Best Software for 2025 is now live!

Best Attack Surface Management Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks

Best Attack Surface Management Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
129 Listings in Attack Surface Management Available
By Wiz
(696)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    351
    Security
    315
    Visibility
    260
    Features
    249
    Cloud Management
    227
    Cons
    Improvement Needed
    121
    Missing Features
    119
    Feature Limitations
    107
    Learning Curve
    98
    Limited Features
    82
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    9.0
    Continuous Monitoring
    Average: 8.9
    8.8
    Compliance Monitoring
    Average: 8.4
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
351
Security
315
Visibility
260
Features
249
Cloud Management
227
Cons
Improvement Needed
121
Missing Features
119
Feature Limitations
107
Learning Curve
98
Limited Features
82
Wiz features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
9.0
Continuous Monitoring
Average: 8.9
8.8
Compliance Monitoring
Average: 8.4
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,648 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(118)4.6 out of 5
3rd Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patente

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 69% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Argos Threat Intelligence Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    56
    Threat Intelligence
    52
    Threat Detection
    39
    Insights
    37
    Customer Support
    36
    Cons
    Inefficient Alerts
    18
    Inefficient Alert System
    13
    False Positives
    11
    Integration Issues
    11
    Missing Features
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Argos Threat Intelligence Platform features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 8.9
    8.7
    Continuous Monitoring
    Average: 8.9
    8.3
    Compliance Monitoring
    Average: 8.4
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyberInt
    Year Founded
    2009
    HQ Location
    Petah Tikva, Israel
    Twitter
    @cyber_int
    1,834 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    170 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, the Impactful Intelligence company, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The Cyberint Argos platform’s patente

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 69% Enterprise
  • 20% Mid-Market
Argos Threat Intelligence Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
56
Threat Intelligence
52
Threat Detection
39
Insights
37
Customer Support
36
Cons
Inefficient Alerts
18
Inefficient Alert System
13
False Positives
11
Integration Issues
11
Missing Features
11
Argos Threat Intelligence Platform features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 8.9
8.7
Continuous Monitoring
Average: 8.9
8.3
Compliance Monitoring
Average: 8.4
9.2
Ease of Admin
Average: 8.9
Seller Details
Seller
CyberInt
Year Founded
2009
HQ Location
Petah Tikva, Israel
Twitter
@cyber_int
1,834 Twitter followers
LinkedIn® Page
www.linkedin.com
170 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(124)4.9 out of 5
Optimized for quick response
1st Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

    Users
    • Security Engineer
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 56% Enterprise
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cymulate: Security Validation and Exposure Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    57
    Features
    37
    Security
    34
    Customer Support
    29
    Vulnerability Identification
    29
    Cons
    Improvement Needed
    9
    Integration Issues
    8
    Lack of Integration
    6
    Inefficient Alert System
    5
    Complexity
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
    8.5
    Vulnerability Intelligence
    Average: 8.9
    8.2
    Continuous Monitoring
    Average: 8.9
    8.3
    Compliance Monitoring
    Average: 8.4
    9.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymulate
    Company Website
    Year Founded
    2016
    HQ Location
    Rishon LeZion, Israel
    Twitter
    @CymulateLtd
    1,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    234 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

Users
  • Security Engineer
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 56% Enterprise
  • 42% Mid-Market
Cymulate: Security Validation and Exposure Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
57
Features
37
Security
34
Customer Support
29
Vulnerability Identification
29
Cons
Improvement Needed
9
Integration Issues
8
Lack of Integration
6
Inefficient Alert System
5
Complexity
4
Cymulate: Security Validation and Exposure Management Platform features and usability ratings that predict user satisfaction
8.5
Vulnerability Intelligence
Average: 8.9
8.2
Continuous Monitoring
Average: 8.9
8.3
Compliance Monitoring
Average: 8.4
9.9
Ease of Admin
Average: 8.9
Seller Details
Seller
Cymulate
Company Website
Year Founded
2016
HQ Location
Rishon LeZion, Israel
Twitter
@CymulateLtd
1,085 Twitter followers
LinkedIn® Page
www.linkedin.com
234 employees on LinkedIn®
(107)4.9 out of 5
8th Easiest To Use in Attack Surface Management software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    9.9
    Compliance Monitoring
    Average: 8.4
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
9.9
Compliance Monitoring
Average: 8.4
9.7
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,520 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
(1,044)4.9 out of 5
Optimized for quick response
2nd Easiest To Use in Attack Surface Management software
View top Consulting Services for Scrut Automation
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

