Best Risk-Based Vulnerability Management Software - Page 7

BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
175 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secureworks Taegis VDR delivers a fully integrated, comprehensive vulnerability management solution via an automated and configuration-free approach with machine learning and self-learning, and built-

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis VDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Atlanta, US
    Twitter
    @SecureWorks
    24,973 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,698 employees on LinkedIn®
    Ownership
    NASDAQ:SCWX
Product Description
How are these determined?Information
This description is provided by the seller.

Secureworks Taegis VDR delivers a fully integrated, comprehensive vulnerability management solution via an automated and configuration-free approach with machine learning and self-learning, and built-

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Secureworks Taegis VDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1999
HQ Location
Atlanta, US
Twitter
@SecureWorks
24,973 Twitter followers
LinkedIn® Page
www.linkedin.com
1,698 employees on LinkedIn®
Ownership
NASDAQ:SCWX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Small-Business
    • 14% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Senteon System Hardening Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    1
    Integration Capabilities
    1
    Policy Management
    1
    Real-time Monitoring
    1
    Response Time
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Senteon System Hardening features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    0.0
    No information available
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Senteon
    Year Founded
    2019
    HQ Location
    Marietta
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

Users
No information available
Industries
No information available
Market Segment
  • 86% Small-Business
  • 14% Mid-Market
Senteon System Hardening Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
1
Integration Capabilities
1
Policy Management
1
Real-time Monitoring
1
Response Time
1
Cons
Complexity
1
Difficult Learning
1
Learning Curve
1
Senteon System Hardening features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
0.0
No information available
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Senteon
Year Founded
2019
HQ Location
Marietta
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entreda Unify is a cybersecurity platform built by Smarsh to automate your cybersecurity and compliance controls. It helps IT and Compliance leaders alike address their organization’s cybersecurity ri

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smarsh Cyber Compliance features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Smarsh
    Year Founded
    2001
    HQ Location
    Portland, OR
    Twitter
    @SmarshInc
    5,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,390 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entreda Unify is a cybersecurity platform built by Smarsh to automate your cybersecurity and compliance controls. It helps IT and Compliance leaders alike address their organization’s cybersecurity ri

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Smarsh Cyber Compliance features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Smarsh
Year Founded
2001
HQ Location
Portland, OR
Twitter
@SmarshInc
5,749 Twitter followers
LinkedIn® Page
www.linkedin.com
1,390 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Synack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    1
    Vulnerability Identification
    1
    Cons
    Asset Management
    1
    Poor Management
    1
    Poor Security Management
    1
    Poor Support Management
    1
    Security Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Synack features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Synack
    Twitter
    @synack
    27,064 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Premier Platform for On-Demand Security. PTaaS Penetration Testing as a Service. Offensive Security Testing that Improves Your Security Posture Over Time One platform, many uses. Expect strategi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Synack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
1
Vulnerability Identification
1
Cons
Asset Management
1
Poor Management
1
Poor Security Management
1
Poor Support Management
1
Security Issues
1
Synack features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Synack
Twitter
@synack
27,064 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Identity Exposure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    1
    Detection Efficiency
    1
    Ease of Use
    1
    Incident Management
    1
    Monitoring Efficiency
    1
    Cons
    Expensive
    1
    Poor Interface
    1
    Poor UI Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Identity Exposure features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Tenable Identity Exposure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
1
Detection Efficiency
1
Ease of Use
1
Incident Management
1
Monitoring Efficiency
1
Cons
Expensive
1
Poor Interface
1
Poor UI Design
1
Tenable Identity Exposure features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,087 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Security
    1
    Threat Detection
    1
    Vulnerability Detection
    1
    Cons
    Limited Features
    2
    Asset Management
    1
    Complexity
    1
    Limited Detection
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable OT Security features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tenable OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Security
1
Threat Detection
1
Vulnerability Detection
1
Cons
Limited Features
2
Asset Management
1
Complexity
1
Limited Detection
1
Missing Features
1
Tenable OT Security features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.2
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,087 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UNGUESS is the crowdsourcing platform for effective testing and real insights Launch effective testing. Engage a real crowd of skilled humans. Get powerful insights and answers at any time needed. W

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 41% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UNGUESS Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Ease of Use
    3
    Innovation
    3
    Powerful Capabilities
    3
    Versatile Testing
    3
    Cons
    Information Management
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UNGUESS features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    UNGUESS
    Year Founded
    2015
    HQ Location
    Milan, IT
    LinkedIn® Page
    www.linkedin.com
    378 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UNGUESS is the crowdsourcing platform for effective testing and real insights Launch effective testing. Engage a real crowd of skilled humans. Get powerful insights and answers at any time needed. W

