Best Software for 2025 is now live!
|| products.size

Best Attack Surface Management Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks

Best Attack Surface Management Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
129 Listings in Attack Surface Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot by Ridge Security is a leading AI agent for continuous security validation, specializing in threat exposure management. It uses AI to assess, prioritize, and validate attack surfaces, exploit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    39
    Automation
    21
    Vulnerability Identification
    21
    Automation Testing
    17
    Vulnerability Detection
    15
    Cons
    Limited Scope
    8
    Missing Features
    8
    Limited Features
    7
    Complexity
    6
    Expensive
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RidgeBot features and usability ratings that predict user satisfaction
    9.3
    Vulnerability Intelligence
    Average: 8.9
    9.0
    Continuous Monitoring
    Average: 8.9
    9.0
    Compliance Monitoring
    Average: 8.4
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,278 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot by Ridge Security is a leading AI agent for continuous security validation, specializing in threat exposure management. It uses AI to assess, prioritize, and validate attack surfaces, exploit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Small-Business
  • 37% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
39
Automation
21
Vulnerability Identification
21
Automation Testing
17
Vulnerability Detection
15
Cons
Limited Scope
8
Missing Features
8
Limited Features
7
Complexity
6
Expensive
5
RidgeBot features and usability ratings that predict user satisfaction
9.3
Vulnerability Intelligence
Average: 8.9
9.0
Continuous Monitoring
Average: 8.9
9.0
Compliance Monitoring
Average: 8.4
9.2
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,278 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
Entry Level Price:Starting at €82.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Detectify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Automation Testing
    3
    Features
    3
    Vulnerability Detection
    3
    Accuracy of Results
    2
    Cons
    Expensive
    2
    Lack of Information
    2
    Slow Scanning
    2
    Complexity
    1
    Complex Queries
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    9.4
    Compliance Monitoring
    Average: 8.4
    8.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,413 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    107 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Automation Testing
3
Features
3
Vulnerability Detection
3
Accuracy of Results
2
Cons
Expensive
2
Lack of Information
2
Slow Scanning
2
Complexity
1
Complex Queries
1
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
9.4
Compliance Monitoring
Average: 8.4
8.7
Ease of Admin
Average: 8.9
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,413 Twitter followers
LinkedIn® Page
www.linkedin.com
107 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(37)4.7 out of 5
10th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darwin Attack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Customer Support
    8
    Vulnerability Identification
    8
    Communication
    6
    Pentesting Efficiency
    6
    Cons
    Login Issues
    2
    Poor Notifications
    2
    Technical Issues
    2
    Authentication Issues
    1
    Difficult Navigation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Darwin Attack features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 8.9
    8.0
    Continuous Monitoring
    Average: 8.9
    9.0
    Compliance Monitoring
    Average: 8.4
    9.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chicago, Illinois
    Twitter
    @theevolvesec
    800 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 19% Small-Business
Darwin Attack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Customer Support
8
Vulnerability Identification
8
Communication
6
Pentesting Efficiency
6
Cons
Login Issues
2
Poor Notifications
2
Technical Issues
2
Authentication Issues
1
Difficult Navigation
1
Darwin Attack features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 8.9
8.0
Continuous Monitoring
Average: 8.9
9.0
Compliance Monitoring
Average: 8.4
9.3
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
800 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    12
    Features
    11
    Security
    11
    Ease of Use
    10
    Threat Detection
    10
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Lack of Detail
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    8.9
    Continuous Monitoring
    Average: 8.9
    8.3
    Compliance Monitoring
    Average: 8.4
    8.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
12
Features
11
Security
11
Ease of Use
10
Threat Detection
10
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Lack of Detail
3
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
8.9
Continuous Monitoring
Average: 8.9
8.3
Compliance Monitoring
Average: 8.4
8.6
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(59)4.5 out of 5
Optimized for quick response
14th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SanerNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Security
    12
    Customer Support
    10
    Patch Management
    10
    Features
    9
    Cons
    Expensive
    6
    Missing Features
    6
    Learning Curve
    5
    Difficult Learning
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SanerNow features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Small-Business
  • 39% Mid-Market
SanerNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Security
12
Customer Support
10
Patch Management
10
Features
9
Cons
Expensive
6
Missing Features
6
Learning Curve
5
Difficult Learning
4
Integration Issues
4
SanerNow features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
548 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
(58)4.3 out of 5
7th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VIPRE Endpoint Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Alert Notifications
    1
    Antivirus Software
    1
    Centralization
    1
    Centralized Management
    1
    Cons
    Backup Issues
    1
    Missing Features
    1
    Needs Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    5.0
    Compliance Monitoring
    Average: 8.4
    8.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Alert Notifications
1
Antivirus Software
1
Centralization
1
Centralized Management
1
Cons
Backup Issues
1
Missing Features
1
Needs Improvement
1
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
5.0
Compliance Monitoring
Average: 8.4
8.5
Ease of Admin
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,646 Twitter followers
LinkedIn® Page
www.linkedin.com
209 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 71% Mid-Market
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    16
    Ease of Use
    4
    Easy Integrations
    4
    Efficiency Improvement
    4
    Improvement
    4
    Cons
    Difficult Learning
    7
    Learning Curve
    7
    Learning Difficulty
    6
    Limited Features
    4
    Information Overload
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 8.9
    9.7
    Continuous Monitoring
    Average: 8.9
    9.9
    Compliance Monitoring
    Average: 8.4
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 71% Mid-Market
  • 24% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
16
Ease of Use
4
Easy Integrations
4
Efficiency Improvement
4
Improvement
4
Cons
Difficult Learning
7
Learning Curve
7
Learning Difficulty
6
Limited Features
4
Information Overload
3
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 8.9
9.7
Continuous Monitoring
Average: 8.9
9.9
Compliance Monitoring
Average: 8.4
10.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
171 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
(13)4.9 out of 5
15th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cavelo helps businesses achieve attack surface management with automated data discovery, classification and reporting. Its cloud compatible cyber asset attack surface management (CAASM) platform conti

