Top Rated Infection Monkey Alternatives
(0)
0.0 out of 5
Visit Website
Sponsored
3 Infection Monkey Reviews
4.8 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
TA
Trilok A.
Security Consultant
Mid-Market(51-1000 emp.)
What do you like best about Infection Monkey?
Its open source and the best thing about the infection monkey it works in cloud really effective, also the GUI is nice. Review collected by and hosted on G2.com.
What do you dislike about Infection Monkey?
Everytime we need to launch the docker with new image, also few customization is missing compared to other simulation tools Review collected by and hosted on G2.com.
SA
Satykam A.
Red Team Director
Mid-Market(51-1000 emp.)
What do you like best about Infection Monkey?
Ease of use, GUI is simple and attractive, Zero trust testing feature and also very good for cloud continues security testing and easy to deploy Review collected by and hosted on G2.com.
What do you dislike about Infection Monkey?
Privilege escalation and EDR evasion is not there Review collected by and hosted on G2.com.
AC
Verified User in Computer & Network Security
Mid-Market(51-1000 emp.)
There are not enough reviews of Infection Monkey for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Cymulate: Security Validation and Exposure Management Platform
4.9
(124)
Cymulate comprehensively identifies the security gaps in your infrastructure and provides actionable insights for proper remediation. Run safely from the internet, our battery of simulated attacks causes no interruption to your operation or business productivity.
2
vPenTest
4.7
(172)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error.
vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
3

Pentera
4.5
(137)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
4
Defendify All-In-One Cybersecurity® Solution
4.7
(57)
Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.
5
RidgeBot
4.5
(76)
RidgeBot, a robotic penetration testing system, fully automates the testing process by coupling ethical hacking techniques to decision-making algorithms.
RidgeBots locate risks and vulnerabilities discovered in network, servers, and applications, prove the potential impact or damage with exploit evidence. It provides risk-based vulnerability management and alleviates the shortage of security testing personnel by automation.
6

Picus Security
4.8
(4)
Measure - Picus tells you security effectiveness right now including all emerging threats.; Categorize - Picus helps you prioritize your security resources to where you need it the most.; Monitor - continually asses your resilience to threats.; Alarm - Picus sends alarms for the situations where your security risk increases.
7
AttackIQ Platform
4.5
(1)
8

Sophos PhishThreat
4.3
(21)
Sophos PhishThreat provides you with the flexibility and customization that your organization needs to facilitate a positive security awareness culture. Phish Threat educates and tests your end users through automated attack simulations, quality security awareness training, and actionable reporting metrics.
9

XM Cyber Exposure Management Platform
3.5
(1)
XM Cyber is the first breach and attack simulation (BAS) platform to simulate, validate and remediate attackers’ paths to your critical assets 24×7.
10
IBM Security Randori Recon
4.3
(26)
Infection Monkey Categories on G2