamlined excellence in vulnerability management. It redefines simplicity in securing your digital landscape from consolidated... Read review
Harsh M.
HM
A clutter free minimal dashboard which shows a brief information on your assets, vulnerabilities and also possible fixes for vulnerabilities.... Read review
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
94,810 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(68)4.3 out of 5
12th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 47% Mid-Market
    • 34% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra VM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.6
    Vulnerability Intelligence
    Average: 8.6
    8.7
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JG
    Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
    JL
    Easy to use interface that allows us to scan our assets and identified vulnerabilities are categorized based on their severity automatically,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 47% Mid-Market
  • 34% Small-Business
Fortra VM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.6
Vulnerability Intelligence
Average: 8.6
8.7
Risk-Prioritization
Average: 8.7
JG
Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
JL
Easy to use interface that allows us to scan our assets and identified vulnerabilities are categorized based on their severity automatically,... Read review
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(77)4.4 out of 5
8th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:$22 /asset*
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.6
    8.9
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    UI
    It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
    Michael E.
    ME
    InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,035 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 31% Mid-Market
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.4
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.6
8.9
Risk-Prioritization
Average: 8.7
Verified User in Insurance
UI
It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
Michael E.
ME
InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,035 employees on LinkedIn®
Ownership
NASDAQ:RPD
(59)4.6 out of 5
21st Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYRISMA features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.2
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.6
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mark V.
    MV
    We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
    Verified User in Information Services
    UI
    It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYRISMA
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @CYRISMA_USA
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
CYRISMA features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.2
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.6
Risk-Prioritization
Average: 8.7
Mark V.
MV
We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
Verified User in Information Services
UI
It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
Seller Details
Seller
CYRISMA
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@CYRISMA_USA
40 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 67% Mid-Market
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.9
    Reporting
    Average: 8.7
    9.9
    Vulnerability Intelligence
    Average: 8.6
    9.9
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Krishna Chaitanya P.
    KP
    Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
    Tanuj M.
    TM
    Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    178 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 67% Mid-Market
  • 32% Small-Business
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.2
9.9
Reporting
Average: 8.7
9.9
Vulnerability Intelligence
Average: 8.6
9.9
Risk-Prioritization
Average: 8.7
Krishna Chaitanya P.
KP
Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
Tanuj M.
TM
Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
178 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.6
    9.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
    SV
    I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.6
9.0
Risk-Prioritization
Average: 8.7
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
SV
I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecOps Solution is a next-gen, agentless patch and vulnerability management platform that helps organizations fix vulnerabilities fast — without agents, manual effort, or complex setups. We automat

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 69% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecOps Solution features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.6
    9.6
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AM
    Great Platform with extremely intuitive UI and various testing capabilities. It was easy to set up and use. Test results were fast, consistent, and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Mountain View, California, USA
    Twitter
    @secopsolution
    35 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecOps Solution is a next-gen, agentless patch and vulnerability management platform that helps organizations fix vulnerabilities fast — without agents, manual effort, or complex setups. We automat

