Top Rated Fortra VM Alternatives
68 Fortra VM Reviews
Overall Review Sentiment for Fortra VM
Log in to view review sentiment.
The ratings scores and lists and reporting work well Review collected by and hosted on G2.com.
Often, things that have already been fixed since the last scan show up. Not sure how it finds this information Review collected by and hosted on G2.com.
Seems to be fairly comprehensive even if we do get a few false positives Review collected by and hosted on G2.com.
It makes me as a server admin do work haha Review collected by and hosted on G2.com.
Auto-generated reports are helpful and the fact that they're emailed. Review collected by and hosted on G2.com.
Scripting for website scans could be improved. Review collected by and hosted on G2.com.
We can determine and see where our vulnerabilities lie. Knowing what we need to tackle is very helpful and makes tracking everything with our assets easy! The vulnerabilities are all explained clearly, so it's easy to understand! Review collected by and hosted on G2.com.
There are no features that I have come across that I have disliked. Everything works as it should and gives no trouble. There aren't any improvements that I can think of after my first year of use. Keeping track of everything is made easy for anyone. Review collected by and hosted on G2.com.
Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". There are some similar better priced options out there in my opinion. Review collected by and hosted on G2.com.
The biggest downside would be pricing and the inability to fine tune it yourself in a lot of areas without using support to do so for you. Until you dial everything in expect a lot of alerts as it seems to try to brute force devices on your network, and if you have any form of reporting setup via email - it can get a bit ugly. Review collected by and hosted on G2.com.
We got a white-glove treatment from a representative from Digital Defense. They walked us through setting up both the internal and external security scans on our network. Once a quarter, we get a detailed report of every device internally. Not only will it list the vulnerability that needs to be remediated, but in most cases, it will give detailed instructions on how to remediate it. This little extra in the report saves a lot of time in researching when trying to remediate issues in a large network. Review collected by and hosted on G2.com.
I could be wrong about this, but I believe you only get so many scans a year or a quarter. So far, I have been able to do re-scans on individual assets without any issue. My score may change if I run into a limit. I would not want to wait until the end of a quarter to make sure an asset is 100% good to go. Review collected by and hosted on G2.com.
Using Digital Defense's Frontline Vulnerability Manager has been the best decision when it comes to outside looking in and internal views of where our network is good and where holes are. Review collected by and hosted on G2.com.
Finding something not to like has been hard for my team and me. Review collected by and hosted on G2.com.
The Active View of the interface shows a list of vulnerabilities and assets that have been scanned. This makes it easy to click through and see what vulnerabilities exist, and also which devices have vulnerabilities. The lists are highlight via severity so you can focus on which ones are most severe first if you prefer.
When questions have arised in the past the customer support has also been responsive and able to solve the problem. Review collected by and hosted on G2.com.
I don't have any major dislikes, but in some cases I wish the details on some vulnerabilities could be more specific with solutions. Sometimes the solution is clear, but other times it can be more vague, or it may not be clear which patch is the correct patch for the machine if there are multiple versions of the patch.
Also creating your own scan from scratch is not always that intuitive when setting them up, if you are not experienced with the scan settings. Review collected by and hosted on G2.com.
The best thing I like about Frontline is that all you have to do is provide the IP address range and the scan is scheduled. Once the scan is complete an email is sent and you can log in to view the results. Review collected by and hosted on G2.com.
It would be a little more helpful to get the results in easier terms to understand if you are not an IT specialist. Review collected by and hosted on G2.com.
Easy to use interface that allows us to scan our assets and identified vulnerabilities are categorized based on their severity automatically, allowing us to easily prioritize our remedial efforts. Review collected by and hosted on G2.com.
Should have built-in trend analysis that would allow us to see if a specific type of vulnerability (e.g. default password used) is on the rise or declining from scan to scan. Right now, we need to do a manual trend analysis. Review collected by and hosted on G2.com.