Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Darwin Attack Alternatives

Darwin Attack Reviews & Product Details - Page 3

Darwin Attack Overview

What is Darwin Attack?

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of successful cyberattacks. The platform serves as a repository for research, vulnerability and attack details, compliance requirements, remediation recommendations, and mitigating controls. It also functions as a security feed, collaboration tool, tracking tool, management platform, and reporting platform. The platform enables organizations to actively manage their security program by providing real-time updates on testing progress and findings, which allows for timely remediation. Darwin Attack® is constantly updated with new information and functionality to ensure that it remains effective and efficient in meeting the needs of Evolve Security's clients.

Darwin Attack Details
Languages Supported
English
Show LessShow More

Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
800 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
Description

Evolve Security is a next generation offensive cybersecurity company powered by the Darwin Attack® Platform. We deliver Attack Surface Management (ASM), Pen-test as a Service (PTaaS) and cyber advisory. Evolve Security enables its clients to constantly monitor and effectively manage the cybersecurity vulnerabilities within their cloud, application, and network environments. The DARWIN Attack® platform combines cutting-edge methodologies and intelligence with real-time communication and reporting to decrease the ‘time to find’ and ‘time to fix’ cybersecurity vulnerabilities.Evolve Security is also an industry leader in cybersecurity training and its Evolve Academy has been ranked the #1 cybersecurity bootcamp for six straight years. Through live instruction, hands-on immersive labs, and real work experience as a cybersecurity apprentice, students obtain the concrete practical skills that are required on the job.


jack  e.
JE
Overview Provided by:

Recent Darwin Attack Reviews

Bill C.
BC
Bill C.Mid-Market (51-1000 emp.)
5.0 out of 5
"The teams and the software were a good solution for our penetration testing needs"
Ease of use of the interface to configure the sites and IPs we needed to test. The interface is technician freindly and allows quick input of data...
WG
Will G.Mid-Market (51-1000 emp.)
5.0 out of 5
"Darwin Attack great for Financial Institutions"
Rich detail from dashboards and actionable reports.
HH
Hank H.Mid-Market (51-1000 emp.)
5.0 out of 5
"Excellent service"
Not only did they exploit vulnerabilities, but they showed us how to correct the vulnerabilities. The communication from the pentesters and our com...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Darwin Attack Media

Darwin Attack Demo - Darwin Attack® Live Attack Feed
Our patent pending live attack feed allows clients to receive immediate updates as the team discovers key vulnerabilities and relevant information. Additionally, clients can communicate directly with their Evolve Security engagement team through the feed, discussing findings or asking for clarifi...
Darwin Attack Demo - Vulnerability Nests™ by Risk and Status
The Nests™ section of the Darwin Attack platform is a feature that provides clients with an organized view of vulnerabilities discovered during their penetration testing or vulnerability scanning. The section categorizes vulnerabilities by their risk level and status, allowing clients to prioriti...
Darwin Attack Demo - Vulnerabilities by Risk and Status
The Vulns section categorizes vulnerabilities based on their risk level and status, providing clients with an easy-to-understand overview of their cybersecurity posture. Clients can track the status of each vulnerability and prioritize remediation efforts based on the severity of the vulnerabilit...
Answer a few questions to help the Darwin Attack community
Have you used Darwin Attack before?
Yes

37 Darwin Attack Reviews

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
37 Darwin Attack Reviews
4.7 out of 5
37 Darwin Attack Reviews
4.7 out of 5

Darwin Attack Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Darwin AttackQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Verified User in Media Production
UM
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

UI makes it easy to sort through vulnerabilities to view them per host or to take a glance as a whole. The summary findings are helpful to get an idea of the main issues with the environment but each vulnerability also has detailed info on a per-finding basis that's easy to view. Marking risks as accepted or remediated can be done as bulk actions on findings, so it doesn't take a lot of time at all to update a report. The search and filter options are good and can include all previous reports or only specific ones. The activity feed is handy to view the timeline of actions taken. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Filtering is slow when going a lot or reports. Sometimes searching or marking a lot of findings can cause the portal to hang and need to refresh to restart the query. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

We used it for Quarterly Internal Vulnerability Scanning and Yearly Pen testing. To fulfill our compliance requirements and keeping our environment up to date and mitigate risk. Review collected by and hosted on G2.com.