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cavelo features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Kitchener, CA
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cavelo helps businesses achieve attack surface management with automated data discovery, classification and reporting. Its cloud compatible cyber asset attack surface management (CAASM) platform conti

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 38% Small-Business
Cavelo features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
0.0
No information available
0.0
No information available
8.9
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2021
HQ Location
Kitchener, CA
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Small-Business
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CODA Footprint features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 8.9
    9.6
    Continuous Monitoring
    Average: 8.9
    9.0
    Compliance Monitoring
    Average: 8.4
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Greater Boston Area, US
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Small-Business
  • 18% Enterprise
CODA Footprint features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 8.9
9.6
Continuous Monitoring
Average: 8.9
9.0
Compliance Monitoring
Average: 8.4
9.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2015
HQ Location
Greater Boston Area, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Falcon Security and IT operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Easy Integrations
    7
    Security Protection
    7
    Security
    6
    Customer Support
    5
    Cons
    Expensive
    4
    Bugs
    3
    Poor Documentation
    2
    Slow Loading
    2
    Slow Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Falcon Security and IT operations features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 8.9
    9.4
    Continuous Monitoring
    Average: 8.9
    9.0
    Compliance Monitoring
    Average: 8.4
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,641 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 47% Mid-Market
Falcon Security and IT operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Easy Integrations
7
Security Protection
7
Security
6
Customer Support
5
Cons
Expensive
4
Bugs
3
Poor Documentation
2
Slow Loading
2
Slow Performance
2
Falcon Security and IT operations features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 8.9
9.4
Continuous Monitoring
Average: 8.9
9.0
Compliance Monitoring
Average: 8.4
8.8
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,406 Twitter followers
LinkedIn® Page
www.linkedin.com
9,641 employees on LinkedIn®
Ownership
NASDAQ: CRWD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 31% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Security
    3
    Ease of Use
    2
    Expertise
    2
    Features
    2
    Cons
    Access Restrictions
    1
    Bugs
    1
    Integration Issues
    1
    Lack of Integration
    1
    Limited Access
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Continuous Monitoring
    Average: 8.9
    0.0
    No information available
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,322 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 31% Enterprise
  • 31% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Security
3
Ease of Use
2
Expertise
2
Features
2
Cons
Access Restrictions
1
Bugs
1
Integration Issues
1
Lack of Integration
1
Limited Access
1
Edgescan features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Continuous Monitoring
Average: 8.9
0.0
No information available
9.4
Ease of Admin
Average: 8.9
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,322 Twitter followers
LinkedIn® Page
www.linkedin.com
95 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HostedScan.com Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Affordable
    1
    Alert Notifications
    1
    Cloud Services
    1
    Communication
    1
    Cons
    Excessive Notifications
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    56 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Affordable
1
Alert Notifications
1
Cloud Services
1
Communication
1
Cons
Excessive Notifications
1
Limited Features
1
HostedScan.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
56 Twitter followers
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Offensity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    2
    Dashboard Usability
    2
    Ease of Use
    2
    Reporting
    2
    Value
    2
    Cons
    Difficult Navigation
    1
    Inadequate Security
    1
    Poor Interface Design
    1
    Poor Usability
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Offensity features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 8.9
    7.2
    Continuous Monitoring
    Average: 8.9
    7.8
    Compliance Monitoring
    Average: 8.4
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    268 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 30% Mid-Market
Offensity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
2
Dashboard Usability
2
Ease of Use
2
Reporting
2
Value
2
Cons
Difficult Navigation
1
Inadequate Security
1
Poor Interface Design
1
Poor Usability
1
Slow Performance
1
Offensity features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 8.9
7.2
Continuous Monitoring
Average: 8.9
7.8
Compliance Monitoring
Average: 8.4
9.4
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
268 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 54% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    9
    Vulnerability Detection
    9
    Ease of Use
    7
    Monitoring
    7
    Vulnerability Identification
    7
    Cons
    Cloud Dependency
    1
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 8.9
    9.7
    Continuous Monitoring
    Average: 8.9
    9.4
    Compliance Monitoring
    Average: 8.4
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    33 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 54% Mid-Market
  • 38% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
9
Vulnerability Detection
9
Ease of Use
7
Monitoring
7
Vulnerability Identification
7
Cons
Cloud Dependency
1
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Inefficient Alert System
1
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 8.9
9.7
Continuous Monitoring
Average: 8.9
9.4
Compliance Monitoring
Average: 8.4
9.7
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
33 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(11)4.5 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 8.9
    10.0
    Continuous Monitoring
    Average: 8.9
    8.9
    Compliance Monitoring
    Average: 8.4
    9.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    586 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 8.9
10.0
Continuous Monitoring
Average: 8.9
8.9
Compliance Monitoring
Average: 8.4
9.3
Ease of Admin
Average: 8.9
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
586 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®