Best Software for 2025 is now live!
|| products.size

Best Risk-Based Vulnerability Management Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
170 Listings in Risk-Based Vulnerability Management Available
(59)4.1 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cortex Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    25
    Cloud Management
    18
    Cloud Security
    18
    Cloud Services
    16
    Ease of Use
    16
    Cons
    Expensive
    15
    Learning Curve
    12
    Pricing Issues
    12
    Not User-Friendly
    10
    Poor User Interface
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    7.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,110 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16,690 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Enterprise
  • 32% Mid-Market
Cortex Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
25
Cloud Management
18
Cloud Security
18
Cloud Services
16
Ease of Use
16
Cons
Expensive
15
Learning Curve
12
Pricing Issues
12
Not User-Friendly
10
Poor User Interface
10
Cortex Cloud features and usability ratings that predict user satisfaction
7.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,110 Twitter followers
LinkedIn® Page
www.linkedin.com
16,690 employees on LinkedIn®
(84)4.2 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VulScan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    23
    Scanning Efficiency
    17
    Vulnerability Identification
    17
    Automated Scanning
    13
    Features
    11
    Cons
    Complex Setup
    6
    Inadequate Reporting
    6
    Poor User Interface
    6
    Limited Reporting
    5
    Poor Interface Design
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VulScan features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.1
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.5
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kaseya
    Company Website
    Year Founded
    2000
    HQ Location
    Miami, FL
    Twitter
    @KaseyaCorp
    17,686 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,835 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Automated Vulnerability Scanning. Affordably Priced For Everyone! With almost 70 new hidden vulnerabilities identified every day, you would need to be a super hero with X-ray vision to find them all.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Small-Business
  • 33% Mid-Market
VulScan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
23
Scanning Efficiency
17
Vulnerability Identification
17
Automated Scanning
13
Features
11
Cons
Complex Setup
6
Inadequate Reporting
6
Poor User Interface
6
Limited Reporting
5
Poor Interface Design
5
VulScan features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.1
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.5
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Kaseya
Company Website
Year Founded
2000
HQ Location
Miami, FL
Twitter
@KaseyaCorp
17,686 Twitter followers
LinkedIn® Page
www.linkedin.com
4,835 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecOps Solution is a patch and vulnerability management platform.

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 69% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecOps Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Patch Management
    6
    Customer Support
    5
    Reporting
    5
    Detailed Explanation
    4
    Reporting Efficiency
    4
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecOps Solution features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Mountain View, California, USA
    Twitter
    @secopsolution
    32 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecOps Solution is a patch and vulnerability management platform.

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 69% Small-Business
  • 25% Mid-Market
SecOps Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Patch Management
6
Customer Support
5
Reporting
5
Detailed Explanation
4
Reporting Efficiency
4
Cons
This product has not yet received any negative sentiments.
SecOps Solution features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2021
HQ Location
Mountain View, California, USA
Twitter
@secopsolution
32 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
(54)4.7 out of 5
Optimized for quick response
6th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 63% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adlumin Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    19
    Ease of Use
    16
    Features
    14
    Visibility
    12
    Detection
    11
    Cons
    Insufficient Detail
    5
    Missing Features
    5
    False Positives
    4
    Information Management
    4
    Lack of Features
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adlumin features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.1
    Reporting
    Average: 8.7
    8.7
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Adlumin
    Company Website
    Year Founded
    2016
    HQ Location
    Washington, US
    Twitter
    @adlumin
    432 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    159 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adlumin, an N-able Company, provides enterprise-grade cybersecurity for organizations of all sizes through its innovative Security Operations as a Service platform. With an agnostic approach, the Adlu

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 63% Mid-Market
  • 20% Small-Business
Adlumin Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
19
Ease of Use
16
Features
14
Visibility
12
Detection
11
Cons
Insufficient Detail
5
Missing Features
5
False Positives
4
Information Management
4
Lack of Features
4
Adlumin features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.1
Reporting
Average: 8.7
8.7
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Adlumin
Company Website
Year Founded
2016
HQ Location
Washington, US
Twitter
@adlumin
432 Twitter followers
LinkedIn® Page
www.linkedin.com
159 employees on LinkedIn®
(76)4.5 out of 5
10th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot by Ridge Security is a leading AI agent for continuous security validation, specializing in threat exposure management. It uses AI to assess, prioritize, and validate attack surfaces, exploit

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Small-Business
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    39
    Automation
    21
    Vulnerability Identification
    21
    Automation Testing
    17
    Vulnerability Detection
    15
    Cons
    Limited Scope
    8
    Missing Features
    8
    Limited Features
    7
    Complexity
    6
    Expensive
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RidgeBot features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.4
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,278 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot by Ridge Security is a leading AI agent for continuous security validation, specializing in threat exposure management. It uses AI to assess, prioritize, and validate attack surfaces, exploit