    Users
    • CTO
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 49% Small-Business
    • 49% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Scrut Automation Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    370
    Helpful
    286
    Customer Support
    264
    Compliance
    252
    Compliance Management
    245
    Cons
    Improvement Needed
    93
    Improvements Needed
    68
    Technical Issues
    68
    Software Bugs
    57
    Evidence Collection
    50
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Scrut Automation features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 8.9
    9.5
    Compliance Monitoring
    Average: 8.4
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Palo Alto, US
    Twitter
    @scrutsocial
    101 Twitter followers
    LinkedIn® Page
    in.linkedin.com
    188 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes com

Users
  • CTO
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 49% Small-Business
  • 49% Mid-Market
Scrut Automation Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
370
Helpful
286
Customer Support
264
Compliance
252
Compliance Management
245
Cons
Improvement Needed
93
Improvements Needed
68
Technical Issues
68
Software Bugs
57
Evidence Collection
50
Scrut Automation features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 8.9
9.5
Compliance Monitoring
Average: 8.4
9.7
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2022
HQ Location
Palo Alto, US
Twitter
@scrutsocial
101 Twitter followers
LinkedIn® Page
in.linkedin.com
188 employees on LinkedIn®
(137)4.5 out of 5
Optimized for quick response
11th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    43
    Vulnerability Identification
    43
    Ease of Use
    42
    Automation
    31
    Vulnerability Detection
    31
    Cons
    Expensive
    12
    Limited Scope
    12
    Limited Features
    11
    Technical Issues
    11
    Inadequate Reporting
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    8.2
    Vulnerability Intelligence
    Average: 8.9
    7.9
    Continuous Monitoring
    Average: 8.9
    7.9
    Compliance Monitoring
    Average: 8.4
    8.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    400 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 39% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
43
Vulnerability Identification
43
Ease of Use
42
Automation
31
Vulnerability Detection
31
Cons
Expensive
12
Limited Scope
12
Limited Features
11
Technical Issues
11
Inadequate Reporting
9
Pentera features and usability ratings that predict user satisfaction
8.2
Vulnerability Intelligence
Average: 8.9
7.9
Continuous Monitoring
Average: 8.9
7.9
Compliance Monitoring
Average: 8.4
8.7
Ease of Admin
Average: 8.9
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,213 Twitter followers
LinkedIn® Page
www.linkedin.com
400 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In this era of hybrid work, shadow IT creates an increasingly serious security risk. Defender EASM helps cloud security teams see unknown and unmanaged resources outside the firewall.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Defender External Attack Surface Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    4
    Customer Support
    3
    Features
    2
    Real-time Notifications
    2
    Cons
    Complex Setup
    2
    Slow Loading
    2
    Bugs
    1
    Integration Issues
    1
    Lack of Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender External Attack Surface Management features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 8.9
    8.8
    Compliance Monitoring
    Average: 8.4
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,031,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    238,990 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