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 69% Small-Business
  • 25% Mid-Market
SecOps Solution features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.6
9.6
Risk-Prioritization
Average: 8.7
AM
Great Platform with extremely intuitive UI and various testing capabilities. It was easy to set up and use. Test results were fast, consistent, and... Read review
Seller Details
Year Founded
2021
HQ Location
Mountain View, California, USA
Twitter
@secopsolution
35 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
(46)4.9 out of 5
Optimized for quick response
5th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Starting at $499.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vRx by Vicarius features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.6
    9.5
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Vivi F.
    VF
    The proactive, fast, lightweight, and cost-efficient nature of automating the scanning and patching of vulnerabilities. Read review
    Ethan B.
    EB
    A very decent priced product for what's offered. You get a lot more than just patch management, it has a lot of different tools that can be... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vicarius
    Company Website
    Year Founded
    2016
    HQ Location
    New York, New York
    Twitter
    @vicariusltd
    2,172 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    112 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
vRx by Vicarius features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.8
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.6
9.5
Risk-Prioritization
Average: 8.7
Vivi F.
VF
The proactive, fast, lightweight, and cost-efficient nature of automating the scanning and patching of vulnerabilities. Read review
Ethan B.
EB
A very decent priced product for what's offered. You get a lot more than just patch management, it has a lot of different tools that can be... Read review
Seller Details
Seller
Vicarius
Company Website
Year Founded
2016
HQ Location
New York, New York
Twitter
@vicariusltd
2,172 Twitter followers
LinkedIn® Page
www.linkedin.com
112 employees on LinkedIn®
(97)4.1 out of 5
Optimized for quick response
26th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.2
    7.8
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.6
    8.1
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Herberth S.
    HS
    Their platform is easy to use, and having good integration with other brands facilitates its implementation, it is a solution that has several... Read review
    Verified User in Computer Software
    UC
    Having worked on some in-house AI driven security solutions I can say this gives a very nice turn-key solution. The fact it's a cloud native... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    126,982 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,526 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Enterprise
  • 32% Small-Business
Cortex Cloud features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.2
7.8
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.6
8.1
Risk-Prioritization
Average: 8.7
Herberth S.
HS
Their platform is easy to use, and having good integration with other brands facilitates its implementation, it is a solution that has several... Read review
Verified User in Computer Software
UC
Having worked on some in-house AI driven security solutions I can say this gives a very nice turn-key solution. The fact it's a cloud native... Read review
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
126,982 Twitter followers
LinkedIn® Page
www.linkedin.com
17,526 employees on LinkedIn®
(30)4.6 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the re

    Users
    No information available
    Industries
    • Airlines/Aviation
    • Computer & Network Security
    Market Segment
    • 57% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nucleus features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.6
    9.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Holly Hui Lin H.
    HH
    I like that it is easy to use Nucleus. You can create projects to separate prod and non-prod; you can filter by assets (Asset Groups, Asset Types,... Read review
    PS
    Vulnerability overview with different classifications. Filtering by environment and project really helpful. Interface is easy to work with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Sarasota, Florida
    Twitter
    @nucleussec
    548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the re

Users
No information available
Industries
  • Airlines/Aviation
  • Computer & Network Security
Market Segment
  • 57% Enterprise
  • 37% Mid-Market
Nucleus features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.6
9.0
Risk-Prioritization
Average: 8.7
Holly Hui Lin H.
HH
I like that it is easy to use Nucleus. You can create projects to separate prod and non-prod; you can filter by assets (Asset Groups, Asset Types,... Read review
PS
Vulnerability overview with different classifications. Filtering by environment and project really helpful. Interface is easy to work with... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
Sarasota, Florida
Twitter
@nucleussec
548 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
(63)4.6 out of 5
24th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 27% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Flashpoint Ignite is a platform that provides extensive collections of surface, deep, and dark web data for cybersecurity purposes, with features such as a search bar, keyword alerts, and integrations with messaging platforms.
    • Reviewers appreciate the platform's user-friendly interface, the ability to easily narrow down searches, the convenience of keyword alerts for tracking emerging threats, and the community feature that allows for collaboration and advice-seeking among users.
    • Users experienced issues with the platform's mobile browser compatibility, the lack of direct chat medium for discussing RFI cases, the generation of false positives from alerts, and the difficulty in navigating the dashboard.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Flashpoint features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.6
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2010
    HQ Location
    New York, NY
    Twitter
    @FlashpointIntel
    14,098 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    395 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Connect, collaborate, and remediate risk faster with timely and active intelligence. Gain visibility into intelligence landscapes across cyber threats, vulnerabilities, and physical security. With Ign

