Best Software for 2025 is now live!
|| products.size

Best Enterprise Vulnerability Scanner Software

Lauren Worth
LW
Researched and written by Lauren Worth

Products classified in the overall Vulnerability Scanner category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Vulnerability Scanner to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Vulnerability Scanner category.

In addition to qualifying for inclusion in the Vulnerability Scanner Software category, to qualify for inclusion in the Enterprise Business Vulnerability Scanner Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All

22 Listings in Enterprise Vulnerability Scanner Software Available

By Wiz
(697)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • Security Engineer
    • CISO
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    351
    Security
    315
    Visibility
    260
    Features
    249
    Cloud Management
    227
    Cons
    Improvement Needed
    121
    Missing Features
    119
    Feature Limitations
    107
    Learning Curve
    98
    Limited Features
    82
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    14,648 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,054 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • Security Engineer
  • CISO
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
351
Security
315
Visibility
260
Features
249
Cloud Management
227
Cons
Improvement Needed
121
Missing Features
119
Feature Limitations
107
Learning Curve
98
Limited Features
82
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
14,648 Twitter followers
LinkedIn® Page
www.linkedin.com
2,054 employees on LinkedIn®
(284)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    19
    Ease of Use
    15
    Vulnerability Detection
    15
    Automated Scanning
    13
    Features
    11
    Cons
    Slow Scanning
    9
    Limited Features
    5
    Time-Consuming
    5
    Update Delays
    4
    Lack of Automation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 32% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
19
Ease of Use
15
Vulnerability Detection
15
Automated Scanning
13
Features
11
Cons
Slow Scanning
9
Limited Features
5
Time-Consuming
5
Update Delays
4
Lack of Automation
3
Tenable Nessus features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(209)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    54
    Features
    49
    Security
    49
    Cloud Security
    36
    Vulnerability Detection
    35
    Cons
    Improvement Needed
    25
    Missing Features
    18
    Feature Limitations
    17
    Improvements Needed
    14
    Ineffective Alerts
    14
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 9.0
    8.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,847 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    442 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 36% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
54
Features
49
Security
49
Cloud Security
36
Vulnerability Detection
35
Cons
Improvement Needed
25
Missing Features
18
Feature Limitations
17
Improvements Needed
14
Ineffective Alerts
14
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 9.0
8.7
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,847 Twitter followers
LinkedIn® Page
www.linkedin.com
442 employees on LinkedIn®
(110)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    15
    Automated Scanning
    11
    Ease of Use
    10
    Scanning Efficiency
    10
    Features
    7
    Cons
    Lack of Information
    7
    Insufficient Information
    5
    Complexity
    4
    Difficult Learning
    4
    Inadequate Reporting
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
15
Automated Scanning
11
Ease of Use
10
Scanning Efficiency
10
Features
7
Cons
Lack of Information
7
Insufficient Information
5
Complexity
4
Difficult Learning
4
Inadequate Reporting
4
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(100)4.8 out of 5
Optimized for quick response
1st Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 45% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    33
    Security
    31
    Threat Detection
    26
    Detection Efficiency
    24
    Features
    24
    Cons
    Feature Limitations
    12
    Missing Features
    9
    Complexity
    8
    Resource Limitations
    7
    Feature Complexity
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    787 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is our CNAPP platform that more than 700 enterprise customers use to address CNAPP, VM, CSPM, CIEM, container security and more - at enterprise scale. Our platform spans prevention, dete

Users
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 45% Enterprise
  • 41% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
33
Security
31
Threat Detection
26
Detection Efficiency
24
Features
24
Cons
Feature Limitations
12
Missing Features
9
Complexity
8
Resource Limitations
7
Feature Complexity
6
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.5
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,189 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

    Users
    No information available
    Industries
    • Computer & Network Security
    • Financial Services
    Market Segment
    • 60% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Security Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    11
    Ease of Use
    9
    Features
    6
    Compliance Management
    5
    Cybersecurity
    5
    Cons
    False Positives
    4
    Information Management
    3
    Limited Reporting
    3
    Poor Customer Support
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Security Center features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 9.0
    8.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