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Small-Business
  • 37% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
39
Automation
21
Vulnerability Identification
21
Automation Testing
17
Vulnerability Detection
15
Cons
Limited Scope
8
Missing Features
8
Limited Features
7
Complexity
6
Expensive
5
RidgeBot features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.4
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,278 Twitter followers
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
Entry Level Price:Starting at $999.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BugBase is a Continuous Vulnerability Assessment Platform that conducts comprehensive security operations such as bug bounty programs and next-gen pentesting (VAPT) to assist startups and enterprises

    Users
    No information available
    Industries
    • Computer & Network Security
    • Computer Software
    Market Segment
    • 60% Small-Business
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BugBase Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Cybersecurity
    9
    Real-time Monitoring
    8
    User Interface
    8
    Reporting
    7
    Cons
    Learning Curve
    4
    Bug Management
    3
    Complexity
    3
    Difficult Learning
    3
    High Learning Curve
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BugBase features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BugBase
    Year Founded
    2021
    HQ Location
    Singapore, US
    Twitter
    @BugBase
    1,598 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BugBase is a Continuous Vulnerability Assessment Platform that conducts comprehensive security operations such as bug bounty programs and next-gen pentesting (VAPT) to assist startups and enterprises

Users
No information available
Industries
  • Computer & Network Security
  • Computer Software
Market Segment
  • 60% Small-Business
  • 23% Enterprise
BugBase Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Cybersecurity
9
Real-time Monitoring
8
User Interface
8
Reporting
7
Cons
Learning Curve
4
Bug Management
3
Complexity
3
Difficult Learning
3
High Learning Curve
3
BugBase features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.8
Seller Details
Seller
BugBase
Year Founded
2021
HQ Location
Singapore, US
Twitter
@BugBase
1,598 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 47% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortra VM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Vulnerability Identification
    7
    User Interface
    4
    Customer Support
    3
    Detailed Explanation
    3
    Cons
    Scanning Issues
    7
    Slow Scanning
    5
    Slow Performance
    4
    Discovery Issues
    3
    Inaccuracy
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra VM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.6
    Vulnerability Intelligence
    Average: 8.7
    8.7
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,407 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,774 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 47% Mid-Market
  • 34% Small-Business
Fortra VM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Vulnerability Identification
7
User Interface
4
Customer Support
3
Detailed Explanation
3
Cons
Scanning Issues
7
Slow Scanning
5
Slow Performance
4
Discovery Issues
3
Inaccuracy
3
Fortra VM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.6
Vulnerability Intelligence
Average: 8.7
8.7
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,407 Twitter followers
LinkedIn® Page
www.linkedin.com
1,774 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYRISMA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    13
    Vulnerability Identification
    11
    Customer Support
    10
    Security
    10
    Cons
    Poor Interface Design
    7
    Software Bugs
    7
    Bugs
    6
    Poor Interface
    5
    Poor UI Design
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYRISMA features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    8.5
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYRISMA
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @CYRISMA_USA
    39 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
CYRISMA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
13
Vulnerability Identification
11
Customer Support
10
Security
10
Cons
Poor Interface Design
7
Software Bugs
7
Bugs
6
Poor Interface
5
Poor UI Design
4
CYRISMA features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
8.5
Risk-Prioritization
Average: 8.8
Seller Details
Seller
CYRISMA
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@CYRISMA_USA
39 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
(57)4.2 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aqua Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    24
    Security
    21
    Vulnerability Identification
    13
    Features
    12
    User Interface
    12
    Cons
    Missing Features
    14
    Lack of Features
    9
    Improvement Needed
    7
    Limited Features
    7
    Poor Interface
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aqua Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    4.2
    Reporting
    Average: 8.7
    7.8
    Vulnerability Intelligence
    Average: 8.7
    7.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Burlington, US
    Twitter
    @AquaSecTeam
    7,597 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    650 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 56% Enterprise
  • 39% Mid-Market
Aqua Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
24
Security
21
Vulnerability Identification
13
Features
12
User Interface
12
Cons
Missing Features
14
Lack of Features
9
Improvement Needed
7
Limited Features
7
Poor Interface
5
Aqua Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
4.2
Reporting
Average: 8.7
7.8
Vulnerability Intelligence
Average: 8.7
7.2
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2015
HQ Location
Burlington, US
Twitter
@AquaSecTeam
7,597 Twitter followers
LinkedIn® Page
www.linkedin.com
650 employees on LinkedIn®
(59)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 49% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SanerNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    18
    Security
    12
    Customer Support
    10
    Patch Management
    10
    Features
    9
    Cons
    Expensive
    6
    Missing Features
    6
    Learning Curve
    5
    Difficult Learning
    4
    Integration Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SanerNow features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.5
    Vulnerability Intelligence
    Average: 8.7
    9.1
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    548 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 49% Small-Business
  • 39% Mid-Market
SanerNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
18
Security
12
Customer Support
10
Patch Management
10
Features
9
Cons
Expensive
6
Missing Features
6
Learning Curve
5
Difficult Learning
4
Integration Issues
4
SanerNow features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.5
Vulnerability Intelligence
Average: 8.7
9.1
Risk-Prioritization
Average: 8.8
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
548 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    12
    Features
    11
    Security
    11
    Ease of Use
    10
    Threat Detection
    10
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Lack of Detail
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Security Randori Recon features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
12
Features
11
Security
11
Ease of Use
10
Threat Detection
10
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Lack of Detail
3
IBM Security Randori Recon features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
(160)4.3 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