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 57% Enterprise
  • 27% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Flashpoint Ignite is a platform that provides extensive collections of surface, deep, and dark web data for cybersecurity purposes, with features such as a search bar, keyword alerts, and integrations with messaging platforms.
  • Reviewers appreciate the platform's user-friendly interface, the ability to easily narrow down searches, the convenience of keyword alerts for tracking emerging threats, and the community feature that allows for collaboration and advice-seeking among users.
  • Users experienced issues with the platform's mobile browser compatibility, the lack of direct chat medium for discussing RFI cases, the generation of false positives from alerts, and the difficulty in navigating the dashboard.
Flashpoint features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.6
6.7
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2010
HQ Location
New York, NY
Twitter
@FlashpointIntel
14,098 Twitter followers
LinkedIn® Page
www.linkedin.com
395 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – all

    Users
    No information available
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 62% Enterprise
    • 24% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KernelCare Enterprise features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • IS
    Setting up KernelCare is very simple. It just takes a few minutes to get installed on a device. Also, the process of installation of KernelCare... Read review
    Rohit C.
    RC
    Helps to maintain Kernel updated for our servers No need to reboot servers after installing the updates Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TuxCare
    HQ Location
    Palo Alto, US
    Twitter
    @TuxCare_
    1,160 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – all

Users
No information available
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 62% Enterprise
  • 24% Small-Business
KernelCare Enterprise features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
IS
Setting up KernelCare is very simple. It just takes a few minutes to get installed on a device. Also, the process of installation of KernelCare... Read review
Rohit C.
RC
Helps to maintain Kernel updated for our servers No need to reboot servers after installing the updates Read review
Seller Details
Seller
TuxCare
HQ Location
Palo Alto, US
Twitter
@TuxCare_
1,160 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
(24)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and manage

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 63% Enterprise
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAFE features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.6
    8.7
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    UC
    SAFE’s compliance module, its very comprehensive Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Palo Alto, US
    Twitter
    @safecrq
    3,299 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    902 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and manage

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 63% Enterprise
  • 21% Mid-Market
SAFE features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.6
8.7
Risk-Prioritization
Average: 8.7
Verified User in Computer & Network Security
UC
SAFE’s compliance module, its very comprehensive Read review
Seller Details
Company Website
Year Founded
2012
HQ Location
Palo Alto, US
Twitter
@safecrq
3,299 Twitter followers
LinkedIn® Page
www.linkedin.com
902 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.6
    8.6
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NS
    It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
    PS
    What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.6
8.6
Risk-Prioritization
Average: 8.7
NS
It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
PS
What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
442 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
(13)4.9 out of 5
Optimized for quick response
3rd Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

    Users
    No information available
    Industries
    • Consulting
    Market Segment
    • 46% Enterprise
    • 31% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PlexTrac features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.9
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.6
    9.9
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Medical Devices
    UM
    As part of an internal penetration testing team, PlexTrac has been a game changer for how we manage and deliver our assessments to the product... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PlexTrac
    Company Website
    Year Founded
    2016
    HQ Location
    Boise, Idaho
    Twitter
    @plextrac
    1,661 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

Users
No information available
Industries
  • Consulting
Market Segment
  • 46% Enterprise
  • 31% Small-Business
PlexTrac features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.9
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.6
9.9
Risk-Prioritization
Average: 8.7
Verified User in Medical Devices
UM
As part of an internal penetration testing team, PlexTrac has been a game changer for how we manage and deliver our assessments to the product... Read review
Seller Details
Seller
PlexTrac
Company Website
Year Founded
2016
HQ Location
Boise, Idaho
Twitter
@plextrac
1,661 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
(81)4.5 out of 5
Optimized for quick response
7th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syxsense is the world’s leading automated endpoint and vulnerability software provider. The Syxsense platform offers real-time device status, robust endpoint management, vulnerability scanning and rem

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syxsense features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    8.3
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FK
    This is a powerful tool that keeps the management easy. Read review
    Francis N.
    FN
    Syxsense’s patch management solution stands out for its user-friendly interface that simplifies the daunting task of identifying and patching... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syxsense
    Company Website
    Year Founded
    2012
    HQ Location
    Aliso Viejo, CA
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syxsense is the world’s leading automated endpoint and vulnerability software provider. The Syxsense platform offers real-time device status, robust endpoint management, vulnerability scanning and rem

