Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Darwin Attack Alternatives

Darwin Attack Reviews & Product Details - Page 2

Darwin Attack Overview

What is Darwin Attack?

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of successful cyberattacks. The platform serves as a repository for research, vulnerability and attack details, compliance requirements, remediation recommendations, and mitigating controls. It also functions as a security feed, collaboration tool, tracking tool, management platform, and reporting platform. The platform enables organizations to actively manage their security program by providing real-time updates on testing progress and findings, which allows for timely remediation. Darwin Attack® is constantly updated with new information and functionality to ensure that it remains effective and efficient in meeting the needs of Evolve Security's clients.

Darwin Attack Details
Languages Supported
English
Show LessShow More

Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
800 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
Description

Evolve Security is a next generation offensive cybersecurity company powered by the Darwin Attack® Platform. We deliver Attack Surface Management (ASM), Pen-test as a Service (PTaaS) and cyber advisory. Evolve Security enables its clients to constantly monitor and effectively manage the cybersecurity vulnerabilities within their cloud, application, and network environments. The DARWIN Attack® platform combines cutting-edge methodologies and intelligence with real-time communication and reporting to decrease the ‘time to find’ and ‘time to fix’ cybersecurity vulnerabilities.Evolve Security is also an industry leader in cybersecurity training and its Evolve Academy has been ranked the #1 cybersecurity bootcamp for six straight years. Through live instruction, hands-on immersive labs, and real work experience as a cybersecurity apprentice, students obtain the concrete practical skills that are required on the job.


jack  e.
JE
Overview Provided by:

Recent Darwin Attack Reviews

Bill C.
BC
Bill C.Mid-Market (51-1000 emp.)
5.0 out of 5
"The teams and the software were a good solution for our penetration testing needs"
Ease of use of the interface to configure the sites and IPs we needed to test. The interface is technician freindly and allows quick input of data...
WG
Will G.Mid-Market (51-1000 emp.)
5.0 out of 5
"Darwin Attack great for Financial Institutions"
Rich detail from dashboards and actionable reports.
HH
Hank H.Mid-Market (51-1000 emp.)
5.0 out of 5
"Excellent service"
Not only did they exploit vulnerabilities, but they showed us how to correct the vulnerabilities. The communication from the pentesters and our com...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Darwin Attack Media

Darwin Attack Demo - Darwin Attack® Live Attack Feed
Our patent pending live attack feed allows clients to receive immediate updates as the team discovers key vulnerabilities and relevant information. Additionally, clients can communicate directly with their Evolve Security engagement team through the feed, discussing findings or asking for clarifi...
Darwin Attack Demo - Vulnerability Nests™ by Risk and Status
The Nests™ section of the Darwin Attack platform is a feature that provides clients with an organized view of vulnerabilities discovered during their penetration testing or vulnerability scanning. The section categorizes vulnerabilities by their risk level and status, allowing clients to prioriti...
Darwin Attack Demo - Vulnerabilities by Risk and Status
The Vulns section categorizes vulnerabilities based on their risk level and status, providing clients with an easy-to-understand overview of their cybersecurity posture. Clients can track the status of each vulnerability and prioritize remediation efforts based on the severity of the vulnerabilit...
Answer a few questions to help the Darwin Attack community
Have you used Darwin Attack before?
Yes

37 Darwin Attack Reviews

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
37 Darwin Attack Reviews
4.7 out of 5
37 Darwin Attack Reviews
4.7 out of 5

Darwin Attack Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Darwin AttackQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Verified User in Hospital & Health Care
UH
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

I enjoy the:

* Platform

* Great communication from the team

* Accuracy of pentest and findings

* Professionalism of the team

* Schedule for the pentest

* Ability to reallocate credits for different parts of the pentest Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

The reporting exports could use some work. It is difficult to present to executives sometimes. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

They are our penetration testing team for 2 years Review collected by and hosted on G2.com.

JB
Chief Information Officer
Food & Beverages
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

I chose to go with Evolve Security Darwin Attack due to their detailed and thorough approach to penetration testing. I was really impressed with the portal they provided for the project. It was very easy to see high level project status and outcomes. It also provided the details needed for my Sysadmin to dig into and address. There was great communication throughout the entire project from all members. Any questions we had were answered right away. We do plan on using them in the future for other areas of our business. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I honestly cannot think of anything that could have gone smoother in our process with them. At one point we were concerned about a critical server being hit too much, we communicated that we were concerned and they backed off and readdresseed that at another time. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

We implemented new Firewalls and I wanted to be confident there were no vulnerablities or mis configurations. I was able to provide a report to the owners and insurance companies of the outcome which was positive. Review collected by and hosted on G2.com.

JW
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: Organic
(Original )Information
What do you like best about Darwin Attack?

