Top Rated Detectify Alternatives

We were looking for an easy-to-use scanning tool that will allow us to check and audit our sites. We had tried Qualys and Intruder.io and both of those tools take forever to configure and it should not take that time. Detectify is super easy to use. One email and we were working. The Chrome add-on for the login credentials is a great plus. Scanning for vulnerabilities and the reports are excellent. Furthermore, it takes absolutely no time to get it configured. Review collected by and hosted on G2.com.
The UI interface is simple, but sometimes it is a little bit confusing when browsing from and to the scan results. Sometimes it is not clear if a scan is running because you do not have any indication that the scan is going on. You can only see that on the Scan page. When a vulnerability is fixed, the system does not recognize this in the following scan. It keeps it in history. Review collected by and hosted on G2.com.
50 out of 51 Total Reviews for Detectify
Overall Review Sentiment for Detectify
Log in to view review sentiment.
Detectify's ability to facilitate dynamic application security testing (DAST) is what really grabs my attention. Its very effective particularly for groups wishing to increase the scope of their security testing without requiring intricate setups. Its easy to integrate into our current pipelines and to set up and modify. Review collected by and hosted on G2.com.
Detectify offers a variety of advantages; however, there are certain aspects where enhancements could be made. A significant limitation is its inadequate support for GraphQL, especially concerning mutations and queries.There is a lack of clarity regarding the outcomes of spidering. While Detectify's spidering capabilities are beneficial, the absence of comprehensive details about the crawling process complicates the verification of whether all components of an application have been thoroughly assessed. Review collected by and hosted on G2.com.
It is very comprehensive with lots of features to test security and can be automated and tailoured easily to your needs. It has excellent documentation on how best to fix any detected problems. Review collected by and hosted on G2.com.
It is automated so can't offer the insights a human tester might do. It can be expensive if you want to test multiple sites. It can be complex to set up initially. Review collected by and hosted on G2.com.

Customer success team have been very helpful for us to get started. That meant a lot to get us started and really offloading our internal teams. The UI is very intuitive and easy to view (we don't yet use the API), reports are good. Also was easy to setup stuff like automated login for the scanner, SSO for users etc. We also use tagging a lot. Review collected by and hosted on G2.com.
Not much bad to say about it really, but also I'm not the dev triaging it. More follow up reports and progress as a IT Security manager. Review collected by and hosted on G2.com.

Automated approach to testing vulnerabilities which saves a lot of time for the team. No need to track all dependencies manually. Review collected by and hosted on G2.com.
Pricing has become complicated and is not competitive for small site scans. Review collected by and hosted on G2.com.

From the discoveries of new subjects, and for the ease of use, I also really like the integration of notifications, and detailing the vulnerabilities and how to perform their corrections. Review collected by and hosted on G2.com.
It can improve the indicators, of how we are and what we have improved or worsened on top of each scanner, the score is sometimes not enough. I believe I could have a page with only this data. Review collected by and hosted on G2.com.

I like how I can rely on Detectify to understand my company's attack surface, subdomains and vulnerabilities. Even after one year of use, there is still a lot of work to do there, and some security bugs that appear out of nothing, we use Detectify to check if it was already mapped. This helps a lot in everyday tasks. Review collected by and hosted on G2.com.
Being from a country with a currency not much valorized, the price is something that we struggled with to get the tool, but it is just that. Besides currency, there is nothing to complain about. ^^ Review collected by and hosted on G2.com.
What most stood out to me was how easy it was to generate rich, insightful reports, even with no prior knowledge of how the tool worked. I was able to build reports in minutes that I expected to take hours. Review collected by and hosted on G2.com.
In terms of dislikes, nothing immediate comes to mind. I suppose one thing that may be relevant is that the tool seemed intimidating / non-intuitive to me for the first few moments when I used it, but then again that's not really a big deal. Review collected by and hosted on G2.com.
The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and managed.
The price is very fair for a good product. The product by Detectify manages to meet a lot of the needs from software development companies. Review collected by and hosted on G2.com.
False positives can return even when marked as false positives which can be overwhelming. Review collected by and hosted on G2.com.
simplified format to get a visibility of web app vulnerabilities Review collected by and hosted on G2.com.
not much additional context to help understand why a vulnerability is a vulnerability. Would be great to see something like what they do in snyk where it shows if a vulnerability is exploitable Review collected by and hosted on G2.com.
The hands-free, passive scanning and weekly reports delivered right to my email. Review collected by and hosted on G2.com.
At times, looking at remediation documentation can be troublesome. Review collected by and hosted on G2.com.