Best Risk-Based Vulnerability Management Software - Page 5

BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
174 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BMC Helix Automation Console Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Simple
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Automation Console features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,934 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,879 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BMC Helix Automation Console Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Simple
1
Cons
This product has not yet received any negative sentiments.
BMC Helix Automation Console features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,934 Twitter followers
LinkedIn® Page
www.linkedin.com
9,879 employees on LinkedIn®
Phone
713 918 8800
(6)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyCognito features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Company Website
    Year Founded
    2017
    HQ Location
    Palo Alto, US
    Twitter
    @CyCognito
    10,622 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    158 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 17% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
CyCognito features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
7.5
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
CyCognito
Company Website
Year Founded
2017
HQ Location
Palo Alto, US
Twitter
@CyCognito
10,622 Twitter followers
LinkedIn® Page
www.linkedin.com
158 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Escape is the only DAST that works with your modern stack and tests business logic instead of missing headers Escape helps teams secure modern applications: • Document all your APIs in minutes a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Escape Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Security
    5
    Easy Integrations
    4
    Customer Support
    3
    Cybersecurity
    3
    Cons
    API Issues
    1
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    Difficult Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Escape features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    5.0
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Escape
    Year Founded
    2020
    HQ Location
    Paris, France
    Twitter
    @escapetechHQ
    324 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Escape is the only DAST that works with your modern stack and tests business logic instead of missing headers Escape helps teams secure modern applications: • Document all your APIs in minutes a

Users
No information available
Industries
No information available
Market Segment
  • 63% Small-Business
  • 38% Mid-Market
Escape Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Security
5
Easy Integrations
4
Customer Support
3
Cybersecurity
3
Cons
API Issues
1
Complexity
1
Complex Setup
1
Difficult Learning
1
Difficult Learning Curve
1
Escape features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
5.0
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Escape
Year Founded
2020
HQ Location
Paris, France
Twitter
@escapetechHQ
324 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortifyData Continuous Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Deployment Ease
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Kennesaw, Georgia
    Twitter
    @fortifydata
    87 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
FortifyData Continuous Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Deployment Ease
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Cons
This product has not yet received any negative sentiments.
FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
Kennesaw, Georgia
Twitter
@fortifydata
87 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • H2Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    H2Cyber
    Year Founded
    2009
    HQ Location
    Prosper, Texas
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
H2Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
H2Cyber
Year Founded
2009
HQ Location
Prosper, Texas
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP (Vulnerability Management Platform) features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP (Vulnerability Management Platform) features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vul

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for RBVM features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,770 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,974 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vul

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Ivanti Neurons for RBVM features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,770 Twitter followers
LinkedIn® Page
www.linkedin.com
2,974 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetSPI PTaaS solves the challenges of traditional pentesting, using a powerful combination of people, processes, and technology to deliver contextualized outcomes in real time on a single platform. Mo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetSPI PTaaS (Penetration Testing as a Service) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Communication
    4
    Ease of Use
    4
    Service Quality
    4
    Customer Support
    3
    Scheduling
    3
    Cons
    False Positives
    2
    Lack of Information
    2
    Difficult Navigation
    1
    Information Management
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetSPI PTaaS (Penetration Testing as a Service) features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetSPI
    Company Website
    Year Founded
    2001
    HQ Location
    Minneapolis, MN
    Twitter
    @NetSPI
    3,835 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    641 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetSPI PTaaS solves the challenges of traditional pentesting, using a powerful combination of people, processes, and technology to deliver contextualized outcomes in real time on a single platform. Mo

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 36% Mid-Market
NetSPI PTaaS (Penetration Testing as a Service) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Communication
4
Ease of Use
4
Service Quality
4
Customer Support
3
Scheduling
3
Cons
False Positives
2
Lack of Information
2
Difficult Navigation
1
Information Management
1
Integration Issues
1
NetSPI PTaaS (Penetration Testing as a Service) features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
NetSPI
Company Website
Year Founded
2001
HQ Location
Minneapolis, MN
Twitter
@NetSPI
3,835 Twitter followers
LinkedIn® Page
www.linkedin.com
641 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlexTrac is the market-leading pentest reporting and management automation platform, ideal for both enterprise security teams and MSSPs. You can ingest all of your data from vulnerability scans, red t

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PlexTrac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Data Security
    1
    Features
    1
    Integration Capabilities
    1
    Cons
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PlexTrac features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Boise, Idaho
    Twitter
    @plextrac
    1,655 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

PlexTrac is the market-leading pentest reporting and management automation platform, ideal for both enterprise security teams and MSSPs. You can ingest all of your data from vulnerability scans, red t

Users
No information available
Industries
No information available
Market Segment
  • 33% Small-Business
  • 33% Enterprise
PlexTrac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Data Security
1
Features
1
Integration Capabilities
1
Cons
Missing Features
1
PlexTrac features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Boise, Idaho
Twitter
@plextrac
1,655 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    4
    Visibility
    3
    Features
    2
    Innovation
    2
    Risk Management
    2
    Cons
    Complex UI
    1
    Dashboard Issues
    1
    Expensive
    1
    Inadequate Security
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Twitter
    @RedHuntLabs
    3,540 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
4
Visibility
3
Features
2
Innovation
2
Risk Management
2
Cons
Complex UI
1
Dashboard Issues
1
Expensive
1
Inadequate Security
1
Inefficient Alert System
1
RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Twitter
@RedHuntLabs
3,540 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gain objective insight into your third-party security performance and IT landscape

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskRecon features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskRecon
    Year Founded
    2013
    HQ Location
    Salt Lake City, Utah
    Twitter
    @riskrecon
    664 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gain objective insight into your third-party security performance and IT landscape

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
RiskRecon features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
RiskRecon
Year Founded
2013
HQ Location
Salt Lake City, Utah
Twitter
@riskrecon
664 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tripwire IP360 features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,423 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,774 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tripwire IP360 features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,423 Twitter followers
LinkedIn® Page
www.linkedin.com
1,774 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrueSight Vulnerability Management for Third-Party Applications features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,934 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,879 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
TrueSight Vulnerability Management for Third-Party Applications features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,934 Twitter followers
LinkedIn® Page
www.linkedin.com
9,879 employees on LinkedIn®
Phone
713 918 8800
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: compre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Visore Security Management Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rockville, MD
    LinkedIn® Page
    linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: compre

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Visore Security Management Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2019
HQ Location
Rockville, MD
LinkedIn® Page
linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AttackTree features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Isograph
Product Description
How are these determined?Information
This description is provided by the seller.

AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
AttackTree features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Isograph