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Mid-Market
  • 30% Small-Business
Syxsense features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
8.3
Risk-Prioritization
Average: 8.7
FK
This is a powerful tool that keeps the management easy. Read review
Francis N.
FN
Syxsense’s patch management solution stands out for its user-friendly interface that simplifies the daunting task of identifying and patching... Read review
Seller Details
Seller
Syxsense
Company Website
Year Founded
2012
HQ Location
Aliso Viejo, CA
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.6
    7.5
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ER
    The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
    Jon R.
    JR
    Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.6
7.5
Risk-Prioritization
Average: 8.7
ER
The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
Jon R.
JR
Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Evan B.
    EB
    The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
    Mark H.
    MH
    Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Evan B.
EB
The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
Mark H.
MH
Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cytix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    9.6
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • vikas D.
    VD
    It's realy greate to use and help to achive business requirements Read review
    Verified User in Information Technology and Services
    UI
    Reduces time and automation, supports third party apps Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cytix
    Year Founded
    2022
    HQ Location
    Manchester
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 36% Mid-Market
Cytix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
9.6
Risk-Prioritization
Average: 8.7
vikas D.
VD
It's realy greate to use and help to achive business requirements Read review
Verified User in Information Technology and Services
UI
Reduces time and automation, supports third party apps Read review
Seller Details
Seller
Cytix
Year Founded
2022
HQ Location
Manchester
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Titania Nipper features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    3.3
    Vulnerability Intelligence
    Average: 8.6
    5.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Frank B.
    FB
    The software does a great job creating an effective report that dives into security flaws with a network configuration. The ability for it to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Titania
    Year Founded
    2012
    HQ Location
    London, England
    Twitter
    @TitaniaLtd
    2,863 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Titania Nipper features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
3.3
Vulnerability Intelligence
Average: 8.6
5.0
Risk-Prioritization
Average: 8.7
Frank B.
FB
The software does a great job creating an effective report that dives into security flaws with a network configuration. The ability for it to... Read review
Seller Details
Seller
Titania
Year Founded
2012
HQ Location
London, England
Twitter
@TitaniaLtd
2,863 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.6
    10.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul W.
    RW
    Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
    Alan Salvador A.
    AA
    Data is mostly relevant, also dashboards can be granular or how we need them Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.6
10.0
Risk-Prioritization
Average: 8.7
Rahul W.
RW
Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
Alan Salvador A.
AA
Data is mostly relevant, also dashboards can be granular or how we need them Read review
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • H2Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Stanislav G.
    SG
    A fast and straightforward way to start building a compliance program around NIST. Self-service management and a price that is hard to beat. This... Read review
    Jonathan M.
    JM
    I love how the questionnaire guides you through different aspects of cybersecurity, and you have access to a comprehensive report in 24 hours. I... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    H2Cyber
    Year Founded
    2009
    HQ Location
    Prosper, Texas
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
H2Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Stanislav G.
SG
A fast and straightforward way to start building a compliance program around NIST. Self-service management and a price that is hard to beat. This... Read review
Jonathan M.
JM
I love how the questionnaire guides you through different aspects of cybersecurity, and you have access to a comprehensive report in 24 hours. I... Read review
Seller Details
Seller
H2Cyber
Year Founded
2009
HQ Location
Prosper, Texas
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.6
    5.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy... Read review
    MG
    Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Holm Security VMP features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.6
5.0
Risk-Prioritization
Average: 8.7
Verified User in Information Technology and Services
CI
The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy... Read review
MG
Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Read review
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 88% Small-Business
    • 13% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Senteon System Hardening features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    0.0
    No information available
    10.0
    Risk-Prioritization
    Average: 8.7
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • MG
    Senteon provides a solution for setting and managing the granular details of system hardening. Being able to easily deploy a configuration and take... Read review
    TS
    Ease of use and time saved being able to align system security configurations across the environment from one portal. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Senteon
    Year Founded
    2019
    HQ Location
    Marietta
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