The layout is clear and straightforward and is not over cluttered. Projects and scoping are intuitive and easy to work with. Vulnerability dashboard is a quick way to look what where the highest risk is! Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Absolutely nothing, the platform is quick and elegant. I hope Evolve continues to develop easy to use solutions like this. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack is providing me with a single plane of glass to monitor the most critical aspects of my enterprise cyber security and risk analysis responsibilities. The platform makes it easy to outsource security tasks and still feel comfortable that everything is getting done. Review collected by and hosted on G2.com.

Verified User in Manufacturing
AM
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

The continuious montoring of our public facing assets to be sure notihing new or unintended are allowed to sart without notification. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

The MFA is hard to login with and takes several attempts. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

By constantly monitoring our public environment, it allows us to work on other IT releated issues. Time that was spent testing the external environment can now be spent elsewhere. Review collected by and hosted on G2.com.

JL
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

We had a great experience with Darwin Attack. The remediation process was intuitive and streamlined. Our Evolve support was excellent - we received prompt responses and were guided throughout the testing process. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

We couldn't think of any dislikes. The Evolve team delivered everything as promised and met our timelines and goals. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin has made it much easier for us to deliver reports to our executive team, and has helped to improve our overall security posture. Review collected by and hosted on G2.com.

Verified User in Marketing and Advertising
AM
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

Immediate notification of overlooked vulnerabilities via a live dashboard. Notifications include instructions for remediation of the vulnerabilities, and ratings for the risks of the discovered issues allowing us to prioritize our responses. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Haven't run into any dislikes yet. All of their efforts have been helpful. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Exposure of overlooked vulnerabilities. Knowing what could come back to impact us is allowing us to correct issues before they become costly problems. Review collected by and hosted on G2.com.

JC
Master Instructor
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Darwin Attack?

I truly value how you can arrange the results by category, severity, and other factors to delve deeper into each finding. This assists you in locating any flaws or setup issues. it provides information on meeting compliance standards, putting protections in place, and making recommendations for resolving the issues. It also allows you to keep track of the steps done to address each issue. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

The setup of a scope should be more user-friendly, especially when working with a big number of IP addresses is one minor flaw I found. The site occasionally freezes when browsing through many reports, necessitating a page refresh. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

The Darwin Attack tool is quite helpful in spotting instances of configuration drift and informing us of potential security holes in our IT infrastructure. It enables us to anticipate risks and take preventative action to lessen them. By offering a comprehensive solution that is simple to use and makes security risk management much more manageable and less daunting, Darwin Attack has significantly changed our organisation. Review collected by and hosted on G2.com.

JW
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

I think the layout and the user interface are pretty easy to learn and use, making getting to your reports and results simple and painless. Also, being able to quickly drill down into each of the respective findings by category, severity and others helps to take pertinent information and get it into the hands of end users or the business line that needs to understand where vulnerabilities or configuration issues exist. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Some of the downsides that I have seen thus far are generally limited towards simple functionality or a lacking of intuitive techniques. Being able to input a scope in numerous different ways (single ip's, numerous/block of ip's, CIDR range, domains, URL/URI specific. It would be helpful to make this process a little easier and more efficient. Also, tracking remediations throughout a finding could be simplified. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

The Darwin Attack platform is helping to take snapshots of our external presence and footprint in regulated intervals. It allows us to stay on top of potential vulnerabilities in our environment and helps quickly detect where configuration drift may have occurred. Review collected by and hosted on G2.com.

CP
IT Compliance Manager
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

Darwin Attack provides the one place to go for all information related to a penetration test project. No more tracking down sent and received emails, as communication with the Evolve team can all be in the platform. The user interface is easy to navigate, and the Project page lets me see when pen tests are tentatively scheduled, making it easier to plan ahead.

The download report function allows the creation of a report with all of the details maintained in Darwin Attack. This detailed report was beneficial to our development team in remediating identified vulnerabilities. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

As a customer of Evolve Security, I have yet to find anything in the Darwin Attack that is not useful. All the information I need to communicate to our development and technical teams is on the platform. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

The Darwin Attack platform provides me with a secure way to communicate with our Evolve Security team regarding our penetration testing projects. Once a project is completed, all of the detailed information is in Darwin Attack and I can easily create a report to internally share the details for our teams to remediate vulnerabilities. Review collected by and hosted on G2.com.

Verified User in Financial Services
AF
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

Darwin Attack provides an intuitive penetration test plan. The interface that makes it easy for users to navigate through its features. Its speed and efficiency in performing tasks are great. The support team at Evolve Security was also extremely helpful. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I don't have any complaints. Perhaps the cost of service can be a point to think about for small businesses. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Performing penetration tests to find possible exploits in our systems. We benefited from knowing that our system currently have the most up to date safeguards. Review collected by and hosted on G2.com.