Best Software for 2025 is now live!

Top Free Attack Surface Management Software

Check out our list of free Attack Surface Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Attack Surface Management Software to ensure you get the right product.

View Free Attack Surface Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
38 Attack Surface Management Products Available
By Wiz
(697)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    9.0
    Continuous Monitoring
    Average: 8.9
    8.8
    Compliance Monitoring
    Average: 8.4
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
9.0
Continuous Monitoring
Average: 8.9
8.8
Compliance Monitoring
Average: 8.4
9.0
Ease of Admin
Average: 8.9
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,648 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(284)4.5 out of 5
Optimized for quick response
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 32% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 8.9
    7.8
    Compliance Monitoring
    Average: 8.4
    8.9
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abhishek Kumar G.
    AG
    1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
    DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 32% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 8.9
7.8
Compliance Monitoring
Average: 8.4
8.9
Ease of Admin
Average: 8.9
Abhishek Kumar G.
AG
1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(162)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 8.9
    9.8
    Continuous Monitoring
    Average: 8.9
    9.4
    Compliance Monitoring
    Average: 8.4
    9.6
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SD
    Intruder provides good value. The cost of their services is lower than most competitors, but don't let that fool you into thinking you are getting... Read review
    MR
    The interface is easy for our team to use, informative, and responsive. The solution offers insights that were previously not available at this... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    946 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 8.9
9.8
Continuous Monitoring
Average: 8.9
9.4
Compliance Monitoring
Average: 8.4
9.6
Ease of Admin
Average: 8.9
SD
Intruder provides good value. The cost of their services is lower than most competitors, but don't let that fool you into thinking you are getting... Read review
MR
The interface is easy for our team to use, informative, and responsive. The solution offers insights that were previously not available at this... Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
946 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
(107)4.9 out of 5
8th Easiest To Use in Attack Surface Management software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    9.9
    Compliance Monitoring
    Average: 8.4
    9.7
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
9.9
Compliance Monitoring
Average: 8.4
9.7
Ease of Admin
Average: 8.9
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,520 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
(59)4.5 out of 5
Optimized for quick response
14th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Small-Business
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SanerNow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • david k.
    DK
    monitoring endpoint activities is guranteed when you have sanerNow as your preferred security tool the constant update option with sanerNow is a... Read review
    JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Small-Business
  • 39% Mid-Market
SanerNow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.0
Ease of Admin
Average: 8.9
david k.
DK
monitoring endpoint activities is guranteed when you have sanerNow as your preferred security tool the constant update option with sanerNow is a... Read review
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
548 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
Entry Level Price:Starting at €82.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    9.4
    Compliance Monitoring
    Average: 8.4
    8.7
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    Easy to use. At the same time it saves us a lot of the guessing work. Read review
    Verified User in Gambling & Casinos
    AG
    The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,413 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    107 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
9.4
Compliance Monitoring
Average: 8.4
8.7
Ease of Admin
Average: 8.9
Verified User in Computer Software
AC
Easy to use. At the same time it saves us a lot of the guessing work. Read review
Verified User in Gambling & Casinos
AG
The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,413 Twitter followers
LinkedIn® Page
www.linkedin.com
107 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.9
    Continuous Monitoring
    Average: 8.9
    9.6
    Compliance Monitoring
    Average: 8.4
    8.5
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.9
Continuous Monitoring
Average: 8.9
9.6
Compliance Monitoring
Average: 8.4
8.5
Ease of Admin
Average: 8.9
Verified User in Information Technology and Services
CI
Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
(29)4.7 out of 5
Optimized for quick response
9th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 83% Enterprise
    • 14% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 8.9
    9.1
    Continuous Monitoring
    Average: 8.9
    8.8
    Compliance Monitoring
    Average: 8.4
    9.4
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    II
    Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    20,066 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is making the online world a safer place by harnessing the power of cutting-edge AI technology to revolutionize the world of cybersecurity with real-time threat intelligence and detection. Our s