Users
No information available
Industries
No information available
Market Segment
  • 88% Small-Business
  • 13% Mid-Market
Senteon System Hardening features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
0.0
No information available
10.0
Risk-Prioritization
Average: 8.7
MG
Senteon provides a solution for setting and managing the granular details of system hardening. Being able to easily deploy a configuration and take... Read review
TS
Ease of use and time saved being able to align system security configurations across the environment from one portal. Read review
Seller Details
Seller
Senteon
Year Founded
2019
HQ Location
Marietta
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phoenix Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    Simple UI level of customization Effortless User Experience with Simple UI Phoenix Security's platform offers a straightforward, intuitive user... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    Twitter
    @sec_phoenix
    259 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phoenix Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Information Technology and Services
UI
Simple UI level of customization Effortless User Experience with Simple UI Phoenix Security's platform offers a straightforward, intuitive user... Read review
Seller Details
Year Founded
2021
HQ Location
London, GB
Twitter
@sec_phoenix
259 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RankedRight features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Andy L.
    AL
    I'm really impressed with RankedRight - the platform and the team. They've taken onboard what I need and what I'm looking for, and the challenges... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RankedRight features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Andy L.
AL
I'm really impressed with RankedRight - the platform and the team. They've taken onboard what I need and what I'm looking for, and the challenges... Read review
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rescana is a cybersecurity company focused on Third-Party Risk Management (TPRM) and External Attack Surface Management (EASM). It was founded in 2016 and has evolved into a platform that uses AI-powe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rescana features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Omry M.
    OM
    Great workflows for managing security risks for third parties, multple integragions. User friendly UI+UX Discover organizations assent whitin... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rescana
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Rescana is a cybersecurity company focused on Third-Party Risk Management (TPRM) and External Attack Surface Management (EASM). It was founded in 2016 and has evolved into a platform that uses AI-powe

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Rescana features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Omry M.
OM
Great workflows for managing security risks for third parties, multple integragions. User friendly UI+UX Discover organizations assent whitin... Read review
Seller Details
Seller
Rescana
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The crowdsourcing platform for effective tests and real insights in UX, Accessibility, Quality and Safety. Whether you are developing a website, a mobile app or a software solution, we support the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UNGUESS features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consumer Goods
    CC
    I reached out to UNGUESS before launching a new website on the market. The requests were very specific and the timing was challenging, but the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    UNGUESS
    Year Founded
    2015
    HQ Location
    Milan, IT
    LinkedIn® Page
    www.linkedin.com
    384 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The crowdsourcing platform for effective tests and real insights in UX, Accessibility, Quality and Safety. Whether you are developing a website, a mobile app or a software solution, we support the

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 33% Small-Business
UNGUESS features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Consumer Goods
CC
I reached out to UNGUESS before launching a new website on the market. The requests were very specific and the timing was challenging, but the... Read review
Seller Details
Seller
UNGUESS
Year Founded
2015
HQ Location
Milan, IT
LinkedIn® Page
www.linkedin.com
384 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Khalish Y.
    KY
    It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Khalish Y.
KY
It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dan M.
    DM
    I help to run a complicated service which runs tens of thousands of rapidly evolving disparate processes across a distributed compute cluster.... Read review
    Verified User in Information Technology and Services
    AI
    I like how flexible their policy engine is, which allows me to spot the anomaly in the environment easily. The enforcement feature is helpful in... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Dan M.
DM
I help to run a complicated service which runs tens of thousands of rapidly evolving disparate processes across a distributed compute cluster.... Read review
Verified User in Information Technology and Services
AI
I like how flexible their policy engine is, which allows me to spot the anomaly in the environment easily. The enforcement feature is helpful in... Read review
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ASPIA is an Automated and Simplified security assessment and vulnerability management platform. ASPIA harnesses the power of security automation to measure and improve the efficiency and accuracy of e