Users
No information available
Industries
No information available
Market Segment
  • 41% Enterprise
  • 33% Small-Business
UNGUESS Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Ease of Use
3
Innovation
3
Powerful Capabilities
3
Versatile Testing
3
Cons
Information Management
1
Integration Issues
1
UNGUESS features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
UNGUESS
Year Founded
2015
HQ Location
Milan, IT
LinkedIn® Page
www.linkedin.com
378 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Vijilan Threat Respond Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customization
    1
    Dashboard Design
    1
    Documentation
    1
    Ease of Use
    1
    Easy Integrations
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vijilan Threat Respond features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vijilan
    Year Founded
    2014
    HQ Location
    Aventura, US
    Twitter
    @vijilansoc
    393 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    65 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vijilan will deploy and implement its fully managed service in record time, and as part of the service, Vijilan will monitor and respond to any threat or suspicious behavior on the network through its

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
Vijilan Threat Respond Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customization
1
Dashboard Design
1
Documentation
1
Ease of Use
1
Easy Integrations
1
Cons
This product has not yet received any negative sentiments.
Vijilan Threat Respond features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Vijilan
Year Founded
2014
HQ Location
Aventura, US
Twitter
@vijilansoc
393 Twitter followers
LinkedIn® Page
www.linkedin.com
65 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Vulcan Cyber ExposureOS starts by correlating and normalizing risk and asset data aggregated from hundreds of vulnerability scanners, asset repositories and threat intelligence feeds. These signal

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Vulcan Cyber Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Poor Customer Support
    1
    Security Issues
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vulcan Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Tel Aviv-Yafo, IL
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Vulcan Cyber ExposureOS starts by correlating and normalizing risk and asset data aggregated from hundreds of vulnerability scanners, asset repositories and threat intelligence feeds. These signal

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Vulcan Cyber Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
Poor Customer Support
1
Security Issues
1
Update Issues
1
Vulcan Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Tel Aviv-Yafo, IL
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Helsinki, Finland
    Twitter
    @WithSecure
    69,934 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,723 employees on LinkedIn®
    Ownership
    FSOYF
Product Description
How are these determined?Information
This description is provided by the seller.

WithSecure™ Elements Exposure Management (XM) is a continuous and proactive solution that predicts and prevents breaches against your company’s assets and business operations. Elements XM provides vis

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
WithSecure Elements Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1988
HQ Location
Helsinki, Finland
Twitter
@WithSecure
69,934 Twitter followers
LinkedIn® Page
www.linkedin.com
1,723 employees on LinkedIn®
Ownership
FSOYF
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holistic. Automated. Real-time. Actifile automates data risk assessments, ongoing sensitive data monitoring and data protection.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Actifile features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    We-Bridge
    Year Founded
    2020
    HQ Location
    Roseville, California
    Twitter
    @webridge1
    10 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holistic. Automated. Real-time. Actifile automates data risk assessments, ongoing sensitive data monitoring and data protection.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Actifile features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
We-Bridge
Year Founded
2020
HQ Location
Roseville, California
Twitter
@webridge1
10 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Small businesses and Healthcare practices need cyber-security specialization. Not all IT companies have certified professionals or the access to specialized solutions they would need to identify, prev

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alexio Inspector Security Risk Assessment features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alexio
    HQ Location
    Markham, ON
Product Description
How are these determined?Information
This description is provided by the seller.

Small businesses and Healthcare practices need cyber-security specialization. Not all IT companies have certified professionals or the access to specialized solutions they would need to identify, prev

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Alexio Inspector Security Risk Assessment features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Alexio
HQ Location
Markham, ON
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Araali Network Security Pro Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerting
    1
    API Integration
    1
    Detection Efficiency
    1
    Integrations
    1
    Onboarding
    1
    Cons
    Complex Coding
    1
    Delayed Detection
    1
    Ineffective Alerts
    1
    Inefficient Alert System
    1
    Network Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Araali Network Security Pro features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Fremont, US
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Araali Networks allows lean security teams to discover their exposure - data, services, and backdoors and prioritize the top 1% of risks that really matter. The security team can use cloud-native co

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Araali Network Security Pro Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerting
1
API Integration
1
Detection Efficiency
1
Integrations
1
Onboarding
1
Cons
Complex Coding
1
Delayed Detection
1
Ineffective Alerts
1
Inefficient Alert System
1
Network Issues
1
Araali Network Security Pro features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
HQ Location
Fremont, US
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ASPIA is an Automated and Simplified security assessment and vulnerability management platform. ASPIA harnesses the power of security automation to measure and improve the efficiency and accuracy of e

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ASPIA features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    LinkedIn® Page
    www.linkedin.com
    21 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ASPIA is an Automated and Simplified security assessment and vulnerability management platform. ASPIA harnesses the power of security automation to measure and improve the efficiency and accuracy of e

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
ASPIA features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2018
LinkedIn® Page
www.linkedin.com
21 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Auditive is a continuously monitored risk network connecting businesses and their vendors on one platform. Businesses can complete 80% of their vendor reviews in minutes and monitor their risk continu

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Auditive features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Auditive
    Year Founded
    2022
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Auditive is a continuously monitored risk network connecting businesses and their vendors on one platform. Businesses can complete 80% of their vendor reviews in minutes and monitor their risk continu

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Auditive features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Auditive
Year Founded
2022
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®