G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net
The crowdsourcing platform for effective tests and real insights in UX, Accessibility, Quality and Safety. Whether you are developing a website, a mobile app or a software solution, we support the
Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its
WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis
Holistic. Automated. Real-time. Actifile automates data risk assessments, ongoing sensitive data monitoring and data protection.
Small businesses and Healthcare practices need cyber-security specialization. Not all IT companies have certified professionals or the access to specialized solutions they would need to identify, prev
Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co
ASPIA is an Automated and Simplified security assessment and vulnerability management platform. ASPIA harnesses the power of security automation to measure and improve the efficiency and accuracy of e
Auditive is a continuously monitored risk network connecting businesses and their vendors on one platform. Businesses can complete 80% of their vendor reviews in minutes and monitor their risk continu
Avertro brings science to cyber story-telling by providing a simple, yet sophisticated executive and board cyber platform that helps our customers tell a compelling story, right-size their cyber progr
Axio360 is the only complete solution for managing a cybersecurity program: from understanding capability maturity to optimizing financial exposure. Users can collaborate to assess their capabilities
Bitahoy's Cyber Risk Co-Pilot is an AI-powered platform designed to assist in IT risk management processes. Features: Quantitative Risk Assessment: The platform offers a method to evaluate r
Bizzy is a Cyberwise technology. Cyberwise is a cyber security company that has been providing penetration tests and similar consultancy services in IT and OT infrastructures for 20+ years. Bizzy soft
Security Risk Scorecard like Bitsight, Panorays, and Upguard.
Blacksmith InfoSec is a SaaS application that provides a complete information security program, built and priced for SMBs. Generate custom security policies in minutes, get a prioritized security road
The fastest, simplest and most cost-effective way for any service provider to secure their customers.
Built with, by, and for the CISO Community, Blue Lava’s Security Program Management platform (SPM™) empowers security leaders with a system of record to continuously measure, optimize, and communicate
Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos
Clear GRC is a customized platform which encompasses activities such as corporate governance, IT risk management and corporate compliance conforming to stated requirements. The objective of Clear GRC
cDFN WatchTower is a CAASM (Cyber Asset Attack Surface Management) solution that integrates risk-based vulnerability management, external attack surface monitoring, dark web surveillance, vendor risk
ConnectWise Vulnerability Management is a purpose-built MSP solution that helps strengthen a MSPs cybersecurity service offering through the reduction of risks and recommendations of security implemen
The Covail Vulnerability Management Solution provides you with an easy-to-understand and easy-to-use method of mitigating cyber-attacks through network assessments, vulnerability tracking, risk priori
Criminal IP Attack Surface Management solution that helps you proactively understand your cyber space's security posture by automatically detecting and monitoring all your cyber assets, while leveragi
CSH Vulnerability Management Platform is a comprehensive SaaS solution that helps system administrators and security professionals with the tools they need to identify, prioritize, and mitigate vulner
Cybellum empowers automotive OEMs and suppliers to identify and remediate security risks at scale, throughout the entire vehicle life cycle. Our agentless solution scans embedded software components
For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigat
Vulnerability assessment software with network scanning, vulnerabilities evaluation, risk assessment, reporting and remediation.
Eracent has 25 years' experience providing the highest quality foundational data, analysis, and reporting for IT Asset Management (ITAM), Software Asset Management (SAM), IT Service Management (ITSM),
An insight into next generations security orchestra platform - Enterprise Security in One Framework
Ethiack helps keep companies safe from cybercrime by combining Machine and Human Ethical Hacking for both in-depth and in-breadth security testing.
