Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Darwin Attack Alternatives

Darwin Attack Reviews & Product Details - Page 4

Darwin Attack Overview

What is Darwin Attack?

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of successful cyberattacks. The platform serves as a repository for research, vulnerability and attack details, compliance requirements, remediation recommendations, and mitigating controls. It also functions as a security feed, collaboration tool, tracking tool, management platform, and reporting platform. The platform enables organizations to actively manage their security program by providing real-time updates on testing progress and findings, which allows for timely remediation. Darwin Attack® is constantly updated with new information and functionality to ensure that it remains effective and efficient in meeting the needs of Evolve Security's clients.

Darwin Attack Details
Languages Supported
English
Show LessShow More

Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
800 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
Description

Evolve Security is a next generation offensive cybersecurity company powered by the Darwin Attack® Platform. We deliver Attack Surface Management (ASM), Pen-test as a Service (PTaaS) and cyber advisory. Evolve Security enables its clients to constantly monitor and effectively manage the cybersecurity vulnerabilities within their cloud, application, and network environments. The DARWIN Attack® platform combines cutting-edge methodologies and intelligence with real-time communication and reporting to decrease the ‘time to find’ and ‘time to fix’ cybersecurity vulnerabilities.Evolve Security is also an industry leader in cybersecurity training and its Evolve Academy has been ranked the #1 cybersecurity bootcamp for six straight years. Through live instruction, hands-on immersive labs, and real work experience as a cybersecurity apprentice, students obtain the concrete practical skills that are required on the job.


jack  e.
JE
Overview Provided by:

Recent Darwin Attack Reviews

Bill C.
BC
Bill C.Mid-Market (51-1000 emp.)
5.0 out of 5
"The teams and the software were a good solution for our penetration testing needs"
Ease of use of the interface to configure the sites and IPs we needed to test. The interface is technician freindly and allows quick input of data...
WG
Will G.Mid-Market (51-1000 emp.)
5.0 out of 5
"Darwin Attack great for Financial Institutions"
Rich detail from dashboards and actionable reports.
HH
Hank H.Mid-Market (51-1000 emp.)
5.0 out of 5
"Excellent service"
Not only did they exploit vulnerabilities, but they showed us how to correct the vulnerabilities. The communication from the pentesters and our com...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Darwin Attack Media

Darwin Attack Demo - Darwin Attack® Live Attack Feed
Our patent pending live attack feed allows clients to receive immediate updates as the team discovers key vulnerabilities and relevant information. Additionally, clients can communicate directly with their Evolve Security engagement team through the feed, discussing findings or asking for clarifi...
Darwin Attack Demo - Vulnerability Nests™ by Risk and Status
The Nests™ section of the Darwin Attack platform is a feature that provides clients with an organized view of vulnerabilities discovered during their penetration testing or vulnerability scanning. The section categorizes vulnerabilities by their risk level and status, allowing clients to prioriti...
Darwin Attack Demo - Vulnerabilities by Risk and Status
The Vulns section categorizes vulnerabilities based on their risk level and status, providing clients with an easy-to-understand overview of their cybersecurity posture. Clients can track the status of each vulnerability and prioritize remediation efforts based on the severity of the vulnerabilit...
Answer a few questions to help the Darwin Attack community
Have you used Darwin Attack before?
Yes

37 Darwin Attack Reviews

4.7 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
37 Darwin Attack Reviews
4.7 out of 5
37 Darwin Attack Reviews
4.7 out of 5

Darwin Attack Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons

Overall Review Sentiment for Darwin AttackQuestion

Time to Implement
<1 day
>12 months
Return on Investment
<6 months
48+ months
Ease of Setup
0 (Difficult)
10 (Easy)
Log In
Want to see more insights from verified reviewers?
Log in to view review sentiment.
G2 reviews are authentic and verified.
Mike E.
ME
IT Manager
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

I quickly and easily share information on security projects and vulnerability mitigation with the team and project manager. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Took my coworker a day more than me to find the buttons from the previous platform, but he appreciated the improved navigation after the adjustment. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack facilitates the coordination of my team with the Evolve team, Evolve project manager, and me. Review collected by and hosted on G2.com.

GD
IMS Manager
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

The new portal is much easier to use. It's a fabulous upgrade that is much more efficient and effective. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I've not found any downside to the new portal. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

This new tool helps us to organize our vulnerability assessments and is becoming an important part of our security program. Review collected by and hosted on G2.com.

Verified User in Automotive
EA
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

Great summary and easy to read and understand Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Did not experience any dislike of the Darwin Attach Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

It is pointing out what we need to do based on the External and Internal tests they have performed. We see the benefits of the output of their tests. We will use them again. Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
UC
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

Ease of navigation and use. Ability to download .pdf files of reports. Able to export vulnerability/risk data for ease of presentation. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

No issues with Darwin at this time, happy with what we are provided. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin is providing a single location to store all of our current and historical security assessments, and is capable of exporting data to present to leadership. Review collected by and hosted on G2.com.

Verified User in Computer Software
UC
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

The data related to what will be tested, when, who by, and the results were clearly defined. Communication with engineers was clear and easy to follow. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Safari would not always load the data. The interface would render but not project data. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack provides us with a single source of truth around our security testing engagements, offering us excellent context per project. Review collected by and hosted on G2.com.

Verified User in Airlines/Aviation
AA
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about Darwin Attack?

Communication with myself ( as the IT Manager ) and our staff is very solid. Predictable, clear, concise and complete. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

I would like a little more realtime visibility into the progress of a campaign. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Darwin Attack is addressing our need to bring our end users into a more informed relationship with email and cybersecurity. Review collected by and hosted on G2.com.

Verified User in Financial Services
UF
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about Darwin Attack?

It facilitates easy collaboration amongst the team. Review collected by and hosted on G2.com.

What do you dislike about Darwin Attack?

Some notification links you receive in emails will not take you directly to the thread in question. Review collected by and hosted on G2.com.

What problems is Darwin Attack solving and how is that benefiting you?

Penetration testing Review collected by and hosted on G2.com.