Introducing G2.ai, the future of software buying.Try now

Top Free Vulnerability Scanner Software

Check out our list of free Vulnerability Scanner Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Vulnerability Scanner Software to ensure you get the right product.

View Free Vulnerability Scanner Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
69 Vulnerability Scanner Products Available
(702)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,928 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,406 Twitter followers
LinkedIn® Page
www.linkedin.com
2,928 employees on LinkedIn®
(286)4.5 out of 5
Optimized for quick response
12th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 32% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abhishek Kumar G.
    AG
    1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
    DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    86,872 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,205 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 32% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Abhishek Kumar G.
AG
1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
86,872 Twitter followers
LinkedIn® Page
www.linkedin.com
2,205 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(221)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • Senior Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • Senior Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.7
Configuration Monitoring
Average: 8.4
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,853 Twitter followers
LinkedIn® Page
www.linkedin.com
456 employees on LinkedIn®
(182)4.8 out of 5
Optimized for quick response
6th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    9.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Consumer Goods
    EC
    Accurate and actionable results that my staff and I can easily understand and resolve. Intruder.io is constantly updated with the latest... Read review
    David C.
    DC
    Their quality of service and expertise are both of high standard and I'd have no hesitation in recommending to others who are serious about security. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    952 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
9.4
Configuration Monitoring
Average: 8.4
Verified User in Consumer Goods
EC
Accurate and actionable results that my staff and I can easily understand and resolve. Intruder.io is constantly updated with the latest... Read review
David C.
DC
Their quality of service and expertise are both of high standard and I'd have no hesitation in recommending to others who are serious about security. Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
952 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
(121)4.8 out of 5
23rd Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Burp Suite
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

    Users
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Burp Suite features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    8.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    UC
    The collection of functionalities and the ease of access and configuration is the best thing. There is also way more high-quality learning... Read review
    Siddharth V.
    SV
    It's UI is so easy to use and it's fast. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Knutsford, GB
    Twitter
    @Burp_Suite
    128,513 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    235 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

Users
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 31% Enterprise
Burp Suite features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
8.0
Configuration Monitoring
Average: 8.4
Verified User in Computer & Network Security
UC
The collection of functionalities and the ease of access and configuration is the best thing. There is also way more high-quality learning... Read review
Siddharth V.
SV
It's UI is so easy to use and it's fast. Read review
Seller Details
Year Founded
2008
HQ Location
Knutsford, GB
Twitter
@Burp_Suite
128,513 Twitter followers
LinkedIn® Page
www.linkedin.com
235 employees on LinkedIn®
(108)4.9 out of 5
5th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.8
    Detection Rate
    Average: 8.9
    9.8
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.8
Detection Rate
Average: 8.9
9.8
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(143)4.6 out of 5
Optimized for quick response
4th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$199.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management capabilities. Our comprehensive cybersecurity solutions blend automation and manual experti

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 67% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Astra Pentest features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    8.6
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ken C.
    KC
    I like how everything is online with limited human interaction. Even our Manual Pentest didn't require much work on my end before they could start.... Read review
    Hampus I.
    HI
    It's really helpful to know if and where we are vulnerable. Gives us confidence in development and growing the business. Also great customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    New Delhi, IN
    Twitter
    @getastra
    674 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    93 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management capabilities. Our comprehensive cybersecurity solutions blend automation and manual experti

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 67% Small-Business
  • 29% Mid-Market
Astra Pentest features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
8.6
Configuration Monitoring
Average: 8.4
Ken C.
KC
I like how everything is online with limited human interaction. Even our Manual Pentest didn't require much work on my end before they could start.... Read review
Hampus I.
HI
It's really helpful to know if and where we are vulnerable. Gives us confidence in development and growing the business. Also great customer... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
New Delhi, IN
Twitter
@getastra
674 Twitter followers
LinkedIn® Page
www.linkedin.com
93 employees on LinkedIn®
(99)4.1 out of 5
Optimized for quick response
48th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 39% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 8.9
    7.6
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    Price comparing other commercial scanners Read review
    MM
    Quick and easy configuration, installation and scanning. High performance, low false positive number, API integration with our ticketing and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    313 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 39% Enterprise
  • 35% Mid-Market
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 8.9
7.6
Configuration Monitoring
Average: 8.4
Verified User in Information Technology and Services
AI
Price comparing other commercial scanners Read review
MM
Quick and easy configuration, installation and scanning. High performance, low false positive number, API integration with our ticketing and... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,548 Twitter followers
LinkedIn® Page
www.linkedin.com
313 employees on LinkedIn®
(87)4.7 out of 5
35th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

    Users
    • CEO
    • Director
    Industries
    • Marketing and Advertising
    • Information Technology and Services
    Market Segment
    • 91% Small-Business
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Beagle Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NT
    Automatically prioritises high-risk vulnerabilities Scheduled recurring scans Scan multiple environments at the same time APi specific scan... Read review
    JB
    The simplicity of the solution. It's very easy to navigate, the portal works well and grouping of projects really helps track customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Francisco, US
    Twitter
    @beaglesecure
    207 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

Users
  • CEO
  • Director
Industries
  • Marketing and Advertising
  • Information Technology and Services
Market Segment
  • 91% Small-Business
  • 7% Mid-Market
Beagle Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
NT
Automatically prioritises high-risk vulnerabilities Scheduled recurring scans Scan multiple environments at the same time APi specific scan... Read review
JB
The simplicity of the solution. It's very easy to navigate, the portal works well and grouping of projects really helps track customer... Read review
Seller Details
Year Founded
2020
HQ Location
San Francisco, US
Twitter
@beaglesecure
207 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
(186)4.5 out of 5
39th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.5
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nico John C.
    NC
    It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
    Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 33% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.5
Configuration Monitoring
Average: 8.4
Nico John C.
NC
It optimizes our cost in the cloud and also check all the gaps in between the clouds that we had in production. Read review
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
(77)4.4 out of 5
13th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$22 /asset*
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    UI
    It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
    Michael E.
    ME
    InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 31% Mid-Market
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
Verified User in Insurance
UI
It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
Michael E.
ME
InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,406 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
(59)4.6 out of 5
31st Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYRISMA features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mark V.
    MV
    We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
    Verified User in Information Services
    UI
    It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYRISMA
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @CYRISMA_USA
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
CYRISMA features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Mark V.
MV
We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
Verified User in Information Services
UI
It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
Seller Details
Seller
CYRISMA
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@CYRISMA_USA
40 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
(66)4.6 out of 5
16th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$59.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Indusface WAS (Web Application Scanner) provides comprehensive managed dynamic application security testing (DAST) solution. It is a zero-touch, non-intrusive cloud-based solution that provides daily