In this era of hybrid work, shadow IT creates an increasingly serious security risk. Defender EASM helps cloud security teams see unknown and unmanaged resources outside the firewall.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
Microsoft Defender External Attack Surface Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
4
Customer Support
3
Features
2
Real-time Notifications
2
Cons
Complex Setup
2
Slow Loading
2
Bugs
1
Integration Issues
1
Lack of Integration
1
Microsoft Defender External Attack Surface Management features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 8.9
8.8
Compliance Monitoring
Average: 8.4
9.7
Ease of Admin
Average: 8.9
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,031,499 Twitter followers
LinkedIn® Page
www.linkedin.com
238,990 employees on LinkedIn®
Ownership
MSFT
(127)4.6 out of 5
13th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 17% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a cloud-based platform that provides end-to-end intelligence, from adversaries to infrastructure, with features such as threat intelligence, sandboxing, and an identity module.
    • Users frequently mention the platform's ease of use, its ability to provide good visibility of account compromises, and its rich collection of data, along with the support and engagement from the customer service team.
    • Reviewers noted that the licensing module can be quite expensive, the portal can be confusing and exhaustive, and there are some issues with connections to other platforms that have persisted despite support's efforts.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    60
    Features
    60
    Threat Intelligence
    44
    Threat Detection
    39
    Insights
    35
    Cons
    Expensive
    24
    Complexity
    22
    Learning Curve
    16
    Pricing Issues
    16
    Difficult Learning
    15
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    8.4
    Vulnerability Intelligence
    Average: 8.9
    7.8
    Continuous Monitoring
    Average: 8.9
    7.3
    Compliance Monitoring
    Average: 8.4
    8.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    109,988 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,071 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 17% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a cloud-based platform that provides end-to-end intelligence, from adversaries to infrastructure, with features such as threat intelligence, sandboxing, and an identity module.
  • Users frequently mention the platform's ease of use, its ability to provide good visibility of account compromises, and its rich collection of data, along with the support and engagement from the customer service team.
  • Reviewers noted that the licensing module can be quite expensive, the portal can be confusing and exhaustive, and there are some issues with connections to other platforms that have persisted despite support's efforts.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
60
Features
60
Threat Intelligence
44
Threat Detection
39
Insights
35
Cons
Expensive
24
Complexity
22
Learning Curve
16
Pricing Issues
16
Difficult Learning
15
Recorded Future features and usability ratings that predict user satisfaction
8.4
Vulnerability Intelligence
Average: 8.9
7.8
Continuous Monitoring
Average: 8.9
7.3
Compliance Monitoring
Average: 8.4
8.6
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
109,988 Twitter followers
LinkedIn® Page
www.linkedin.com
1,071 employees on LinkedIn®
(29)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 83% Enterprise
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyble Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    12
    Insights
    10
    Threat Detection
    10
    Dark Web Monitoring
    9
    Threat Intelligence
    9
    Cons
    Inefficient Alerts
    7
    False Positives
    5
    Inefficient Alert System
    4
    Limited Customization
    4
    Data Inaccuracy
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.1
    Continuous Monitoring
    Average: 8.9
    8.8
    Compliance Monitoring
    Average: 8.4
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    20,066 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 83% Enterprise
  • 14% Mid-Market
Cyble Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
12
Insights
10
Threat Detection
10
Dark Web Monitoring
9
Threat Intelligence
9
Cons
Inefficient Alerts
7
False Positives
5
Inefficient Alert System
4
Limited Customization
4
Data Inaccuracy
3
Cyble features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.1
Continuous Monitoring
Average: 8.9
8.8
Compliance Monitoring
Average: 8.4
9.4
Ease of Admin
Average: 8.9
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
20,066 Twitter followers
LinkedIn® Page
www.linkedin.com
233 employees on LinkedIn®
(284)4.5 out of 5
Optimized for quick response
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    19
    Ease of Use
    15
    Vulnerability Detection
    15
    Automated Scanning
    13
    Features
    11
    Cons
    Slow Scanning
    9
    Limited Features
    5
    Time-Consuming
    5
    Update Delays
    4
    Lack of Automation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 8.9
    7.8
    Compliance Monitoring
    Average: 8.4
    8.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 32% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
19
Ease of Use
15
Vulnerability Detection
15
Automated Scanning
13
Features
11
Cons
Slow Scanning
9
Limited Features
5
Time-Consuming
5
Update Delays
4
Lack of Automation
3
Tenable Nessus features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 8.9
7.8
Compliance Monitoring
Average: 8.4
8.9
Ease of Admin
Average: 8.9
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(162)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Vulnerability Detection
    8
    Security
    7
    Easy Setup
    6
    Reporting
    6
    Cons
    App Instability
    2
    Expensive
    2
    High Licensing Costs
    2
    Inadequate Reporting
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 8.9
    9.8
    Continuous Monitoring
    Average: 8.9
    9.4
    Compliance Monitoring
    Average: 8.4
    9.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    946 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Vulnerability Detection
8
Security
7
Easy Setup
6
Reporting
6
Cons
App Instability
2
Expensive
2
High Licensing Costs
2
Inadequate Reporting
2
Licensing Issues
2
Intruder features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 8.9
9.8
Continuous Monitoring
Average: 8.9
9.4
Compliance Monitoring
Average: 8.4
9.6
Ease of Admin
Average: 8.9
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
946 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Notus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    15
    Easy Integrations
    9
    Time-saving
    9
    Customer Support
    8
    Visibility
    7
    Cons
    Bugs
    3
    Insufficient Training
    3
    Learning Curve
    3
    Integration Issues
    2
    Poor Documentation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.9
    Continuous Monitoring
    Average: 8.9
    9.6
    Compliance Monitoring
    Average: 8.4
    8.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
15
Easy Integrations
9
Time-saving
9
Customer Support
8
Visibility
7
Cons
Bugs
3
Insufficient Training
3
Learning Curve
3
Integration Issues
2
Poor Documentation
2
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.9
Continuous Monitoring
Average: 8.9
9.6
Compliance Monitoring
Average: 8.4
8.5
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
(21)4.9 out of 5
5th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    10
    Monitoring
    8
    Threat Intelligence
    7
    Ease of Use
    6
    Cybersecurity
    5
    Cons
    Information Overload
    4
    Limited Features
    4
    Lack of Customization
    3
    Missing Features
    3
    Poor UI Design
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    10.0
    Compliance Monitoring
    Average: 8.4
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    12,381 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threatmon's mission is to provide businesses with a comprehensive cybersecurity solution designed by experienced professionals to protect their digital assets from external threats. Threatmon's cuttin