Users
No information available
Industries
  • Computer & Network Security
  • Financial Services
Market Segment
  • 60% Enterprise
  • 23% Mid-Market
Tenable Security Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
11
Ease of Use
9
Features
6
Compliance Management
5
Cybersecurity
5
Cons
False Positives
4
Information Management
3
Limited Reporting
3
Poor Customer Support
3
Complexity
2
Tenable Security Center features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 9.0
8.9
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(107)4.9 out of 5
4th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.8
    Detection Rate
    Average: 8.9
    9.8
    Automated Scans
    Average: 9.0
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.8
Detection Rate
Average: 8.9
9.8
Automated Scans
Average: 9.0
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,520 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
Ownership
NASDAQ: S
(77)4.4 out of 5
13th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$22 /asset*
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightVM (Nexpose) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    3
    Dashboard Design
    3
    Dashboard Features
    3
    Dashboard Usability
    3
    Vulnerability Identification
    3
    Cons
    Complexity
    2
    Difficult Setup
    2
    Inaccuracy Issues
    2
    Integration Issues
    2
    Lack of Remediation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 9.0
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    122,714 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,075 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 31% Mid-Market
InsightVM (Nexpose) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
3
Dashboard Design
3
Dashboard Features
3
Dashboard Usability
3
Vulnerability Identification
3
Cons
Complexity
2
Difficult Setup
2
Inaccuracy Issues
2
Integration Issues
2
Lack of Remediation
2
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 9.0
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
122,714 Twitter followers
LinkedIn® Page
www.linkedin.com
3,075 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Red Hat® Ansible® Automation Platform is Red Hat's primary enterprise automation product offering., it includes all of the tooling needed for building, deploying, and managing end-to-end automation at

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 44% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Red Hat Ansible Automation Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    108
    Automation
    87
    Automation Efficiency
    65
    Features
    40
    Ansible Playbooks
    39
    Cons
    Missing Features
    30
    Complexity
    28
    Learning Curve
    26
    Learning Difficulty
    24
    Limited Features
    21
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Hat Ansible Automation Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 9.0
    9.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Company Website
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    293,907 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,863 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Red Hat® Ansible® Automation Platform is Red Hat's primary enterprise automation product offering., it includes all of the tooling needed for building, deploying, and managing end-to-end automation at

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 44% Enterprise
  • 38% Mid-Market
Red Hat Ansible Automation Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
108
Automation
87
Automation Efficiency
65
Features
40
Ansible Playbooks
39
Cons
Missing Features
30
Complexity
28
Learning Curve
26
Learning Difficulty
24
Limited Features
21
Red Hat Ansible Automation Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.9
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 9.0
9.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Red Hat
Company Website
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
293,907 Twitter followers
LinkedIn® Page
www.linkedin.com
19,863 employees on LinkedIn®
(119)4.8 out of 5
View top Consulting Services for Burp Suite
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

    Users
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Burp Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    4
    Ease of Use
    3
    Integration Capabilities
    3
    Testing Services
    3
    Tool Efficiency
    3
    Cons
    Expensive
    2
    Lack of Information
    2
    Poor Interface Design
    2
    Bugs
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Burp Suite features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Knutsford, GB
    Twitter
    @Burp_Suite
    124,600 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

