Introducing G2.ai, the future of software buying.Try now
Data Theorem Cloud Secure
Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Data Theorem Cloud Secure Pros and Cons: Top Advantages and Disadvantages

Quick AI Summary Based on G2 Reviews

Generated from real user reviews

Users appreciate the automation in security management with Data Theorem Cloud Secure, enhancing API security and vulnerability assessment. (2 mentions)
Users commend the automated and continuous security features of Data Theorem Cloud Secure, enhancing API safety and vulnerability management. (2 mentions)
Users find Vulnerability Detection in Data Theorem Cloud Secure invaluable for ensuring API security and continuous vulnerability management. (2 mentions)
Users praise automated vulnerability identification in Data Theorem Cloud Secure, enhancing API security for backend microservices. (2 mentions)
Users value the automated vulnerability management capabilities of Data Theorem Cloud Secure for enhancing API security and quality. (2 mentions)
Users find the high pricing of Data Theorem Cloud Secure to be a significant drawback despite its positive features. (2 mentions)
Users find the high expense and potential performance reduction if not utilized properly to be significant drawbacks. (1 mentions)
Users find that the product can lead to performance issues if not utilized properly, impacting overall experience. (1 mentions)
Users note that while there are benefits, the slow performance can hinder usability if not utilized correctly. (1 mentions)

Top Rated Data Theorem Cloud Secure Alternatives

Wiz
(702)
4.7 out of 5

2 Data Theorem Cloud Secure Reviews

4.3 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 Data Theorem Cloud Secure Reviews
4.3 out of 5
2 Data Theorem Cloud Secure Reviews
4.3 out of 5

Data Theorem Cloud Secure Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Harshit B.
HB
Associate Software Engineer
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Data Theorem Cloud Secure?

As a software developer I need to focus on quality of the product we are delivering, and the best part of Data Theorem Cloud Secure is it helped me a lot in API security and management of vulnerabilities for backend microservices. Review collected by and hosted on G2.com.

What do you dislike about Data Theorem Cloud Secure?

Majorily it have great positive things but the major downside is it is very expensive.

Apart from this it reduces the overall performance of the product if not properly utilised. Review collected by and hosted on G2.com.

Sujit L.
SL
Technical Support Executive
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Data Theorem Cloud Secure?

automated and continuous security, best for personal level vulberability management & assesment Review collected by and hosted on G2.com.

What do you dislike about Data Theorem Cloud Secure?

Pricings are bit high at individual level Review collected by and hosted on G2.com.

There are not enough reviews of Data Theorem Cloud Secure for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(702)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
Lacework FortiCNAPP Logo
Lacework FortiCNAPP
4.4
(381)
Lacework FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
3
Scrut Automation Logo
Scrut Automation
4.9
(1,183)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
4
Vanta Logo
Vanta
4.6
(1,819)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
5
Sprinto Logo
Sprinto
4.8
(1,361)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
6
Drata Logo
Drata
4.8
(1,060)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
7
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
8
Thoropass Logo
Thoropass
4.7
(467)
9
Scytale Logo
Scytale
4.8
(437)
Compliance automation platform and dedicated expert services that fast-track and streamline 30+ compliance frameworks such as SOC 2, ISO 27001 and GDPR, as well as all your GRC processes.
10
Secureframe Logo
Secureframe
4.7
(393)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
Show More