Best Software for 2025 is now live!
Save to My Lists
Claimed
Claimed

Top Rated CTM360 Alternatives

CTM360 Reviews & Product Details

CTM360 Overview

What is CTM360?

CTM360 is a unified external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surface, Deep, & Dark Web Monitoring, Security Ratings, Third third-party risk Management, and Unlimited Takedowns. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360.

CTM360 Details
Discussions
CTM360 Community
Languages Supported
English
Show LessShow More
Product Description

An extensive amount of cyber threat intelligence is generated on a daily basis, and it can be difficult to cut through the noise. Simplify the process with our fully automated and highly specific threat intelligence, which provides detection on an ongoing basis. CTM360 generates actionable threat intel, providing insights specifically catered to your organization, its brand and executives. 1. Noise-free data relevant to your organization 2. Know precisely what is targeting you 3. Tackling emerging threats 4. Filtered data across deep & dark web targeting your organization


Seller Details
Seller
CTM360
Year Founded
2014
Twitter
@teamCTM360
963 Twitter followers
LinkedIn® Page
www.linkedin.com

sajal K.
SK
Overview Provided by:
Inbound Marketing Specialist | Graphic Designer | Photographer
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
1 person requested security information

CTM360 Media

CTM360 Demo - RiskHub Platform
RiskHub: Redefining Third-Party Risk Management with Streamlined Security Assessments
CTM360 Demo - Make Yourself a Harder Target
HackerView is CTM360’s External Attack Surface Management platform, offering automated asset discovery, issue identification, security ratings, and third-party risk management. It passively maps your organization’s digital presence using public data and comes pre-populated for immediate use.
Answer a few questions to help the CTM360 community
Have you used CTM360 before?
Yes
G2 reviews are authentic and verified.

There are not enough reviews of CTM360 for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Scrut Automation Logo
Scrut Automation
4.9
(1,048)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
2
LastPass Logo
LastPass
4.5
(1,750)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
3
Vanta Logo
Vanta
4.6
(1,594)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
4
1Password Logo
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
5
Sprinto Logo
Sprinto
4.8
(1,246)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
6
AuditBoard Logo
AuditBoard
4.6
(1,225)
AuditBoard’s modern connected risk platform is designed to elevate your teams, engage the front lines of your business, and help you leverage risk as a strategic driver. At the heart of our connected risk architecture is a unified data core that centralizes your organization's risks, controls, policies, frameworks, issues, and more. The core is surrounded by a set of powerful platform capabilities, including collaboration, automation, a robust workflow engine, business intelligence, and a highly extensible integration layer. Together, AuditBoard’s unified core and purposefully designed platform capabilities set a strong, dynamic foundation for our award-winning applications — RiskOversight, CrossComply, SOXHUB, OpsAudit, ESG, and TPRM.
7
Keeper Password Manager Logo
Keeper Password Manager
4.6
(1,052)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
8
Wiz Logo
Wiz
4.7
(697)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
9
SAP Ariba Logo
SAP Ariba
4.1
(605)
Spend Management, Invoice Management, Payment Management, and Contract Management Software.
10
Cloudflare Application Security and Performance Logo
Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
Show More