    Users
    No information available
    Industries
    • Security and Investigations
    • Financial Services
    Market Segment
    • 50% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Resolver Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    Customer Support
    51
    Helpful
    48
    Customization
    46
    Customizability
    43
    Cons
    Complexity
    39
    Improvement Needed
    27
    Learning Curve
    23
    Inadequate Reporting
    22
    Limited Features
    22
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Resolver features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    6.3
    Reporting
    Average: 8.7
    6.9
    Vulnerability Intelligence
    Average: 8.7
    7.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Resolver
    Company Website
    HQ Location
    Toronto, Canada
    Twitter
    @Resolver
    5,083 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    430 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Resolver gathers all risk data and analyzes it in context—revealing the true business impact within every risk. Our Risk Intelligence Platform traces the extended implications of all types of risks —w

Users
No information available
Industries
  • Security and Investigations
  • Financial Services
Market Segment
  • 50% Enterprise
  • 38% Mid-Market
Resolver Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
Customer Support
51
Helpful
48
Customization
46
Customizability
43
Cons
Complexity
39
Improvement Needed
27
Learning Curve
23
Inadequate Reporting
22
Limited Features
22
Resolver features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
6.3
Reporting
Average: 8.7
6.9
Vulnerability Intelligence
Average: 8.7
7.2
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Resolver
Company Website
HQ Location
Toronto, Canada
Twitter
@Resolver
5,083 Twitter followers
LinkedIn® Page
www.linkedin.com
430 employees on LinkedIn®
Entry Level Price:$34.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – all

    Users
    No information available
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 62% Enterprise
    • 24% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KernelCare Enterprise Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Patch Management
    2
    Coverage Effectiveness
    1
    Cross-Platform Compatibility
    1
    Cybersecurity
    1
    Data Discovery
    1
    Cons
    Lack of Cloud Support
    2
    API Limitations
    1
    Limited Automation
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KernelCare Enterprise features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    9.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TuxCare
    HQ Location
    Palo Alto, US
    Twitter
    @TuxCare_
    1,127 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – all

Users
No information available
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 62% Enterprise
  • 24% Small-Business
KernelCare Enterprise Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Patch Management
2
Coverage Effectiveness
1
Cross-Platform Compatibility
1
Cybersecurity
1
Data Discovery
1
Cons
Lack of Cloud Support
2
API Limitations
1
Limited Automation
1
Missing Features
1
KernelCare Enterprise features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
9.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
TuxCare
HQ Location
Palo Alto, US
Twitter
@TuxCare_
1,127 Twitter followers
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Continuity Software Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    9
    Vulnerability Identification
    6
    Cybersecurity
    5
    Vulnerability Detection
    5
    Ease of Use
    4
    Cons
    Difficult Setup
    3
    Expensive
    3
    Integration Issues
    3
    Complexity
    2
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    8.6
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
9
Vulnerability Identification
6
Cybersecurity
5
Vulnerability Detection
5
Ease of Use
4
Cons
Difficult Setup
3
Expensive
3
Integration Issues
3
Complexity
2
Complex Setup
2
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
8.6
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
442 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(35)4.5 out of 5
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Certa is a SaaS based workflow automation platform that makes it easy for businesses to manage the lifecycle of their third parties. Certa’s powerful workflow engine enables businesses to streamline p

    Users
    No information available
    Industries
    • Retail
    • Financial Services
    Market Segment
    • 57% Enterprise
    • 23% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Certa Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    14
    Implementation Ease
    10
    Customization
    9
    Customer Support
    8
    Helpful
    7
    Cons
    Learning Curve
    4
    Access Control
    3
    Difficult Learning
    3
    Slow Loading
    3
    Admin Limitations
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Certa features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Certa
    Year Founded
    2017
    HQ Location
    Saratoga, California
    Twitter
    @certa
    118 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    197 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Certa is a SaaS based workflow automation platform that makes it easy for businesses to manage the lifecycle of their third parties. Certa’s powerful workflow engine enables businesses to streamline p

Users
No information available
Industries
  • Retail
  • Financial Services
Market Segment
  • 57% Enterprise
  • 23% Small-Business
Certa Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
14
Implementation Ease
10
Customization
9
Customer Support
8
Helpful
7
Cons
Learning Curve
4
Access Control
3
Difficult Learning
3
Slow Loading
3
Admin Limitations
2
Certa features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Certa
Year Founded
2017
HQ Location
Saratoga, California
Twitter
@certa
118 Twitter followers
LinkedIn® Page
www.linkedin.com
197 employees on LinkedIn®