Don’t base your vulnerability prioritization on assumptions. Use predictive threat intelligence to make smarter and faster decisions on what to remediate, and when. Powered by Cyr3con threat intellig
HACK-X NODE is a Risk and Vulnerability Management PTaaS product delivering on-demand, continuous and scalable Security Assessments with a unique blend of automated scanning and in-depth manual penetr
Humanize Salience is the N1 quantified cyber risk management solution translated for C-level executives. Our solution helps organizations to proactively assess the hidden risks of cyber vulnerabi
Inspectiv is an all-in-one AppSec testing platform that simplifies the process of discovering, validating, and remediating vulnerabilities. By offering penetration testing, bug bounty programs, dynami
iSecurity Assessment is a Windows-based program for in-depth analysis of the full scope of the iSeries server (System i or AS/400) security strengths and weaknesses, pinpointing the security risks whi
Ivanti Neurons for App Security Orchestration & Correlation (ASOC) delivers full-stack visibility of application risk exposure from development to production. It works by unifying all application
Get a unified view of all assets and associated software vulnerabilities and misconfigurations, whether in the cloud, network devices, servers, web apps, APIs, databases, containers, and your source c
With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy
Nozomi Networks offers highly accurate, actionable intelligence and protection for integrated cybersecurity at scale. The detailed visibility and in-depth insight provided by Nozomi Networks lets us
nVisium empowers organizations to eliminate security vulnerabilities through proven in-depth assessments, remediation, and training programs. Our experienced team of security-savvy engineers help orga
Ostrich Cyber-Risk helps organizations reduce the complexity of identifying, quantifying and communicating cyber and operational risks related to their cybersecurity posture with its Birdseye™ SaaS so
A continuous controls monitoring platform
PDQ Detect is an attack surface management tool for Windows, Apple, and Linux devices. Secure your organization against high-risk, exploitable vulnerabilities by quickly identifying weaponized CVEs th
Automated IT Asset Discovery and Management
Rapixus is an information security software company founded in 2017, headquartered in Taichung, Taiwan, with a current team size of approximately 40 people. The company specializes in providing soluti
RiskDynamyx®is Australia's first and only dynamic security risk management application for commercial and industrial property anywhere. RiskDynamyx® been developed to replace the cyclical security ri
RiskNest from Alfahive makes understanding cyber risk more meaningful. It is a cyber risk automation start-up that provides organisations with a SaaS platform to automate the assessment, quantificati
The SAFE dashboard's intuitive interface allows you to investigate your cases and go over important evidence in real time.It helps you to access and analyze important statistics, track evidence, view
SAINT developed SAINTCloud® from the ground up to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to i
EXPERTS IN STANDARDS COMPLIANCE AND CYBERSECURITY
Your OPERATIONAL TECHNOLOGY (OT) NETWORK and associated IT network is your castle, protecting your business operations. Whilst traditional Security Information and Event Management (SIEM) solutions pr
SCYTHE is an adversary emulation platform (BAS+) catering to the commercial, government, and cybersecurity consulting market. The SCYTHE platform empowers Red, Blue, and Purple teams to swiftly constr
Seconize enables enterprises to manage their cyber risks through its continuous predictive risk intelligence technology Seconize DeRisk Center is an automated and continuous IT risk and compliance ma
Vulnerability Management as a Service (Full stack) is a continuous process to detect, prioritize & fix vulnerabilities. From infrastructure to code, VMaS offers full coverage encompassing your ent
Vulnerability Management allows you to discover vulnerabilities in your network easily. It advises solving these weak spots and securing your environment without installing agents. Goodbye, vulnerabil
Community-driven hybrid Active Directory security assessment tool. Purple Knight is an identity system security assessment tool used by thousands of organizations to quickly identify vulnerabiliti
Shield is a continuous exposure management platform built by penetration testers and developed for security service providers. In a simple, 3-step deployment, Shield instantly shows you how an attack
Tests and measures cyber readiness using real-world attack techniques safely executed in customer's live environment. From this we can determine if the cybersecurity systems are working, where problem
Silobreaker is a platform-as-a-service (SaaS) offering aimed at providing intelligence teams with the necessary tools to effectively gather, analyse and disseminate data. It caters to a range of intel
Software Vulnerability Manager allows you to identify, prioritize and remediate software vulnerabilities rapidly to dramatically reduce risk to your organization. Gain visibility over software vulnera
Cloud Detection & Response fused with real-time Posture. Transform risk detection with dynamic posture and behavior analysis. Gain all the context necessary to effectively triage, investigate, and
Strobes ASM stands out in the crowded asset management market for its intuitive interface, real-time scanning capabilities, and comprehensive data insights. Unlike many solutions that offer static, ou
Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors.
Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,
Tenacy is the SaaS platform that simplifies cybersecurity management for all IT security teams. Thanks to intelligent modeling of frameworks and risks, Tenacy interconnects all your cyber processes. A
VulnDB® is the most comprehensive vulnerability database and timely source of intelligence available. It allows organizations to search for and be alerted on the latest vulnerabilities, both in end-us
VULNERA is an end-to-end vulnerability management solution that accelerates vulnerability discovery, prioritization, and remediation. Continuous vulnerability scanning identifies assets, network ser
SecureVia simplifies securing and hardening business applications by giving you a prioritized list of vulnerabilities to be remediated. You don't need to be a security expert as we do the research and
Delivering Scalable Application Security for Enterprise Development teams.
AppSec Testing(AST) - Whatever your motivation, a proactive security push or a compliance compulsion, our AST service can help keep your application secure against external threats. Security Automati
Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Zeguro Cyber Safety. Designed for small to midsize businesses, our Cyber Safety platform includes: cybersecurity traini
Continuous security delivery fabric for modern enterprise infrastructure.