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 53% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Indusface WAS features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • amrutha v.
    AV
    I am really happy to be connected with indusface, It has the best security complaince in place. The team is very well versed in their offerings and... Read review
    George Alex O.
    GO
    The easy-to-use interface of the platform Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Indusface
    Year Founded
    2012
    HQ Location
    Vadodara
    Twitter
    @Indusface
    3,519 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    170 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Indusface WAS (Web Application Scanner) provides comprehensive managed dynamic application security testing (DAST) solution. It is a zero-touch, non-intrusive cloud-based solution that provides daily

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 53% Small-Business
  • 36% Mid-Market
Indusface WAS features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
amrutha v.
AV
I am really happy to be connected with indusface, It has the best security complaince in place. The team is very well versed in their offerings and... Read review
George Alex O.
GO
The easy-to-use interface of the platform Read review
Seller Details
Seller
Indusface
Year Founded
2012
HQ Location
Vadodara
Twitter
@Indusface
3,519 Twitter followers
LinkedIn® Page
www.linkedin.com
170 employees on LinkedIn®
(68)4.3 out of 5
20th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 47% Mid-Market
    • 34% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra VM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.1
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JG
    Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
    JL
    Easy to use interface that allows us to scan our assets and identified vulnerabilities are categorized based on their severity automatically,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 47% Mid-Market
  • 34% Small-Business
Fortra VM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.1
Configuration Monitoring
Average: 8.4
JG
Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
JL
Easy to use interface that allows us to scan our assets and identified vulnerabilities are categorized based on their severity automatically,... Read review
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
(68)4.6 out of 5
32nd Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StackHawk is a comprehensive API security solution designed to help developer & security teams identify and remediate security vulnerabilities within their code. By integrating seamlessly into the

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StackHawk features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    5.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jonatas W.
    JW
    I like the ease of onboarding new applications. It is easy and practical, enhancing the security user experience in the application development... Read review
    Woody P.
    WP
    In no particular order: I love their UI/UX. It presents issues clearly, where I can easily give them to junior programmers to investigate & fix... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    StackHawk
    Company Website
    Year Founded
    2019
    HQ Location
    Denver, CO
    Twitter
    @StackHawk
    1,142 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StackHawk is a comprehensive API security solution designed to help developer & security teams identify and remediate security vulnerabilities within their code. By integrating seamlessly into the

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 35% Mid-Market
StackHawk features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
5.3
Configuration Monitoring
Average: 8.4
Jonatas W.
JW
I like the ease of onboarding new applications. It is easy and practical, enhancing the security user experience in the application development... Read review
Woody P.
WP
In no particular order: I love their UI/UX. It presents issues clearly, where I can easily give them to junior programmers to investigate & fix... Read review
Seller Details
Seller
StackHawk
Company Website
Year Founded
2019
HQ Location
Denver, CO
Twitter
@StackHawk
1,142 Twitter followers
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ryan J.
    RJ
    Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
    Verified User in Marketing and Advertising
    AM
    Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    312 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity® Solution features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.9
Configuration Monitoring
Average: 8.4
Ryan J.
RJ
Defendify explains each part of the security process. You don't need expertise. They will guide you in best practices and provide templates for... Read review
Verified User in Marketing and Advertising
AM
Defendify has a full suite of Cybersecurity products that are easy to manage and cover a range of IT needs. Read review
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
312 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
(63)4.7 out of 5
26th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • APPCHECK features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Detection Rate
    Average: 8.9
    9.6
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Vincent G.
    VG
    We have subscribed to AppCheck for automated pen testing as well as manual testing. We use it weekly to check our code base and to ensure we... Read review
    Fernando M.
    FM
    Through and custom scanning options, easy to use and great customer service from initial contact to onboarding. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    APPCHECK
    Company Website
    Year Founded
    2014
    HQ Location
    Leeds, GB
    Twitter
    @AppcheckNG
    657 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 30% Small-Business
APPCHECK features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.1
Detection Rate
Average: 8.9
9.6
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Vincent G.
VG
We have subscribed to AppCheck for automated pen testing as well as manual testing. We use it weekly to check our code base and to ensure we... Read review
Fernando M.
FM
Through and custom scanning options, easy to use and great customer service from initial contact to onboarding. Read review
Seller Details
Seller
APPCHECK
Company Website
Year Founded
2014
HQ Location
Leeds, GB
Twitter
@AppcheckNG
657 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
(51)4.5 out of 5
51st Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at €82.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.9
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    Easy to use. At the same time it saves us a lot of the guessing work. Read review
    Verified User in Gambling & Casinos
    AG
    The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,354 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.9
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Verified User in Computer Software
AC
Easy to use. At the same time it saves us a lot of the guessing work. Read review
Verified User in Gambling & Casinos
AG
The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,354 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
(74)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    9.1
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
    SV
    I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
9.1
Configuration Monitoring
Average: 8.4
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
SV
I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
557 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(99)4.3 out of 5
46th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

    Users
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 45% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SaltStack features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.3
    Detection Rate
    Average: 8.9
    7.7
    Automated Scans
    Average: 8.9
    9.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    AF
    I like that SaltStack Enterprise and Salt formulas make configuration management scalable. Read review
    Verified User in Banking
    AB
    I'm a smaller organization that needs assistance with hardening systems. SaltStack SecOPS does just that with ease. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    60,101 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    59,194 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