Users
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 31% Enterprise
Burp Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
4
Ease of Use
3
Integration Capabilities
3
Testing Services
3
Tool Efficiency
3
Cons
Expensive
2
Lack of Information
2
Poor Interface Design
2
Bugs
1
Learning Curve
1
Burp Suite features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2008
HQ Location
Knutsford, GB
Twitter
@Burp_Suite
124,600 Twitter followers
LinkedIn® Page
www.linkedin.com
224 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 35% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Cloud Integration
    10
    Ease of Use
    9
    Cloud Services
    8
    Threat Detection
    8
    Cons
    Complexity
    5
    Complex Setup
    5
    Difficult Setup
    4
    Expensive
    4
    Improvement Needed
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    113,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,572 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 35% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Cloud Integration
10
Ease of Use
9
Cloud Services
8
Threat Detection
8
Cons
Complexity
5
Complex Setup
5
Difficult Setup
4
Expensive
4
Improvement Needed
4
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.6
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
113,698 Twitter followers
LinkedIn® Page
www.linkedin.com
7,572 employees on LinkedIn®
(183)4.7 out of 5
Optimized for quick response
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    36
    Security
    31
    Features
    25
    Threat Detection
    25
    Protection
    19
    Cons
    False Positives
    13
    Compatibility Issues
    9
    Update Issues
    8
    Agent Issues
    7
    Improvements Needed
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    7.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    54,520 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,802 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 38% Enterprise
SentinelOne Singularity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
36
Security
31
Features
25
Threat Detection
25
Protection
19
Cons
False Positives
13
Compatibility Issues
9
Update Issues
8
Agent Issues
7
Improvements Needed
7
SentinelOne Singularity features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
7.5
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
54,520 Twitter followers
LinkedIn® Page
www.linkedin.com
2,802 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Contrast Security is the leading Runtime Application Security company, embedding code analysis and attack prevention directly into the SDLC. Contrast’s patented security instrumentation disrupts trad

    Users
    No information available
    Industries
    • Insurance
    • Information Technology and Services
    Market Segment
    • 67% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Contrast Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    15
    Security
    12
    Accuracy of Findings
    11
    Accuracy of Results
    9
    Detection
    7
    Cons
    Lacking Features
    5
    False Positives
    3
    Inadequate Reporting
    3
    Limited Features
    3
    Poor Interface
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Contrast Security features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Pleasanton, CA
    Twitter
    @contrastsec
    5,608 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    294 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Contrast Security is the leading Runtime Application Security company, embedding code analysis and attack prevention directly into the SDLC. Contrast’s patented security instrumentation disrupts trad

Users
No information available
Industries
  • Insurance
  • Information Technology and Services
Market Segment
  • 67% Enterprise
  • 20% Mid-Market
Contrast Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
15
Security
12
Accuracy of Findings
11
Accuracy of Results
9
Detection
7
Cons
Lacking Features
5
False Positives
3
Inadequate Reporting
3
Limited Features
3
Poor Interface
3
Contrast Security features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2014
HQ Location
Pleasanton, CA
Twitter
@contrastsec
5,608 Twitter followers
LinkedIn® Page
www.linkedin.com
294 employees on LinkedIn®
(137)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    43
    Vulnerability Identification
    43
    Ease of Use
    42
    Automation
    31
    Vulnerability Detection
    31
    Cons
    Expensive
    12
    Limited Scope
    12
    Limited Features
    11
    Technical Issues
    11
    Inadequate Reporting
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    7.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,213 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    400 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 39% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
43
Vulnerability Identification
43
Ease of Use
42
Automation
31
Vulnerability Detection
31
Cons
Expensive
12
Limited Scope
12
Limited Features
11
Technical Issues
11
Inadequate Reporting
9
Pentera features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
7.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,213 Twitter followers
LinkedIn® Page
www.linkedin.com
400 employees on LinkedIn®
(59)4.6 out of 5
Optimized for quick response
10th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Invicti (formerly Netsparker)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invicti (formerly Netsparker) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Vulnerability Detection
    4
    Vulnerability Identification
    4
    Accuracy of Results
    3
    Cons
    API Issues
    1
    Inadequate Testing
    1
    Limited Testing Capabilities
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 25% Mid-Market
Invicti (formerly Netsparker) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Vulnerability Detection
4
Vulnerability Identification
4
Accuracy of Results
3
Cons
API Issues
1
Inadequate Testing
1
Limited Testing Capabilities
1
Scanning Issues
1
Slow Performance
1
Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®