Best Risk-Based Vulnerability Management Software - Page 4

BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
175 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cytix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Automated Testing
    2
    Customer Support
    2
    Efficiency
    2
    Reporting Quality
    2
    Cons
    Difficult Learning
    1
    Expensive
    1
    False Positives
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cytix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cytix
    Year Founded
    2022
    HQ Location
    Manchester
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 36% Mid-Market
Cytix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Automated Testing
2
Customer Support
2
Efficiency
2
Reporting Quality
2
Cons
Difficult Learning
1
Expensive
1
False Positives
1
Limited Customization
1
Cytix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.6
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Cytix
Year Founded
2022
HQ Location
Manchester
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threat–centric vulnerability management (TCVM) from Skybox™ Security is the best approach to managing and prioritizing vulnerabilities. Using up-to-date intelligence of your network and threats, Skybo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Skybox Vulnerability Control Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Customization
    1
    Dashboard Design
    1
    Features
    1
    Risk Management
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Skybox Vulnerability Control features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    8.9
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    San Francisco
    Twitter
    @SkyboxSecurity
    3,927 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    291 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threat–centric vulnerability management (TCVM) from Skybox™ Security is the best approach to managing and prioritizing vulnerabilities. Using up-to-date intelligence of your network and threats, Skybo

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 33% Mid-Market
Skybox Vulnerability Control Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Customization
1
Dashboard Design
1
Features
1
Risk Management
1
Cons
Expensive
1
Skybox Vulnerability Control features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
8.9
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2002
HQ Location
San Francisco
Twitter
@SkyboxSecurity
3,927 Twitter followers
LinkedIn® Page
www.linkedin.com
291 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nipper

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Titania Nipper Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Titania Nipper features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    6.7
    Reporting
    Average: 8.7
    3.3
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Titania
    Year Founded
    2012
    HQ Location
    London, England
    Twitter
    @TitaniaLtd
    2,883 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nipper

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Titania Nipper Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Licensing Issues
1
Titania Nipper features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
6.7
Reporting
Average: 8.7
3.3
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Titania
Year Founded
2012
HQ Location
London, England
Twitter
@TitaniaLtd
2,883 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Created from three decades of expertise in security, risk, and compliance assurance, the TruOps governance, risk, and compliance platform transforms siloed risk functions into a comprehensive Risk Ope

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • TruOps Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    9
    Ease of Use
    6
    Customizability
    5
    Customization
    5
    Integrations
    5
    Cons
    Complex Setup
    3
    Difficult Learning
    3
    Inadequate Reporting
    3
    Limited Reporting
    3
    Not Intuitive
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TruOps features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    5.6
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TruOps
    HQ Location
    Norwalk, Connecticut
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Created from three decades of expertise in security, risk, and compliance assurance, the TruOps governance, risk, and compliance platform transforms siloed risk functions into a comprehensive Risk Ope

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 42% Mid-Market
TruOps Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
9
Ease of Use
6
Customizability
5
Customization
5
Integrations
5
Cons
Complex Setup
3
Difficult Learning
3
Inadequate Reporting
3
Limited Reporting
3
Not Intuitive
3
TruOps features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
5.6
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
TruOps
HQ Location
Norwalk, Connecticut
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who unc

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 56% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • YesWeHack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Ease of Implementation
    3
    Features
    3
    Implementation Ease
    3
    Clear Interface
    2
    Cons
    Expensive
    3
    Pricing Issues
    2
    Bug Management
    1
    Complexity
    1
    Lack of Detail
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • YesWeHack features and usability ratings that predict user satisfaction
    5.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    YesWeHack
    Year Founded
    2015
    HQ Location
    Paris, France
    LinkedIn® Page
    www.linkedin.com
    337 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

YesWeHack is a leading Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organisations worldwide to tens of thousands of ethical hackers, who unc

Users
No information available
Industries
  • Computer Software
Market Segment
  • 56% Small-Business
  • 38% Mid-Market
YesWeHack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Ease of Implementation
3
Features
3
Implementation Ease
3
Clear Interface
2
Cons
Expensive
3
Pricing Issues
2
Bug Management
1
Complexity
1
Lack of Detail
1
YesWeHack features and usability ratings that predict user satisfaction
5.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
YesWeHack
Year Founded
2015
HQ Location
Paris, France
LinkedIn® Page
www.linkedin.com
337 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis, THE cyber exposure management & security company, protects the entire attack surface and manages an organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less wo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Visibility
    2
    Automation
    1
    Customer Support
    1
    Cybersecurity
    1
    Data Discovery
    1
    Cons
    Lack of Automation
    1
    Lack of Integration
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Reporting
    Average: 8.7
    7.8
    Vulnerability Intelligence
    Average: 8.7
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    Palo Alto, California
    Twitter
    @ArmisSecurity
    2,671 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    814 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis, THE cyber exposure management & security company, protects the entire attack surface and manages an organization’s cyber risk exposure in real time. In a rapidly evolving, perimeter-less wo

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 29% Mid-Market
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Visibility
2
Automation
1
Customer Support
1
Cybersecurity
1
Data Discovery
1
Cons
Lack of Automation
1
Lack of Integration
1
Missing Features
1
Armis features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Reporting
Average: 8.7
7.8
Vulnerability Intelligence
Average: 8.7
6.7
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2015
HQ Location
Palo Alto, California
Twitter
@ArmisSecurity
2,671 Twitter followers
LinkedIn® Page
www.linkedin.com
814 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    585 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
585 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Reposify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    User Interface
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Reposify features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Reposify
    HQ Location
    San Francisco, California
    Twitter
    @reposify
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Mid-Market
Reposify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
User Interface
1
Cons
Expensive
1
Reposify features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Reposify
HQ Location
San Francisco, California
Twitter
@reposify
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security leaders leverage Rivial's Data Security platform to accurately measure risk, automate compliance and easily manage their security program. Rivial leverages Monte Carlo analysis, Cyber Risk Q