Users
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 45% Enterprise
  • 32% Mid-Market
SaltStack features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.3
Detection Rate
Average: 8.9
7.7
Automated Scans
Average: 8.9
9.0
Configuration Monitoring
Average: 8.4
Verified User in Financial Services
AF
I like that SaltStack Enterprise and Salt formulas make configuration management scalable. Read review
Verified User in Banking
AB
I'm a smaller organization that needs assistance with hardening systems. SaltStack SecOPS does just that with ease. Read review
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
60,101 Twitter followers
LinkedIn® Page
www.linkedin.com
59,194 employees on LinkedIn®
Ownership
NASDAQ: CA
(113)4.4 out of 5
10th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • EM
    AlienVault has given us the opportunity to get a better look at what is going on within the network of our organization. The events shown have... Read review
    Joe L.
    JL
    In comparison to other SIEM tools, the cost vs feature prospect is very good. USM offers all the basics you would expect from a SIEM tool in an... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    890,284 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    178,523 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
EM
AlienVault has given us the opportunity to get a better look at what is going on within the network of our organization. The events shown have... Read review
Joe L.
JL
In comparison to other SIEM tools, the cost vs feature prospect is very good. USM offers all the basics you would expect from a SIEM tool in an... Read review
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
890,284 Twitter followers
LinkedIn® Page
www.linkedin.com
178,523 employees on LinkedIn®
Ownership
NYSE: T
(55)4.7 out of 5
Optimized for quick response
18th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 78% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    7.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    Our dev team loves the self-serve approach on Aikido. Read review
    Tamara F.
    TF
    I love couple of things - first one is that it is really-really user friendly. For me interface is really user friendly, it was very quick to set... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    2,538 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido is an application security (AppSec) platform specifically designed for developers who prioritize their coding tasks over managing security alerts. Our innovative solution consolidates nine esse

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 78% Small-Business
  • 22% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.4
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
7.7
Configuration Monitoring
Average: 8.4
Verified User in Information Technology and Services
UI
Our dev team loves the self-serve approach on Aikido. Read review
Tamara F.
TF
I love couple of things - first one is that it is really-really user friendly. For me interface is really user friendly, it was very quick to set... Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
2,538 Twitter followers
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
(49)4.5 out of 5
41st Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Contrast Security is the global leader in Application Detection and Response (ADR), empowering organizations to see and stop attacks on applications and APIs in real time. Contrast embeds patented thr

    Users
    No information available
    Industries
    • Insurance
    • Information Technology and Services
    Market Segment
    • 67% Enterprise
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Contrast Security features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    EI
    Contrast delivers easy and fast vulnerability data about our applications (IDE environments) that continues through production with the RASP... Read review
    SANTHOSH KUMAR D.
    SD
    It's free to some extent Fast then most security scanners Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Pleasanton, CA
    Twitter
    @contrastsec
    5,553 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    265 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Contrast Security is the global leader in Application Detection and Response (ADR), empowering organizations to see and stop attacks on applications and APIs in real time. Contrast embeds patented thr

Users
No information available
Industries
  • Insurance
  • Information Technology and Services
Market Segment
  • 67% Enterprise
  • 20% Mid-Market
Contrast Security features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Insurance
EI
Contrast delivers easy and fast vulnerability data about our applications (IDE environments) that continues through production with the RASP... Read review
SANTHOSH KUMAR D.
SD
It's free to some extent Fast then most security scanners Read review
Seller Details
Company Website
Year Founded
2014
HQ Location
Pleasanton, CA
Twitter
@contrastsec
5,553 Twitter followers
LinkedIn® Page
www.linkedin.com
265 employees on LinkedIn®
(187)4.7 out of 5
Optimized for quick response
17th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    7.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • EC
    Sentinel One provides best endpoint protection and also Sentinel allows the user to revert their machine to the previous version of a certain... Read review
    Henri H.
    HH
    Between the quality of the analyses and the price, it is a good alternative to protect your computer. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,508 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Enterprise
SentinelOne Singularity features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.4
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
7.7
Configuration Monitoring
Average: 8.4
EC
Sentinel One provides best endpoint protection and also Sentinel allows the user to revert their machine to the previous version of a certain... Read review
Henri H.
HH
Between the quality of the analyses and the price, it is a good alternative to protect your computer. Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,508 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(371)4.6 out of 5
28th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$5,000 per year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Red Hat® Ansible® Automation Platform is Red Hat's primary enterprise automation product offering., it includes all of the tooling needed for building, deploying, and managing end-to-end automation at

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Hat Ansible Automation Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abdul K.
    AK
    Ansible Automation platform is the solution for automating everything within the IT sphere - whether it's application automation, infrastructure... Read review
    Cesar D.
    CD
    The best feature of Red Hat Ansible Platform is its Automation Controller. It provides a centralized, easy-to-use interface for managing,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Company Website
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    295,491 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,596 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Red Hat® Ansible® Automation Platform is Red Hat's primary enterprise automation product offering., it includes all of the tooling needed for building, deploying, and managing end-to-end automation at