IP
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

Document exchange is fine. Graphic interface is OK. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Does not work on Edge. Takes 3-4 times to login from Firefox Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Secure document exchange Review collected by and hosted on G2.com.

Verified User in Entertainment
UE
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

It's easy to use, and the report/results they deliver are categorized nicely and are easy to understand. They have great support too. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I can't really think of anything I disliked. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

It has spotted the areas we could improve security wise. Review collected by and hosted on G2.com.

PM
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

The new Darwin Attack platform interface is straightforward and easy to navigate. I readily identified the process for working through each identified vulnerability. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Some files I tried to upload were not allowed by the platform when posting on individual vulnerabilities. A list of what is allowed and not allowed for the different types of posts when choosing to upload would be helpful. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

The Darwin Attack platform provides a secure and comprehensive location to track the penetration testing projects our organization has contracted with Evolve Security.

It designates the Evolve staff who are working on the project, a list of assets to be tested, any vulnerabilities found, as well as all scopes for any current or previous testing phases.

There is a thorough narrative of each identified vulnerability, with links to best practices, remediation suggestions, and the discovery methodology used. Documentation of vulnerability remediation is quite simple to enter into the platform. It was helpful that I could document a risk as being accepted and still add notes as to why. Filtering findings by risk level and status to quickly sort results helps to tag which ones were the most critical to resolve and which vulnerabilities still required work to close.

The platform maintains a linear process for each vulnerability that involves identification, validation, remediation and retesting. Each stage of the process is marked, making it easy to know the status of each vulnerability and, thus, whose responsibility the next step is.

Returning to earlier testing projects was necessary to compare results and remediations when reviewing vulnerabilities. Since these are archived within the platform, there is no need to review documentation elsewhere. Review collected by and hosted on G2.com.

JC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

Firstly, I was impressed with the level of professionalism and expertise displayed by the team at Evolve. They were able to identify potential vulnerabilities in our system that we weren't even aware of, which was very reassuring as we strive to keep our data secure.

The use of the Darwin Attack tool by Evolve was particularly impressive. It allowed for a more comprehensive analysis of our security system, and the results were clear and easy to understand. I appreciated the level of detail in the report provided by Evolve, which made it easy for us to take appropriate action to address any weaknesses.

The communication from Evolve throughout the testing process was also exceptional. They were responsive to any questions or concerns we had, and were always clear and concise in their explanations. The team was also very respectful of our time, and ensured that the testing process did not disrupt our day-to-day operations.

Overall, I would highly recommend Evolve and their Darwin Attack pen test security tool to any company looking for top-notch cybersecurity testing. The level of expertise, professionalism, and clear communication displayed by the team at Evolve was truly impressive, and gave us confidence in our security measures. Thank you, Evolve! Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Darwin Attack is a powerful and comprehensive penetration testing tool that is widely used in the cybersecurity industry to identify vulnerabilities in computer systems and networks. It is known for its advanced capabilities and ability to simulate real-world attack scenarios, which can help organizations improve their security posture and protect against cyber threats. However, like any technology or software tool, Darwin Attack may not be suitable for every organization's specific needs or preferences, so it's important to evaluate it based on your specific requirements and goals. Ultimately, it's best to consult with a cybersecurity expert to determine the best approach to securing your systems and networks. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack is a powerful penetration testing tool that helps to identify vulnerabilities in computer systems and networks. By simulating real-world attack scenarios, Darwin Attack can help to identify weaknesses in an organization's security defenses, allowing them to take proactive steps to prevent potential cyber attacks.