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 38% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
10
Monitoring
8
Threat Intelligence
7
Ease of Use
6
Cybersecurity
5
Cons
Information Overload
4
Limited Features
4
Lack of Customization
3
Missing Features
3
Poor UI Design
3
ThreatMon features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
10.0
Compliance Monitoring
Average: 8.4
9.7
Ease of Admin
Average: 8.9
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
12,381 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
(23)4.7 out of 5
12th Easiest To Use in Attack Surface Management software
Save to My Lists
16% off: $14950 per year
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SOCRadar Extended Threat Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Intelligence
    11
    Features
    10
    Ease of Use
    8
    Insights
    8
    Threat Detection
    8
    Cons
    Information Overload
    3
    Lack of Features
    3
    Limited Features
    3
    Inefficient Alert System
    2
    Poor Reporting
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.6
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 8.9
    8.3
    Compliance Monitoring
    Average: 8.4
    9.1
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    4,720 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 57% Enterprise
  • 39% Mid-Market
SOCRadar Extended Threat Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Intelligence
11
Features
10
Ease of Use
8
Insights
8
Threat Detection
8
Cons
Information Overload
3
Lack of Features
3
Limited Features
3
Inefficient Alert System
2
Poor Reporting
2
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.6
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 8.9
8.3
Compliance Monitoring
Average: 8.4
9.1
Ease of Admin
Average: 8.9
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
4,720 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Glasstrail Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Customer Support
    5
    Ease of Use
    5
    Features
    5
    Vulnerability Detection
    5
    Cons
    Learning Curve
    2
    Complexity
    1
    Complex UI
    1
    Expensive
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.8
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 8.9
    9.8
    Compliance Monitoring
    Average: 8.4
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 32% Mid-Market
Glasstrail Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Customer Support
5
Ease of Use
5
Features
5
Vulnerability Detection
5
Cons
Learning Curve
2
Complexity
1
Complex UI
1
Expensive
1
False Positives
1
Glasstrail features and usability ratings that predict user satisfaction
9.8
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 8.9
9.8
Compliance Monitoring
Average: 8.4
8.8
Ease of Admin
Average: 8.9
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com