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 35% Mid-Market
Red Hat Ansible Automation Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.9
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Abdul K.
AK
Ansible Automation platform is the solution for automating everything within the IT sphere - whether it's application automation, infrastructure... Read review
Cesar D.
CD
The best feature of Red Hat Ansible Platform is its Automation Controller. It provides a centralized, easy-to-use interface for managing,... Read review
Seller Details
Seller
Red Hat
Company Website
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
295,491 Twitter followers
LinkedIn® Page
www.linkedin.com
19,596 employees on LinkedIn®
(43)4.5 out of 5
45th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    8.1
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abdurrahman A.
    AA
    This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
    Mandira G.
    MG
    I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Company Website
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 37% Mid-Market
ARMO Platform features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
8.1
Configuration Monitoring
Average: 8.4
Abdurrahman A.
AA
This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
Mandira G.
MG
I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
Seller Details
Seller
ARMO
Company Website
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,144 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
(26)4.7 out of 5
30th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Seller Details
    Expand/Collapse Seller Details
(30)4.4 out of 5
29th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:From $599
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 8.9
    6.5
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • CK
    We have integrated Kiuwan in our DevOps chain without issues, using TFS and other tools in this chain. We have already found a good bunch of... Read review
    Óscar G.
    ÓG
    Kiuwan is a powerful tool that help our developers to create secure software. Also, the code quality component is very good. It provides a lot of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,405 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 37% Mid-Market
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 8.9
6.5
Configuration Monitoring
Average: 8.4
CK
We have integrated Kiuwan in our DevOps chain without issues, using TFS and other tools in this chain. We have already found a good bunch of... Read review
Óscar G.
ÓG
Kiuwan is a powerful tool that help our developers to create secure software. Also, the code quality component is very good. It provides a lot of... Read review
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,405 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
(276)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify your developer experience with the world's first AI-augmented software delivery platform. Upgrade your software delivery with Harness' innovative CI/CD, Feature Flags, Infrastructure as Co

    Users
    • DevOps Engineer
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 40% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Harness Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    7.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    AC
    Simplicity and integrability. Gitops, observably and reporting. Read review
    NR
    The pipelines can be stored in git repository The cost management integration Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Harness
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco
    Twitter
    @HarnessWealth
    1,446 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,404 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify your developer experience with the world's first AI-augmented software delivery platform. Upgrade your software delivery with Harness' innovative CI/CD, Feature Flags, Infrastructure as Co

Users
  • DevOps Engineer
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 40% Enterprise
  • 39% Mid-Market
Harness Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
7.2
Configuration Monitoring
Average: 8.4
Verified User in Computer & Network Security
AC
Simplicity and integrability. Gitops, observably and reporting. Read review
NR
The pipelines can be stored in git repository The cost management integration Read review
Seller Details
Seller
Harness
Company Website
Year Founded
2018
HQ Location
San Francisco
Twitter
@HarnessWealth
1,446 Twitter followers
LinkedIn® Page
www.linkedin.com
1,404 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Probely features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Anubhav  J.
    AJ
    Extremely easy to use, can scan apps and APIs behind auth, generous free tier, good PDF reports as evidence of state of security Read review
    Verified User in Computer Software
    AC
    Probely is appreciated by our developers for its ease of use and the level of details it provides in navigating the results from the vunerability... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Probely
    Year Founded
    2016
    HQ Location
    Porto, PT
    Twitter
    @probely
    528 Twitter followers
    LinkedIn® Page
    pt.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operat

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 37% Mid-Market
Probely features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.6
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Anubhav  J.
AJ
Extremely easy to use, can scan apps and APIs behind auth, generous free tier, good PDF reports as evidence of state of security Read review
Verified User in Computer Software
AC
Probely is appreciated by our developers for its ease of use and the level of details it provides in navigating the results from the vunerability... Read review
Seller Details
Seller
Probely
Year Founded
2016
HQ Location
Porto, PT
Twitter
@probely
528 Twitter followers
LinkedIn® Page
pt.linkedin.com
6 employees on LinkedIn®
(20)4.8 out of 5
7th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BL
    Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,145 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
BL
Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,145 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    S4E.io offers a cutting-edge Continuous Threat Exposure Management (CTEM) solution that leverages a robust microservice architecture to deliver unparalleled security. The platform utilizes the power o

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • S4E features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.8
    Automated Scans
    Average: 8.9
    8.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    UC
    I used DNS and subdomain finder tools. They give accurate and fast results. And they are all free :) Read review
    Şadi K.
    ŞK
    Free Tools are so versatile and fuctional. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Tallinn, EE
    Twitter
    @secforeveryone
    7,218 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

S4E.io offers a cutting-edge Continuous Threat Exposure Management (CTEM) solution that leverages a robust microservice architecture to deliver unparalleled security. The platform utilizes the power o

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 35% Mid-Market
S4E features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.8
Automated Scans
Average: 8.9
8.9
Configuration Monitoring
Average: 8.4
Verified User in Computer Software
UC
I used DNS and subdomain finder tools. They give accurate and fast results. And they are all free :) Read review
Şadi K.
ŞK
Free Tools are so versatile and fuctional. Read review
Seller Details
Year Founded
2020
HQ Location
Tallinn, EE
Twitter
@secforeveryone
7,218 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(81)4.5 out of 5
Optimized for quick response
36th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Syxsense is the world’s leading automated endpoint and vulnerability software provider. The Syxsense platform offers real-time device status, robust endpoint management, vulnerability scanning and rem

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 59% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Syxsense features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    7.6
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    7.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FK
    This is a powerful tool that keeps the management easy. Read review
    Francis N.
    FN
    Syxsense’s patch management solution stands out for its user-friendly interface that simplifies the daunting task of identifying and patching... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Syxsense
    Company Website
    Year Founded
    2012
    HQ Location
    Aliso Viejo, CA
    LinkedIn® Page
    www.linkedin.com
    50 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Syxsense is the world’s leading automated endpoint and vulnerability software provider. The Syxsense platform offers real-time device status, robust endpoint management, vulnerability scanning and rem

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 59% Mid-Market
  • 30% Small-Business
Syxsense features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
7.6
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
7.2
Configuration Monitoring
Average: 8.4
FK
This is a powerful tool that keeps the management easy. Read review
Francis N.
FN
Syxsense’s patch management solution stands out for its user-friendly interface that simplifies the daunting task of identifying and patching... Read review
Seller Details
Seller
Syxsense
Company Website
Year Founded
2012
HQ Location
Aliso Viejo, CA
LinkedIn® Page
www.linkedin.com
50 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As former security researchers, we founded BugProve to deliver the level of security that IoT deserves! Experience peace of mind by leveraging our automated firmware analysis platform: Swift Results:

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 90% Small-Business
    • 10% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BugProve features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jaya Shravan  V.
    JV
    Easy to use, Indepth details are given for understanding analysis Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BugProve
    Year Founded
    2021
    HQ Location
    Budapest, HU
    Twitter
    @Bugprove
    146 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