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 83% Enterprise
  • 14% Mid-Market
Cyble features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 8.9
9.1
Continuous Monitoring
Average: 8.9
8.8
Compliance Monitoring
Average: 8.4
9.4
Ease of Admin
Average: 8.9
Verified User in Information Technology and Services
II
Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
20,066 Twitter followers
LinkedIn® Page
www.linkedin.com
233 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Small-Business
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 8.9
    8.3
    Compliance Monitoring
    Average: 8.4
    8.6
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ADESH J.
    AJ
    I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
    Parth S.
    PS
    I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Small-Business
  • 35% Enterprise
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 8.9
8.3
Compliance Monitoring
Average: 8.4
8.6
Ease of Admin
Average: 8.9
ADESH J.
AJ
I would like to inform you that, I used IBM Randori Recon install and configure in linux server over nagios monitoring tool, its very easy to use... Read review
Parth S.
PS
I like its comprehensive scanning capabilities to scan vulnerability across the network. Its integration with other ibm products and easy to use... Read review
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.8
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 8.9
    9.8
    Compliance Monitoring
    Average: 8.4
    8.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Raj kumar k.
    RK
    By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
    Deep Shree V.
    DV
    Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 32% Mid-Market
Glasstrail features and usability ratings that predict user satisfaction
9.8
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 8.9
9.8
Compliance Monitoring
Average: 8.4
8.8
Ease of Admin
Average: 8.9
Raj kumar k.
RK
By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
Deep Shree V.
DV
Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com
(23)4.7 out of 5
12th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    8.6
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 8.9
    8.3
    Compliance Monitoring
    Average: 8.4
    9.1
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Hospitality
    EH
    SOCRadar offers outstanding performance and exceptional value. It’s a solution tailored for larger organizations like ours, where finding effective... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    4,720 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SOCRadar is an Extended Threat Intelligence (XTI) SaaS platform that combines External Attack Surface Management (EASM), Digital Risk Protection Services (DRPS), and Cyber Threat Intelligence (CTI). S

Users
No information available
Industries
  • Financial Services
Market Segment
  • 57% Enterprise
  • 39% Mid-Market
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
8.6
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 8.9
8.3
Compliance Monitoring
Average: 8.4
9.1
Ease of Admin
Average: 8.9
Verified User in Hospitality
EH
SOCRadar offers outstanding performance and exceptional value. It’s a solution tailored for larger organizations like ours, where finding effective... Read review
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
4,720 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Mid-Market
    • 24% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.7
    Continuous Monitoring
    Average: 8.9
    9.9
    Compliance Monitoring
    Average: 8.4
    10.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Krishna Chaitanya P.
    KP
    Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Mid-Market
  • 24% Small-Business
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.7
Continuous Monitoring
Average: 8.9
9.9
Compliance Monitoring
Average: 8.4
10.0
Ease of Admin
Average: 8.9
Krishna Chaitanya P.
KP
Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
171 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
(58)4.3 out of 5
7th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    5.0
    Compliance Monitoring
    Average: 8.4
    8.5
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Malcolm T.
    MT
    It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
    Timothy D.
    TD
    Centrally managed control panel and easy to deploy Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
5.0
Compliance Monitoring
Average: 8.4
8.5
Ease of Admin
Average: 8.9
Malcolm T.
MT
It's seamless, manageable and barely impacts resources. The management console is clear and support is good when it's (rarely) needed. Read review
Timothy D.
TD
Centrally managed control panel and easy to deploy Read review
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,646 Twitter followers
LinkedIn® Page
www.linkedin.com
209 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 31% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Continuous Monitoring
    Average: 8.9
    0.0
    No information available
    9.4
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Evan B.
    EB
    The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
    Mark H.
    MH
    Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,322 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 31% Enterprise
  • 31% Mid-Market
Edgescan features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Continuous Monitoring
Average: 8.9
0.0
No information available
9.4
Ease of Admin
Average: 8.9
Evan B.
EB
The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
Mark H.
MH
Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,322 Twitter followers
LinkedIn® Page
www.linkedin.com
95 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ER
    The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
    Jon R.
    JR
    Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Admin
Average: 8.9
ER
The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
Jon R.
JR
Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®