Save to My Lists

FortifyData Continuous Threat Exposure Management Reviews & Product Details

JK
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about FortifyData Continuous Threat Exposure Management?

Ingestion of relevant technical data into a risk portfolio that can serve as your one-stop-shop for organizational IT risk management. Review collected by and hosted on G2.com.

What do you dislike about FortifyData Continuous Threat Exposure Management?

There should be increased user control over the risk addition for non-scanned risks. Review collected by and hosted on G2.com.

Recommendations to others considering FortifyData Continuous Threat Exposure Management:

Do their trial. This platform has a lot of other features that could allow you to get rid of several other software and reduce your tool fatigue. Review collected by and hosted on G2.com.

What problems is FortifyData Continuous Threat Exposure Management solving and how is that benefiting you?

There has been a gap between technical vulnerability management and the risk managers. This platform allows the two worlds (business and IT) to understand and communicate with each other in a more efficient way. Review collected by and hosted on G2.com.

FortifyData Continuous Threat Exposure Management Overview

What is FortifyData Continuous Threat Exposure Management?

FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree view of their cyber risk exposure through comprehensive external and internal technology assessments, control assessments, and collaborative third-party risk management solutions, and is the only cyber risk management platform with configurable risk modeling allowing users to accurately represent their risk exposure level.

FortifyData Continuous Threat Exposure Management Details
Languages Supported
English, Dutch, Portuguese, Spanish
Show LessShow More
Product Description

The cyber risk scoring application assesses a company’s security posture, and generates a risk score cyber risk score (FORTIFYSCORE) ranging from 300 to 900. The score is derived through analysis of your company’s infrastructure, applications, data breach history and compromised data in the dark web.


Seller Details
Year Founded
2015
HQ Location
Kennesaw, Georgia
Twitter
@fortifydata
90 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®

VG
Overview Provided by:
FortifyData Cyber Risk Analysis and Monitoring

Recent FortifyData Continuous Threat Exposure Management Reviews

Verified User
A
Verified UserMid-Market (51-1000 emp.)
4.5 out of 5
"Very insightful / very important!"
Easy to navigate Very easy to setup Quick and efficient support Easy to integrate Great reports Very insightful information on the status of y...
Verified User
A
Verified UserMid-Market (51-1000 emp.)
5.0 out of 5
"Monitors threats and helps you manage updates and vulnerability patching. Great for SOC2."
The dashboard page provides a great deal of information around your current security footprint. From servers to end user workstations, all can be m...
Verified User
A
Verified UserSmall-Business (50 or fewer emp.)
5.0 out of 5
"FortifyData is a great company and has an excellent team of skilled professionals"
Quick response. Attention to detail and a great product.

FortifyData Continuous Threat Exposure Management Media

Answer a few questions to help the FortifyData Continuous Threat Exposure Management community
Have you used FortifyData Continuous Threat Exposure Management before?
Yes

3 out of 4 Total Reviews for FortifyData Continuous Threat Exposure Management

4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

FortifyData Continuous Threat Exposure Management Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
This product has not yet received any negative sentiments.
G2 reviews are authentic and verified.
Verified User in Telecommunications
AT
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic Review from User Profile
What do you like best about FortifyData Continuous Threat Exposure Management?

Easy to navigate

Very easy to setup

Quick and efficient support

Easy to integrate

Great reports

Very insightful information on the status of your security (visibility)

Super user friendly - nice tool to use every day Review collected by and hosted on G2.com.

What do you dislike about FortifyData Continuous Threat Exposure Management?

This is a tough one, FortifyData has met all requirements and is very easy to use. No dislikes worth mentioning. Review collected by and hosted on G2.com.

What problems is FortifyData Continuous Threat Exposure Management solving and how is that benefiting you?

Visibility into my company's assets and the different areas of risk that we need to address. This helps a great deal where i can assign the different risk areas (such as External Network, Application, Patching Cadence, Dark Web Data Breach, Third Party, Security Controls, Internal Network) to the right teams and we can now manage vulnerabilities more eddiciently. Review collected by and hosted on G2.com.

Verified User in Insurance
AI
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: Organic
What do you like best about FortifyData Continuous Threat Exposure Management?

The dashboard page provides a great deal of information around your current security footprint. From servers to end user workstations, all can be monitored and tracked using FortifyData. We leverage the platform weekly to monitor security issues and vulnerabilities and ensure they are patched quickly. We have seen our security score increase steadily using FortifyData. If you are required to complete SOC2 audits, this platform will help you organize data. From vulnerability and patching cadence monitoring to vendor tracking and management, it's all there to easily review. You also get dark web monitoring which notifies you if user data ends up for sale on the dark web, allowing a pro-active faster response to possible compromise points. Review collected by and hosted on G2.com.

What do you dislike about FortifyData Continuous Threat Exposure Management?

We were an early adopter of FortifyData. FortifyData has promptly responded to and patched all issues I have submitted, leaving nothing for me to mention here. Review collected by and hosted on G2.com.

Recommendations to others considering FortifyData Continuous Threat Exposure Management:

If you are required to complete an annual SOC2 audit, I have not found a better tool to help you manage and track servers, workstations, security and patching cadence, and 3rd party vendors. Our auditors were impressed with the platform and it allows us to provide easy answers to many questions. Review collected by and hosted on G2.com.

What problems is FortifyData Continuous Threat Exposure Management solving and how is that benefiting you?

We gained significant visibility into our user workstations. We have used this visibility to improve workstation security and monitoring. It also provides us with the workstation monitoring solution that is recommended for SOC2 compliant companies. FortifyData has simplified and streamlined our security monitoring and patching processes. Review collected by and hosted on G2.com.

Verified User in Internet
AI
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Verified Current User
Review source: Organic
What do you like best about FortifyData Continuous Threat Exposure Management?

Quick response. Attention to detail and a great product. Review collected by and hosted on G2.com.

What do you dislike about FortifyData Continuous Threat Exposure Management?

Nothing to dislike. I get great reports with lots of information. Review collected by and hosted on G2.com.

Recommendations to others considering FortifyData Continuous Threat Exposure Management:

FortifyData Cyber Risk Scoring is a great product with pages of security information. Review collected by and hosted on G2.com.

What problems is FortifyData Continuous Threat Exposure Management solving and how is that benefiting you?

The information I have gathered has helped protect sites from attacks and what needs to be done to secure the site. Review collected by and hosted on G2.com.

There are not enough reviews of FortifyData Continuous Threat Exposure Management for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Responsive, formerly RFPIO Logo
Responsive, formerly RFPIO
4.5
(1,126)
Responsive is a cloud-based RFP software that eliminates the friction often associated with responding to Requests for Proposal (RFPs), through a no-nonsense set-up, simple and intuitive user interface, and robust integrations with Salesforce and Slack.
2
Scrut Automation Logo
Scrut Automation
4.9
(1,107)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
3
Vanta Logo
Vanta
4.6
(1,730)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
4
Sprinto Logo
Sprinto
4.8
(1,273)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
5
Drata Logo
Drata
4.8
(1,005)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
6
Wiz Logo
Wiz
4.7
(700)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
7
Loopio Logo
Loopio
4.7
(637)
Loopio’s response software streamlines the way enterprises respond to RFPs, RFIs, and Security Questionnaires. Why dig through past proposals, chase subject-matter experts, and spend hours updating old content when Loopio can help automate this for you.
8
CloudBees Logo
CloudBees
4.4
(621)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
9
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(474)
10
Thoropass Logo
Thoropass
4.7
(433)
Show More