As former security researchers, we founded BugProve to deliver the level of security that IoT deserves! Experience peace of mind by leveraging our automated firmware analysis platform: Swift Results:

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 90% Small-Business
  • 10% Enterprise
BugProve features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.9
Configuration Monitoring
Average: 8.4
Jaya Shravan  V.
JV
Easy to use, Indepth details are given for understanding analysis Read review
Seller Details
Seller
BugProve
Year Founded
2021
HQ Location
Budapest, HU
Twitter
@Bugprove
146 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    9.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Evan B.
    EB
    The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
    Mark H.
    MH
    Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 38% Enterprise
  • 33% Mid-Market
Edgescan features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
9.7
Configuration Monitoring
Average: 8.4
Evan B.
EB
The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
Mark H.
MH
Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    9.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Reinier M.
    RM
    We needed to integrate threat detection on our website since we have multiple materials vendors, B2B customers and several inventories, warehouses,... Read review
    AH
    ResilientX Security Platforms is a tool that allows us as a company to have all the documentation properly related and aligned with the industry... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    34 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
9.8
Configuration Monitoring
Average: 8.4
Reinier M.
RM
We needed to integrate threat detection on our website since we have multiple materials vendors, B2B customers and several inventories, warehouses,... Read review
AH
ResilientX Security Platforms is a tool that allows us as a company to have all the documentation properly related and aligned with the industry... Read review
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
34 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 53% Small-Business
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ActiveState Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FRANCISCO M.
    M
    the great advantages it offers to develop my projects in terms of security in addition to the great community ready-to-use software supply chain... Read review
    Alexander H.
    AH
    Easy to use fast active community to help if I encounter problems Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Vancouver, BC
    Twitter
    @ActiveState
    4,038 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically build Python, Perl and Tcl runtimes for Windows, Linux and Mac, or download one of our popular pre-built ActivePython, ActivePerl or ActiveTcl distributions. ActiveState has been cre

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 53% Small-Business
  • 26% Mid-Market
ActiveState Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
0.0
No information available
FRANCISCO M.
M
the great advantages it offers to develop my projects in terms of security in addition to the great community ready-to-use software supply chain... Read review
Alexander H.
AH
Easy to use fast active community to help if I encounter problems Read review
Seller Details
Year Founded
1997
HQ Location
Vancouver, BC
Twitter
@ActiveState
4,038 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Open source is a critical part of your software. In the average modern software product, over 80% of the source code shipped is derived from open source. Each component can have cascading legal, secur

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FOSSA features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JAZEEL ANWAR J.
    JJ
    It reduces the time needed to identify open-source licensing issues. It is easy to use and it is user-friendly. It allows you to know the licenses... Read review
    Verified User in Leisure, Travel & Tourism
    IL
    FOSSA stands for Free and Open Source Software Analysis which automates the management of open source compliance and security. Up to 90% of the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    FOSSA
    Year Founded
    2015
    HQ Location
    San Francisco, California
    Twitter
    @getfossa
    772 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Open source is a critical part of your software. In the average modern software product, over 80% of the source code shipped is derived from open source. Each component can have cascading legal, secur

Users
No information available
Industries
  • Computer Software
Market Segment
  • 47% Small-Business
  • 33% Mid-Market
FOSSA features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
JAZEEL ANWAR J.
JJ
It reduces the time needed to identify open-source licensing issues. It is easy to use and it is user-friendly. It allows you to know the licenses... Read review
Verified User in Leisure, Travel & Tourism
IL
FOSSA stands for Free and Open Source Software Analysis which automates the management of open source compliance and security. Up to 90% of the... Read review
Seller Details
Seller
FOSSA
Year Founded
2015
HQ Location
San Francisco, California
Twitter
@getfossa
772 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
(12)4.9 out of 5
34th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rainforest is the all-in-one cyber security platform with an end-to-end approach to simplify corporate reputation protection by using multiple intelligences and proactive observability, adding Applica

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 42% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rainforest Application features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    9.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Josiane d.
    JD
    There is the possibility of monthly payment. Super specialized team. Technologies that integrate, bringing a vision of vulnerability management... Read review
    Verified User in Insurance
    AI
    Rainforest solutions are incredibly easy to implement and helped us to monitor and reduce our information as well usage of our brand to prevent frauds Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Wilmington, Delaware
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rainforest is the all-in-one cyber security platform with an end-to-end approach to simplify corporate reputation protection by using multiple intelligences and proactive observability, adding Applica

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 42% Mid-Market
Rainforest Application features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
9.3
Configuration Monitoring
Average: 8.4
Josiane d.
JD
There is the possibility of monthly payment. Super specialized team. Technologies that integrate, bringing a vision of vulnerability management... Read review
Verified User in Insurance
AI
Rainforest solutions are incredibly easy to implement and helped us to monitor and reduce our information as well usage of our brand to prevent frauds Read review
Seller Details
HQ Location
Wilmington, Delaware
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 8.9
    9.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NS
    It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
    PS
    What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 8.9
9.3
Configuration Monitoring
Average: 8.4
NS
It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
PS
What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
442 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ER
    The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
    Jon R.
    JR
    Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
ER
The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
Jon R.
JR
Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BeyondTrust Retina CS is the only vulnerability management solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BeyondTrust Vulnerability Management features and usability ratings that predict user satisfaction
    8.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.1
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Nicolás M.
    NM
    What stands out the most and is one of the points that I liked most about the tool, is the rapid reduction of the risk of attacks, due to the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1985
    HQ Location
    Johns Creek, GA
    Twitter
    @BeyondTrust
    14,387 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,655 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BeyondTrust Retina CS is the only vulnerability management solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Enterprise
BeyondTrust Vulnerability Management features and usability ratings that predict user satisfaction
8.1
Has the product been a good partner in doing business?
Average: 9.2
8.1
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Nicolás M.
NM
What stands out the most and is one of the points that I liked most about the tool, is the rapid reduction of the risk of attacks, due to the... Read review
Seller Details
Year Founded
1985
HQ Location
Johns Creek, GA
Twitter
@BeyondTrust
14,387 Twitter followers
LinkedIn® Page
www.linkedin.com
1,655 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    8.9
    Automated Scans
    Average: 8.9
    8.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
8.9
Automated Scans
Average: 8.9
8.7
Configuration Monitoring
Average: 8.4
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Offensity features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    7.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Hafeezurrahman A.
    HA
    Feedback and reports and fixes most common issues with no cost. Read review
    Verified User in Computer & Network Security
    CC
    Offensity is a really good vulnerability scanner and the best part is that it's pricing is very reasonable, especially for smaller organizations.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Offensity features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
7.8
Configuration Monitoring
Average: 8.4
Hafeezurrahman A.
HA
Feedback and reports and fixes most common issues with no cost. Read review
Verified User in Computer & Network Security
CC
Offensity is a really good vulnerability scanner and the best part is that it's pricing is very reasonable, especially for smaller organizations.... Read review
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
266 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero known security vulnerabilities. It gives your software team the power to find and fix thousan