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ASPIA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • HR
    Automated alerts and reports. Unified Dashboard. Analytics and graphs. Control over the security assessment process. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ASPIA is an Automated and Simplified security assessment and vulnerability management platform. ASPIA harnesses the power of security automation to measure and improve the efficiency and accuracy of e

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ASPIA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
HR
Automated alerts and reports. Unified Dashboard. Analytics and graphs. Control over the security assessment process. Read review
Seller Details
Year Founded
2018
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chariot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Chariot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@praetorianlabs
8,283 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Clear GRC is a customized platform which encompasses activities such as corporate governance, IT risk management and corporate compliance conforming to stated requirements. The objective of Clear GRC

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Clear GRC features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Clear GRC is a customized platform which encompasses activities such as corporate governance, IT risk management and corporate compliance conforming to stated requirements. The objective of Clear GRC

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Clear GRC features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CSH Vulnerability Management Platform is a comprehensive SaaS solution that helps system administrators and security professionals with the tools they need to identify, prioritize, and mitigate vulner

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CSH Vulnerability Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Brno, Czech Republic
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CSH Vulnerability Management Platform is a comprehensive SaaS solution that helps system administrators and security professionals with the tools they need to identify, prioritize, and mitigate vulner

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
CSH Vulnerability Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Brno, Czech Republic
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybellum empowers automotive OEMs and suppliers to identify and remediate security risks at scale, throughout the entire vehicle life cycle. Our agentless solution scans embedded software components

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybellum Security Suite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cybellum
    Year Founded
    2016
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybellum empowers automotive OEMs and suppliers to identify and remediate security risks at scale, throughout the entire vehicle life cycle. Our agentless solution scans embedded software components

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cybellum Security Suite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Cybellum
Year Founded
2016
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Eracent has 25 years' experience providing the highest quality foundational data, analysis, and reporting for IT Asset Management (ITAM), Software Asset Management (SAM), IT Service Management (ITSM),

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Eracent SBOM Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Eracent
    Year Founded
    2000
    HQ Location
    Riegelsville, Pennsylvania
    Twitter
    @eracent
    141 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    79 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Eracent has 25 years' experience providing the highest quality foundational data, analysis, and reporting for IT Asset Management (ITAM), Software Asset Management (SAM), IT Service Management (ITSM),

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Eracent SBOM Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Eracent
Year Founded
2000
HQ Location
Riegelsville, Pennsylvania
Twitter
@eracent
141 Twitter followers
LinkedIn® Page
www.linkedin.com
79 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Vulnerability Manager Plus features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SK
    we are using the Manage enigine for patch management it will be best tool for patch management as it is simple to manage patches in all the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zoho
    Year Founded
    1996
    HQ Location
    Austin, TX
    Twitter
    @Zoho
    103,834 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26,328 employees on LinkedIn®
    Phone
    +1 (888) 900-9646
Product Description
How are these determined?Information
This description is provided by the seller.

With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
ManageEngine Vulnerability Manager Plus features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
SK
we are using the Manage enigine for patch management it will be best tool for patch management as it is simple to manage patches in all the... Read review
Seller Details
Seller
Zoho
Year Founded
1996
HQ Location
Austin, TX
Twitter
@Zoho
103,834 Twitter followers
LinkedIn® Page
www.linkedin.com
26,328 employees on LinkedIn®
Phone
+1 (888) 900-9646
Entry Level Price:Starting at $1,800.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PDQ Detect is an attack surface management tool for Windows, Apple, and Linux devices. Secure your organization against high-risk, exploitable vulnerabilities by quickly identifying weaponized CVEs th

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PDQ Detect features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PDQ.com
    Year Founded
    2001
    HQ Location
    Salt Lake City, Utah, United States
    Twitter
    @admarsenal
    984 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    279 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PDQ Detect is an attack surface management tool for Windows, Apple, and Linux devices. Secure your organization against high-risk, exploitable vulnerabilities by quickly identifying weaponized CVEs th

