Best Risk-Based Vulnerability Management Software - Page 6

BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
175 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We pro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Autobahn Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    6.7
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We pro

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Autobahn Security features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
6.7
Risk-Prioritization
Average: 8.7
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Remediate features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1980
    HQ Location
    Houston, TX
    Twitter
    @BMCSoftware
    49,934 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    9,879 employees on LinkedIn®
    Phone
    713 918 8800
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
BMC Helix Remediate features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1980
HQ Location
Houston, TX
Twitter
@BMCSoftware
49,934 Twitter followers
LinkedIn® Page
www.linkedin.com
9,879 employees on LinkedIn®
Phone
713 918 8800

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. Centraleyes provides an exceptional ability to see, understand

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Centraleyes Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    2
    Access Ease
    1
    Assessment Process
    1
    Automation
    1
    Automation Efficiency
    1
    Cons
    Filtering Issues
    1
    Inadequate Reporting
    1
    Lack of Clarity
    1
    Learning Curve
    1
    Learning Difficulty
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Centraleyes features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. Centraleyes provides an exceptional ability to see, understand

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Centraleyes Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
2
Access Ease
1
Assessment Process
1
Automation
1
Automation Efficiency
1
Cons
Filtering Issues
1
Inadequate Reporting
1
Lack of Clarity
1
Learning Curve
1
Learning Difficulty
1
Centraleyes features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2016
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CybelAngel Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Information
    2
    Alerts
    2
    Detection
    2
    Actionable Intelligence
    1
    Alert Notifications
    1
    Cons
    False Positives
    2
    Inefficient Alerts
    1
    Inefficient Alert System
    1
    Poor Detection Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CybelAngel features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Paris, FR
    Twitter
    @CybelAngel
    3,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies availab

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Mid-Market
CybelAngel Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Information
2
Alerts
2
Detection
2
Actionable Intelligence
1
Alert Notifications
1
Cons
False Positives
2
Inefficient Alerts
1
Inefficient Alert System
1
Poor Detection Performance
1
CybelAngel features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Paris, FR
Twitter
@CybelAngel
3,464 Twitter followers
LinkedIn® Page
www.linkedin.com
169 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DefenseStorm provides an integrated platform of cyber risk assessment, governance, security, and fraud solutions that ensure financial institutions achieve and maintain cyber risk readiness. The only

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DefenseStorm Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Onboarding
    2
    24/7 Availability
    1
    Ease of Use
    1
    Easy Setup
    1
    Cons
    Limited Flexibility
    1
    Performance Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DefenseStorm features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Alpharetta, Georgia
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DefenseStorm provides an integrated platform of cyber risk assessment, governance, security, and fraud solutions that ensure financial institutions achieve and maintain cyber risk readiness. The only

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
DefenseStorm Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Onboarding
2
24/7 Availability
1
Ease of Use
1
Easy Setup
1
Cons
Limited Flexibility
1
Performance Issues
1
DefenseStorm features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
Alpharetta, Georgia
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Faraday ingests thousands of vulnerabilities from various assets and visualizes findings in a clear, dynamic, and intuitive dashboard. It is a comprehensive vulnerability management tool that helps se

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Faraday Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Faraday ingests thousands of vulnerabilities from various assets and visualizes findings in a clear, dynamic, and intuitive dashboard. It is a comprehensive vulnerability management tool that helps se

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Faraday Platform features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HackerOne Response is a leading Vulnerability Disclosure Program (VDP) platform, designed to streamline the management of third-party vulnerability reports. Ensure compliance and enhance collaboration

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 8% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HackerOne Response (VDP) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Discovery
    1
    Vulnerability Identification
    1
    Cons
    Excessive Notifications
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HackerOne Response (VDP) features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HackerOne
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @Hacker0x01
    312,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,279 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HackerOne Response is a leading Vulnerability Disclosure Program (VDP) platform, designed to streamline the management of third-party vulnerability reports. Ensure compliance and enhance collaboration

Users
No information available
Industries
No information available
Market Segment
  • 8% Enterprise
HackerOne Response (VDP) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Discovery
1
Vulnerability Identification
1
Cons
Excessive Notifications
1
HackerOne Response (VDP) features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
HackerOne
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@Hacker0x01
312,560 Twitter followers
LinkedIn® Page
www.linkedin.com
5,279 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hackuity.io features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hackuity
Product Description
How are these determined?Information
This description is provided by the seller.

Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practi

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Hackuity.io features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Hackuity
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that ma

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NopSec Unified VRM features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NopSec
    HQ Location
    Brooklyn, NY
    Twitter
    @nopsec
    2,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that ma

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
NopSec Unified VRM features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
NopSec
HQ Location
Brooklyn, NY
Twitter
@nopsec
2,270 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Phoenix Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Ease of Use
    1
    Easy Integrations
    1
    Monitoring
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phoenix Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    Twitter
    @sec_phoenix
    250 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phoenix Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Ease of Use
1
Easy Integrations
1
Monitoring
1
Cons
Complexity
1
Difficult Learning
1
Phoenix Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
London, GB
Twitter
@sec_phoenix
250 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PREDICTIVE - UNIFIED SECURITY AND OBSERVABILITY PLATFORM FOR ADVANCED THREAT DETECTION AND FASTER INCIDENT RESPONSE. Experience the power of Predictive, embed with ML and Artificial intelligence, it

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Predictive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Implementation Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Predictive features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Cork, Ireland
    Twitter
    @tisalabs
    42 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

PREDICTIVE - UNIFIED SECURITY AND OBSERVABILITY PLATFORM FOR ADVANCED THREAT DETECTION AND FASTER INCIDENT RESPONSE. Experience the power of Predictive, embed with ML and Artificial intelligence, it

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Predictive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Integrations
1
Features
1
Implementation Ease
1
Cons
This product has not yet received any negative sentiments.
Predictive features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2017
HQ Location
Cork, Ireland
Twitter
@tisalabs
42 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Prelude Detect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    1
    Automation Testing
    1
    Configuration Ease
    1
    Customization
    1
    Deployment Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prelude Detect features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Seattle, WA
    Twitter
    @preludeorg
    1,518 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prelude Security allows organizations to know with certainty if their defenses will protect them against the latest threats. Prelude Detect, the world’s first production-scale continuous security test

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Prelude Detect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
1
Automation Testing
1
Configuration Ease
1
Customization
1
Deployment Ease
1
Cons
This product has not yet received any negative sentiments.
Prelude Detect features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2020
HQ Location
Seattle, WA
Twitter
@preludeorg
1,518 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RankedRight features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RankedRight features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedSeal, the pioneer in network exposure analytics, delivers actionable insights to close defensive gaps across your entire network, in the cloud and on premises. Defenders gain the upper hand by know

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedSeal features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RedSeal
    Year Founded
    2004
    Twitter
    @RedSeal_co
    2,264 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    182 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RedSeal, the pioneer in network exposure analytics, delivers actionable insights to close defensive gaps across your entire network, in the cloud and on premises. Defenders gain the upper hand by know

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RedSeal features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
RedSeal
Year Founded
2004
Twitter
@RedSeal_co
2,264 Twitter followers
LinkedIn® Page
www.linkedin.com
182 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rescana is an innovative, quick moving company offering a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk asse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rescana features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rescana
Product Description
How are these determined?Information
This description is provided by the seller.

Rescana is an innovative, quick moving company offering a cyber risk management platform with the vision to remove the security team bottlenecks, accelerating business processes that require risk asse

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Rescana features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Rescana