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 43% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber Chief features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Todor P.
    TP
    We are just starting our jouney with Cyber Chief, but we have a solid history with Audacix, the company behind it. They are actually using Cyber... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Audacix
    Year Founded
    2015
    HQ Location
    Melbourne, Victoria
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero known security vulnerabilities. It gives your software team the power to find and fix thousan

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 43% Small-Business
Cyber Chief features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Todor P.
TP
We are just starting our jouney with Cyber Chief, but we have a solid history with Audacix, the company behind it. They are actually using Cyber... Read review
Seller Details
Seller
Audacix
Year Founded
2015
HQ Location
Melbourne, Victoria
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Feroot AI Platform for Compliance, Security, and Risk Management of websites and web apps. It brings AI to compliance and security processes – replaces manual work, errors and overhead costs with c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Feroot Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Ross W.
    RW
    We've had a great experience with Feroot and their support staff. From the start, their team has been incredibly engaged, offering continuous... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Feroot AI Platform for Compliance, Security, and Risk Management of websites and web apps. It brings AI to compliance and security processes – replaces manual work, errors and overhead costs with c

Users
No information available
Industries
No information available
Market Segment
  • 63% Enterprise
  • 25% Mid-Market
Feroot Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Ross W.
RW
We've had a great experience with Feroot and their support staff. From the start, their team has been incredibly engaged, offering continuous... Read review
Seller Details
Company Website
Year Founded
2017
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MetaDefender features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Jose P.
    JP
    Metadefender offers on its website software that allows us to analyze suspicious files and thus protect our computer, we are very happy with this... Read review
    Verified User in Computer & Network Security
    CC
    Its price is low and it's easy to use and implement it. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OPSWAT
    Year Founded
    2002
    HQ Location
    Tampa, Florida
    Twitter
    @OPSWAT
    7,232 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    982 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

MetaDefender provides comprehensive file upload security to protect against malware and data breaches.​ OPSWAT designed MetaDefender to secure the world’s critical infrastructure from the most sophist

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
MetaDefender features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Jose P.
JP
Metadefender offers on its website software that allows us to analyze suspicious files and thus protect our computer, we are very happy with this... Read review
Verified User in Computer & Network Security
CC
Its price is low and it's easy to use and implement it. Read review
Seller Details
Seller
OPSWAT
Year Founded
2002
HQ Location
Tampa, Florida
Twitter
@OPSWAT
7,232 Twitter followers
LinkedIn® Page
www.linkedin.com
982 employees on LinkedIn®
(31)4.6 out of 5
View top Consulting Services for Semgrep
Save to My Lists
Entry Level Price:$40.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Semgrep is a highly customizable application security platform built for security engineers and developers. Semgrep scans first and third-party code to find security issues unique to an organization,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semgrep features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Avinash S.
    AS
    It is the most efficient and simple to use integration for SAST. Free, and community-driven Discussions on Slack channels provide valuable help... Read review
    Verified User in Financial Services
    AF
    Easy to add custom rules (e.g. by using the online rule editor). Also, Semgrep App has some nice, convenient features (like private rule repository). Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semgrep
    Year Founded
    2017
    HQ Location
    San Francisco, US
    Twitter
    @semgrep
    3,817 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    191 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Semgrep is a highly customizable application security platform built for security engineers and developers. Semgrep scans first and third-party code to find security issues unique to an organization,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Mid-Market
  • 29% Enterprise
Semgrep features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.4
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.9
Configuration Monitoring
Average: 8.4
Avinash S.
AS
It is the most efficient and simple to use integration for SAST. Free, and community-driven Discussions on Slack channels provide valuable help... Read review
Verified User in Financial Services
AF
Easy to add custom rules (e.g. by using the online rule editor). Also, Semgrep App has some nice, convenient features (like private rule repository). Read review
Seller Details
Seller
Semgrep
Year Founded
2017
HQ Location
San Francisco, US
Twitter
@semgrep
3,817 Twitter followers
LinkedIn® Page
www.linkedin.com
191 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RoboShadow is a London-based Cyber Security start-up and a recent NCSC for Startups Alumni. As a business, RoboShadow is dedicated to making Cyber Security accessible, and levelling the Cyber Security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RoboShadow features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    9.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NC
    Ease of deployment, ease of use, the reporting design is intuitive. The amount of functionality included in their free tier absolutely eclipses... Read review
    DJ
    We were able to cover our entire estate of Windows servers and workstations and Mac workstations with RoboShadow continuous vulnerability... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RoboShadow is a London-based Cyber Security start-up and a recent NCSC for Startups Alumni. As a business, RoboShadow is dedicated to making Cyber Security accessible, and levelling the Cyber Security

