Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

Top Rated Deep Security Smart Check Alternatives

3 Deep Security Smart Check Reviews

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 Deep Security Smart Check Reviews
4.7 out of 5
3 Deep Security Smart Check Reviews
4.7 out of 5

Deep Security Smart Check Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Deep Security Smart Check?

I had to use this in my previous position as an information security analyst. I was tasked to manage numerous companies daily security activities and found this to be a very helpful and intuitive program to use during my daily tasks. Review collected by and hosted on G2.com.

What do you dislike about Deep Security Smart Check?

While using it during my job, I had so,e issues running into failed vulnerability scans and smart checks. However, I couldn't tell if these were caused by myself and my coworkers. These issues would go away after brief periods of time. Nonetheless, they could be quite annoying at times for myself and my coworkers. Review collected by and hosted on G2.com.

A K.
AK
Principal Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Deep Security Smart Check?

It uses advanced machine learning algorithms to identify and prioritize vulnerabilities in your environment, making it easier for you to focus on fixing the most critical security risks Review collected by and hosted on G2.com.

What do you dislike about Deep Security Smart Check?

More frequent updates: As new vulnerabilities and threats emerge, it's important for Deep Security Smart Check to be updated frequently to ensure it remains effective in identifying these new risks Review collected by and hosted on G2.com.

PS
Solutions Engineer
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Deep Security Smart Check?

It was very easy to install. It is compatible to all server types so didn't need to purchase separate licneses. Review collected by and hosted on G2.com.

What do you dislike about Deep Security Smart Check?

Reports have very limited options and can be improved. Review collected by and hosted on G2.com.

There are not enough reviews of Deep Security Smart Check for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(698)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
3
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
4
Orca Security Logo
Orca Security
4.6
(216)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
5
AlgoSec Logo
AlgoSec
4.5
(189)
AlgoSec is a business-driven security management solution.
6
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
7
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(155)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
8
Snyk Logo
Snyk
4.5
(122)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
9
Mend.io Logo
Mend.io
4.3
(112)
Integrated application security that identifies and automatically remediates vulnerabilities in open source and custom code.
10
SentinelOne Singularity Cloud Security Logo
SentinelOne Singularity Cloud Security
4.9
(107)
Singularity Cloud Workload Security is runtime security and your workloads' flight data recorder. It works alongside other security layers to stop what they do not: runtime threats, like ransomware and zero-days. Whether on-prem or public cloud, in VMs, containers, or Kubernetes, SentinelOne stops machine-speed evil in real-time, to help keep your cloud business operating swiftly and securely.
Show More