Reviews Summary: Vulnerability Scanner Software with Perimeter Scanning Features
Currently there are 10 Vulnerability Scanner software products with Perimeter Scanning features listed on G2, and together they have generated 791 total reviews. These reviews are generated using the qualitative and quantitative feedback from G2 members who have used these software products.
G2 users review Vulnerability Scanner software products based on criteria relating to user experience, setup, and support. Below you will find how users rated the 10 Vulnerability Scanner software products that have Perimeter Scanning features based on those criteria:
- Ease of Use: 8.7/10 average user rating
- Quality of Support: 8.6/10 average user rating
- Ease of Setup: 8.5/10 average user rating
To help you compare and find the best Vulnerability Scanner software product with the right Perimeter Scanning functionality for your business, we have gathered some additional details and FAQs below.
What Vulnerability Scanner products with Perimeter Scanning features have the most reviews and are the highest-rated?
Based on quantity of reviews and average ratings, these are the most popular Vulnerability Scanner software products with Perimeter Scanning capabilities according to G2 users:
- Tenable Nessus is rated 4.5-stars and has 275 reviews
What Vulnerability Scanner software products with Perimeter Scanning capabilities are the most liked according to G2 users?
Based on the G2 ratings scale and regardless of review count, these are the highest-rated Vulnerability Scanner software products with Perimeter Scanning capabilities:
- Tenable Nessus is rated 4.5-stars with 275 reviews.
- Intruder is rated 4.8-stars with 151 reviews.
- Burp Suite is rated 4.8-stars with 114 reviews.
- Invicti (formerly Netsparker) is rated 4.6-stars with 50 reviews.
- AlienVault USM (from AT&T Cybersecurity) is rated 4.4-stars with 50 reviews.
Which software products with Perimeter Scanning features are the highest rated on G2?
These are the Vulnerability Scanner software products offering Perimeter Scanning capabilities and have the highest ratings:
- Intruder has received 151 reviews and is rated 4.8-stars.
- Burp Suite has received 114 reviews and is rated 4.8-stars.
- Tenable Nessus has received 275 reviews and is rated 4.5-stars.
- Acunetix by Invicti has received 81 reviews and is rated 4.2-stars.
Review Snippets for Vulnerability Scanner Software with Perimeter Scanning Features
Questions | Responses |
---|---|
Here is what users liked best about Vulnerability Scanner software with Perimeter Scanning features. |
Tenable Nessus: "Available pre configured and customizable VM, Amazon EC2, etc"
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Intruder: "Intruder is so simple to use, but does such an important job, protecting our customer data against new vulnerabilities that get discovered on a daily basis. I like the reporting it does, and the feeling of "set it and forget it"."
- Tony H., Mid-Market (51-1000 emp.)
Burp Suite: "Burp Suite Professional is a great tool that finds many of the vulnerabilities in a web application. It can be used to scan and replay attacks and also generates good reports."
- Glenn J., A Software Developer Who Really Knows Security.
Application Security Specialist, Enterprise (> 1000 emp.)
|
Here is what users liked least about Vulnerability Scanner software with Perimeter Scanning features. |
Acunetix by Invicti: "Some flaws like not capturing based on customization"
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Tenable Nessus: "Does not conform to Mac application uninstall standards. You must piecemeal remove Nessus in subdirectories and becomes a hassle to remove safely."
- Grace C., Founder/CEO, Principal Software Engineer at Kintsugi, Small-Business (50 or fewer emp.)
Veracode Application Security Platform: "Unfortunately, Veracode hasn't actually found the formula for success yet. The interface is clunky and disjointed, the documentation is confusing, and customer support takes literally weeks or months to respond to requests."
- Alex G., Designer, Musician, & Product Manager, Small-Business (50 or fewer emp.)
|
These are what users recommend to others considering popular Vulnerability Scanner software products with Perimeter Scanning capabilities. |
Tenable Nessus: "I suggest that you should get in touch with a sales member on their team to help you go in the right direction with their products"
- Jessica L., Managing Director of JD Evolution , Small-Business (50 or fewer emp.)
Burp Suite: "Give it a try with the Free version and if you like it get a license. the cost is not very high."
- Glenn J., A Software Developer Who Really Knows Security.
Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "Check out the Gartner Magic Quadrant for SIEM and MSSP solutions first."
- Brian W. C., Strategic Business Manager / Chief Security Officer at ETC Computerland - BIT | MIS, Small-Business (50 or fewer emp.)
|
These are the problems users said the software was solving and how it is benefitting them. |
Tenable Nessus: "Security optimization"
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Intruder: "We hold customer data and frequently have to prove our security for customers, our investors, and Board."
- Tony H., Mid-Market (51-1000 emp.)
Burp Suite: "I use Burp Suite Professional to perform vulnerability scans on all of our corporate websites before they are released to the production servers. This is part of our Security Review Process ."
- Glenn J., A Software Developer Who Really Knows Security.
Application Security Specialist, Enterprise (> 1000 emp.)
|