Users
No information available
Industries
No information available
Market Segment
  • 75% Small-Business
  • 25% Mid-Market
RoboShadow features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
9.4
Configuration Monitoring
Average: 8.4
NC
Ease of deployment, ease of use, the reporting design is intuitive. The amount of functionality included in their free tier absolutely eclipses... Read review
DJ
We were able to cover our entire estate of Windows servers and workstations and Mac workstations with RoboShadow continuous vulnerability... Read review
Seller Details
Year Founded
2017
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    6.7
    Automated Scans
    Average: 8.9
    5.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Alessandro C.
    AC
    It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
    OM
    Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
6.7
Automated Scans
Average: 8.9
5.0
Configuration Monitoring
Average: 8.4
Alessandro C.
AC
It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
OM
Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,102 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Born out of a GCHQ accelerator in 2017, CyberSmart was created by a group of forward-thinking security experts, who noticed that many companies needed to secure themselves and achieve information secu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberSmart features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Marketing and Advertising
    UM
    Cost-effective protection, continuous threat monitoring, simplified government-standard certifications, no need for in-house experts or tools,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    London, GB
    Twitter
    @CyberSmartUK
    1,952 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    67 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Born out of a GCHQ accelerator in 2017, CyberSmart was created by a group of forward-thinking security experts, who noticed that many companies needed to secure themselves and achieve information secu

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 33% Enterprise
CyberSmart features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Verified User in Marketing and Advertising
UM
Cost-effective protection, continuous threat monitoring, simplified government-standard certifications, no need for in-house experts or tools,... Read review
Seller Details
Year Founded
2016
HQ Location
London, GB
Twitter
@CyberSmartUK
1,952 Twitter followers
LinkedIn® Page
www.linkedin.com
67 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before every release. Our state-of-the-art dynamic application securi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Crashtest Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    10.0
    Automated Scans
    Average: 8.9
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AA
    Automation of testing, Very thorough, flexible and great support. nice knowledge base provided to help in removing found vulnerabilities, excellent... Read review
    KC
    Analysis of a large number of vulnerability vectors. It is possible to configuring Crawler Mode, Throttling, Scan Duration, etc. Efficient... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Burlington, US
    LinkedIn® Page
    www.linkedin.com
    658 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before every release. Our state-of-the-art dynamic application securi

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Crashtest Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
10.0
Automated Scans
Average: 8.9
0.0
No information available
AA
Automation of testing, Very thorough, flexible and great support. nice knowledge base provided to help in removing found vulnerabilities, excellent... Read review
KC
Analysis of a large number of vulnerability vectors. It is possible to configuring Crawler Mode, Throttling, Scan Duration, etc. Efficient... Read review
Seller Details
Year Founded
2006
HQ Location
Burlington, US
LinkedIn® Page
www.linkedin.com
658 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xygeni features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    6.7
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Óscar G.
    ÓG
    - Real-time malware detection: Xygeni’s early warning system has been a game-changer, identifying malicious open source components before they can... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    Twitter
    @xygeni
    188 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Xygeni features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
6.7
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Óscar G.
ÓG
- Real-time malware detection: Xygeni’s early warning system has been a game-changer, identifying malicious open source components before they can... Read review
Seller Details
Year Founded
2021
Twitter
@xygeni
188 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mageni is a vulnerability scanning and vulnerability management solution that empowers use to find, prioritize, remediate and manage vulnerabilities before they are exploited by hackers.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mageni features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    6.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer & Network Security
    IC
    It scan your internal and public assest, get the recommendation to kill the risks Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    White Plains, NY
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mageni is a vulnerability scanning and vulnerability management solution that empowers use to find, prioritize, remediate and manage vulnerabilities before they are exploited by hackers.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Mageni features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
6.7
Configuration Monitoring
Average: 8.4
Verified User in Computer & Network Security
IC
It scan your internal and public assest, get the recommendation to kill the risks Read review
Seller Details
HQ Location
White Plains, NY
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine Vulnerability Manager Plus features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SK
    we are using the Manage enigine for patch management it will be best tool for patch management as it is simple to manage patches in all the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zoho
    Year Founded
    1996
    HQ Location
    Austin, TX
    Twitter
    @Zoho
    103,834 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26,328 employees on LinkedIn®
    Phone
    +1 (888) 900-9646
Product Description
How are these determined?Information
This description is provided by the seller.

With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
ManageEngine Vulnerability Manager Plus features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
SK
we are using the Manage enigine for patch management it will be best tool for patch management as it is simple to manage patches in all the... Read review
Seller Details
Seller
Zoho
Year Founded
1996
HQ Location
Austin, TX
Twitter
@Zoho
103,834 Twitter followers
LinkedIn® Page
www.linkedin.com
26,328 employees on LinkedIn®
Phone
+1 (888) 900-9646
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PT Application Inspector™ (PT AI™) is a comprehensive source code analysis tool that offers protection for web applications of any scale. Its holistic approach combines the advantages of static, dynam

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PT Application Inspector features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Banking
    UB
    We found the best price in the market and got good scan results. This is the only solution we found on the market which able to build exploit... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @PTsecurity_UK
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    664 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PT Application Inspector™ (PT AI™) is a comprehensive source code analysis tool that offers protection for web applications of any scale. Its holistic approach combines the advantages of static, dynam

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
PT Application Inspector features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
0.0
No information available
Verified User in Banking
UB
We found the best price in the market and got good scan results. This is the only solution we found on the market which able to build exploit... Read review
Seller Details
HQ Location
N/A
Twitter
@PTsecurity_UK
5 Twitter followers
LinkedIn® Page
www.linkedin.com
664 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secyour is an online vulnerability scanner that uncovers the vulnerabilities in your website to mitigate the risks of data breaches.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secyour App features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AM
    The monitoring option is really good, allows me to track all changes in my websites Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secyour is an online vulnerability scanner that uncovers the vulnerabilities in your website to mitigate the risks of data breaches.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Secyour App features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
AM
The monitoring option is really good, allows me to track all changes in my websites Read review
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sn1per Professional features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Military
    UM
    This particular software helped (and continues to help me) in the automatic execution of several tasks. Inside this software are a lot of... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Scottsdale, US
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sn1per Professional is an all-in-one offensive security platform that provides a comprehensive view of your internal and external attack surface and offers an asset risk scoring system to prioritize,