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
PDQ Detect features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
PDQ.com
Year Founded
2001
HQ Location
Salt Lake City, Utah, United States
Twitter
@admarsenal
984 Twitter followers
LinkedIn® Page
www.linkedin.com
279 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vulnerability Management allows you to discover vulnerabilities in your network easily. It advises solving these weak spots and securing your environment without installing agents. Goodbye, vulnerabil

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecurityHive Vulnerability Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Rijswijk, The Netherlands
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Vulnerability Management allows you to discover vulnerabilities in your network easily. It advises solving these weak spots and securing your environment without installing agents. Goodbye, vulnerabil

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
SecurityHive Vulnerability Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
Rijswijk, The Netherlands
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Silobreaker is a platform-as-a-service (SaaS) offering aimed at providing intelligence teams with the necessary tools to effectively gather, analyse and disseminate data. It caters to a range of intel

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Silobreaker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Lalith K.
    LK
    I like the cyber threat Intelligence service that they provide. The product they offer is straightforward to map data and create a dashboard in a... Read review
    Aman P.
    AP
    The Inbuilt configuration covers all the use cases for the darkweb monitoring for the assest belongs to the organization Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    London, UK
    Twitter
    @Silobreaker
    1,925 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Silobreaker is a platform-as-a-service (SaaS) offering aimed at providing intelligence teams with the necessary tools to effectively gather, analyse and disseminate data. It caters to a range of intel

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Silobreaker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Lalith K.
LK
I like the cyber threat Intelligence service that they provide. The product they offer is straightforward to map data and create a dashboard in a... Read review
Aman P.
AP
The Inbuilt configuration covers all the use cases for the darkweb monitoring for the assest belongs to the organization Read review
Seller Details
Year Founded
2005
HQ Location
London, UK
Twitter
@Silobreaker
1,925 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Detection & Response fused with real-time Posture. Transform risk detection with dynamic posture and behavior analysis. Gain all the context necessary to effectively triage, investigate, and

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stream Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Detection & Response fused with real-time Posture. Transform risk detection with dynamic posture and behavior analysis. Gain all the context necessary to effectively triage, investigate, and

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Stream Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2020
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strobes RBVM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    5700 Tennyson Pkwy, # 372, Plano, TX, 75024
    Twitter
    @StrobesHQ
    207 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Strobes RBVM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
5700 Tennyson Pkwy, # 372, Plano, TX, 75024
Twitter
@StrobesHQ
207 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StyxView features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Vancouver, CA
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
StyxView features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Vancouver, CA
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VulnDB® is the most comprehensive vulnerability database and timely source of intelligence available. It allows organizations to search for and be alerted on the latest vulnerabilities, both in end-us

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VulnDB features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    New York, New York, United States
    Twitter
    @riskbased
    1,831 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    395 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VulnDB® is the most comprehensive vulnerability database and timely source of intelligence available. It allows organizations to search for and be alerted on the latest vulnerabilities, both in end-us

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VulnDB features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2010
HQ Location
New York, New York, United States
Twitter
@riskbased
1,831 Twitter followers
LinkedIn® Page
www.linkedin.com
395 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Zeguro Cyber Safety. Designed for small to midsize businesses, our Cyber Safety platform includes: cybersecurity traini

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zeguro features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abhishek T.
    AT
    The interface is very user-friendly. It's amazing to operate. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zeguro
    Twitter
    @Zeguroinc
    210 Twitter followers
    LinkedIn® Page
    linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Zeguro Cyber Safety. Designed for small to midsize businesses, our Cyber Safety platform includes: cybersecurity traini

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Zeguro features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Abhishek T.
AT
The interface is very user-friendly. It's amazing to operate. Read review
Seller Details
Seller
Zeguro
Twitter
@Zeguroinc
210 Twitter followers
LinkedIn® Page
linkedin.com
19 employees on LinkedIn®