One of the key problems that Darwin Attack is solving is the need for comprehensive and reliable security testing. Traditional security testing methods such as vulnerability scans and manual testing are often time-consuming, incomplete, and can miss critical vulnerabilities that could be exploited by cybercriminals. Darwin Attack addresses this issue by providing a comprehensive and automated testing tool that is specifically designed to identify vulnerabilities that might be missed by other testing methods.

By using Darwin Attack for annual penetration testing, organizations can benefit from a more complete and detailed understanding of their security posture. This can help them to proactively identify and address vulnerabilities before they can be exploited by attackers, reducing the risk of a data breach or other security incident.

In addition to improving security, Darwin Attack can also benefit organizations by helping them to comply with regulatory requirements. Many industry regulations and standards, such as PCI DSS, HIPAA, and ISO 27001, require organizations to perform regular security testing and demonstrate that they are taking proactive steps to protect sensitive data. By using Darwin Attack, organizations can meet these requirements and maintain compliance with industry regulations.

Overall, Darwin Attack is solving the problem of comprehensive and reliable security testing, and is helping organizations to improve their security posture, reduce risk, and maintain compliance with industry regulations. Review collected by and hosted on G2.com.

Verified User in Insurance
UI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

The Darwin Attack platform is very easy to navigate and understand. I find the layout very user-friendly. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I haven't found any big downsides of the Darwin Attack platform. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack shows us where we are lacking and where we need to improve our security posture. Review collected by and hosted on G2.com.

Vincent C.
VC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

- Being able to visualize categories (Nests) as well as drill down into individual vulnerabilities

- Timely and secure communication between the testing team and our organization

- The ability to generate a client-facing letter that shows our internal and external stakeholders that we take security seriously

- Most vulnerabilities found came with detailed remediation suggestions; significantly reducing the additional research required from my team Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

- limited authenticator options for logging into the system (minor inconvenience) Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

We wanted a professional third-party penetration test and vulnerability assessment to identify any gaps for remediation and demonstrate due diligence to our customers and stakeholder. Review collected by and hosted on G2.com.

CT
IT Security Analyst
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

Darwin Attack's UI is clean and easy to navigate. The new "timeline"-like feature adds a simple, secure way to communicate with the Evolve team, allowing users to quickly and simply reference specific projects in each message.

Also, the file downloads/uploads tab contains all project files from both the client and Evolve, making it easy to retrieve completed reports and upload documents related to upcoming engagements. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

As a customer of Evolve, I've yet to find anything in the Darwin Attack portal that isn't useful or helpful. All the information I need to reference to create documentation for my employer is centrally located and tidily organized. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack provides me with a secure way to communicate with Evolve during engagements and provide information related to those engagements. Once they are completed, I can retrieve reports and other required data to create documentation for my employer. Review collected by and hosted on G2.com.

Verified User in Information Technology and Services
UI
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

Summarized view of vulnerabilities. The news feed with the easy ability to communicate with the team. Ability to review and track future and past projects detailing the vulns found. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

A few things we would love to see in the application are; the lack of ability to link external tickets to each vulnerability, when having the same assets (different ports) causes multiple vulns in the view so it shows higher numbers. Lastly, the inability to specify each asset as internal and external, meaning we have IPs for our test environments and IPs for our production environment and have the ability to decipher between the two easily would allow for prioritizing which issues to fix sooner. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Being confident handing our software to our customers with confidence that there are no security issues within our application is a great weight off our shoulders. We have certain limitations on what and how we can validate against our code changes and being partnered with you allows us to cover a much more comprehensive range of testing for our application. Review collected by and hosted on G2.com.

JC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

A real world opportunity to asses our security posture. Potentially uncovering areas we were unaware of or need more focus. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I have nothing negative to say about the service itself, except that we live in a place where this is even necessary. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Piece of mind for management and proof to our customers and vendors that we executing on security. Review collected by and hosted on G2.com.