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Sn1per Professional features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Verified User in Military
UM
This particular software helped (and continues to help me) in the automatic execution of several tasks. Inside this software are a lot of... Read review
Seller Details
HQ Location
Scottsdale, US
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    XSIgnal.io is a new cloud-based vulnerability scanner of the external network infrastructure perimeter that can scan any type of resources / hosts / websites/subnet in just 15 minutes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • XSignal.io Online Vulnerability Scanner features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Герман .
    Г
    This is an essential tool for our company. Everything is clear and easy to understand. I can set the time when i need to scan, which is super... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    XSIGNAL
    Year Founded
    2020
    HQ Location
    Delaware, US
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

XSIgnal.io is a new cloud-based vulnerability scanner of the external network infrastructure perimeter that can scan any type of resources / hosts / websites/subnet in just 15 minutes

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
XSignal.io Online Vulnerability Scanner features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Герман .
Г
This is an essential tool for our company. Everything is clear and easy to understand. I can set the time when i need to scan, which is super... Read review
Seller Details
Seller
XSIGNAL
Year Founded
2020
HQ Location
Delaware, US
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Chariot features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @praetorianlabs
    8,283 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Find the breach point before it finds you. Adopting a prevention first strategy requires thinking — and operating — like attackers. Continuously. Chariot is a unified vulnerability and threat expos

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Chariot features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Twitter
@praetorianlabs
8,283 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ConnectSecure is a comprehensive SaaS cybersecurity solution designed to address vulnerabilities and secure assets for clients. It stands out for its strong emphasis on reporting customization, extern

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ConnectSecure Vulnerability and Compliance Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • CD
    For over two years, we’ve relied on ConnectSecure to gain full visibility into system vulnerabilities. It delivers timely alerts and clear,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ConnectSecure is a comprehensive SaaS cybersecurity solution designed to address vulnerabilities and secure assets for clients. It stands out for its strong emphasis on reporting customization, extern

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ConnectSecure Vulnerability and Compliance Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
CD
For over two years, we’ve relied on ConnectSecure to gain full visibility into system vulnerabilities. It delivers timely alerts and clear,... Read review
Seller Details
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgewatch is an Attack Surface Management Platform that assists companies in discovering, monitoring, and analyzing devices accessible from the Internet. Edgewatch continuously scans public IP address

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • EdgeWatch Attack Surface Management Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgewatch
    Year Founded
    2019
    HQ Location
    Paterna, es
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgewatch is an Attack Surface Management Platform that assists companies in discovering, monitoring, and analyzing devices accessible from the Internet. Edgewatch continuously scans public IP address

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
EdgeWatch Attack Surface Management Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Edgewatch
Year Founded
2019
HQ Location
Paterna, es
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enclave is a modern network segmentation platform that combines – access control, asset inventory, encryption and zero trust network access – to create a breakthrough microsegmentation solution that p

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Enclave features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Oscar N.
    ON
    Easy to use, visual, easy to deploy, and very simple to implent zerotrust with it Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Worcester, US
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enclave is a modern network segmentation platform that combines – access control, asset inventory, encryption and zero trust network access – to create a breakthrough microsegmentation solution that p

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Enclave features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Oscar N.
ON
Easy to use, visual, easy to deploy, and very simple to implent zerotrust with it Read review
Seller Details
Year Founded
2017
HQ Location
Worcester, US
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Premium Web Application Security Scanning ImmuniWeb® Neuron unleashes the power of Machine Learning and AI to take automated web vulnerability scanning to the next level. While detecting more vulnera

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Neuron features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    N/A
    Twitter
    @immuniweb
    8,577 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Premium Web Application Security Scanning ImmuniWeb® Neuron unleashes the power of Machine Learning and AI to take automated web vulnerability scanning to the next level. While detecting more vulnera

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ImmuniWeb Neuron features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
N/A
Twitter
@immuniweb
8,577 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NESS is a web platform that allows constant monitoring of technological infrastructure, provides advanced modules for cybersecurity, vulnerability scanning, remediation, and real-time monitoring.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NESS features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NESS
    Year Founded
    2023
    HQ Location
    Bogotá, CO
    LinkedIn® Page
    www.linkedin.com
    6,042 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NESS is a web platform that allows constant monitoring of technological infrastructure, provides advanced modules for cybersecurity, vulnerability scanning, remediation, and real-time monitoring.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
NESS features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
NESS
Year Founded
2023
HQ Location
Bogotá, CO
LinkedIn® Page
www.linkedin.com
6,042 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    N-Stalker Web Application Security Scanner X is a web security assessment solution for web applications.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • N-Stalker features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    N-Stalker
    Year Founded
    2000
    HQ Location
    Curitiba, BR
    Twitter
    @nstalker
    689 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

N-Stalker Web Application Security Scanner X is a web security assessment solution for web applications.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
N-Stalker features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
N-Stalker
Year Founded
2000
HQ Location
Curitiba, BR
Twitter
@nstalker
689 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise vulnerability scanner for Android and iOS apps. It offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development pr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oversecured features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Dover, US
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise vulnerability scanner for Android and iOS apps. It offers app owners and developers the ability to secure each new version of a mobile app by integrating Oversecured into the development pr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Oversecured features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2020
HQ Location
Dover, US
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strobes RBVM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    5700 Tennyson Pkwy, # 372, Plano, TX, 75024
    Twitter
    @StrobesHQ
    207 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Strobes RBVM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
HQ Location
5700 Tennyson Pkwy, # 372, Plano, TX, 75024
Twitter
@StrobesHQ
207 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Khalish Y.
    KY
    It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    68,923 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,718 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Khalish Y.
KY
It features a simple setup and maintenance procedure. The nice aspect would be that it probably automatically addresses all of our systems in the... Read review
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
68,923 Twitter followers
LinkedIn® Page
www.linkedin.com
1,718 employees on LinkedIn®
Ownership
FSOYF