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 90% Mid-Market
    • 10% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rivial Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Helpful
    6
    Document Management
    5
    Security
    5
    Communication
    4
    Compliance Management
    4
    Cons
    Learning Curve
    4
    Confusing Interface
    2
    Confusion
    2
    Difficult Learning
    2
    Lack of Clarity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rivial Data Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    West Lafayette, Indiana
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security leaders leverage Rivial's Data Security platform to accurately measure risk, automate compliance and easily manage their security program. Rivial leverages Monte Carlo analysis, Cyber Risk Q

Users
No information available
Industries
  • Financial Services
Market Segment
  • 90% Mid-Market
  • 10% Small-Business
Rivial Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Helpful
6
Document Management
5
Security
5
Communication
4
Compliance Management
4
Cons
Learning Curve
4
Confusing Interface
2
Confusion
2
Difficult Learning
2
Lack of Clarity
2
Rivial Data Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2010
HQ Location
West Lafayette, Indiana
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ArmorCode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    3
    Cybersecurity
    2
    Integrations
    2
    Security
    2
    Vulnerability Identification
    2
    Cons
    Inadequate Reporting
    2
    Limited Customization
    2
    Needs Improvement
    2
    Reporting Issues
    2
    Information Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ArmorCode features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ArmorCode
    Year Founded
    2020
    HQ Location
    Palo Alto, California, United States
    LinkedIn® Page
    www.linkedin.com
    173 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ArmorCode is on a mission to supercharge security teams with a new independent governance approach to reduce risk and burn down critical security technical debt. With its AI-powered ASPM Platform, dri

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
ArmorCode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
3
Cybersecurity
2
Integrations
2
Security
2
Vulnerability Identification
2
Cons
Inadequate Reporting
2
Limited Customization
2
Needs Improvement
2
Reporting Issues
2
Information Management
1
ArmorCode features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
ArmorCode
Year Founded
2020
HQ Location
Palo Alto, California, United States
LinkedIn® Page
www.linkedin.com
173 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hadrian Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Cybersecurity
    1
    Detection Efficiency
    1
    Features
    1
    Monitoring
    1
    Cons
    Inadequate Reporting
    2
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hadrian features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hadrian
    Year Founded
    2021
    HQ Location
    Amsterdam, NL
    LinkedIn® Page
    www.linkedin.com
    81 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Hadrian Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Cybersecurity
1
Detection Efficiency
1
Features
1
Monitoring
1
Cons
Inadequate Reporting
2
Missing Features
1
Hadrian features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Hadrian
Year Founded
2021
HQ Location
Amsterdam, NL
LinkedIn® Page
www.linkedin.com
81 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlexTrac is the market-leading pentest reporting and management automation platform, ideal for both enterprise security teams and MSSPs. You can ingest all of your data from vulnerability scans, red t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PlexTrac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Data Security
    1
    Features
    1
    Integration Capabilities
    1
    Cons
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PlexTrac features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    7.2
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Boise, Idaho
    Twitter
    @plextrac
    1,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

PlexTrac is the market-leading pentest reporting and management automation platform, ideal for both enterprise security teams and MSSPs. You can ingest all of your data from vulnerability scans, red t

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
PlexTrac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Data Security
1
Features
1
Integration Capabilities
1
Cons
Missing Features
1
PlexTrac features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
7.2
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2016
HQ Location
Boise, Idaho
Twitter
@plextrac
1,655 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Splunk Intelligence Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Insights
    6
    Ease of Use
    5
    Threat Detection
    4
    Dashboard Usability
    3
    Detailed Analysis
    3
    Cons
    Difficult Learning Curve
    4
    Expensive
    4
    Difficult Learning
    3
    Learning Curve
    3
    Additional Costs
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Intelligence Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    733,221 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97,323 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Splunk Intelligence Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Insights
6
Ease of Use
5
Threat Detection
4
Dashboard Usability
3
Detailed Analysis
3
Cons
Difficult Learning Curve
4
Expensive
4
Difficult Learning
3
Learning Curve
3
Additional Costs
2
Splunk Intelligence Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
733,221 Twitter followers
LinkedIn® Page
www.linkedin.com
97,323 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threadfix features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @denimgroup
    1,406 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever.

Users
No information available
Industries
No information available
Market Segment
  • 33% Mid-Market
  • 33% Enterprise
Threadfix features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Twitter
@denimgroup
1,406 Twitter followers
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tromzo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Dashboard Design
    1
    Easy Integrations
    1
    Integration Capabilities
    1
    Cons
    Complex UI
    1
    Limited Features
    1
    Poor UI Design
    1
    Slow Loading
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tromzo features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tromzo
    Year Founded
    2021
    HQ Location
    Mountain View, CA
    Twitter
    @TromzoSecurity
    125 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Tromzo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Dashboard Design
1
Easy Integrations
1
Integration Capabilities
1
Cons
Complex UI
1
Limited Features
1
Poor UI Design
1
Slow Loading
1
Slow Performance
1
Tromzo features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
6.7
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tromzo
Year Founded
2021
HQ Location
Mountain View, CA
Twitter
@TromzoSecurity
125 Twitter followers
LinkedIn® Page
www.linkedin.com