Top Rated Probely Alternatives

I tried a number of online penetration testing tools for around two weeks, and found Probely to be the best match for my needs. It is one of the easiest to set up, it covers a wide range of tests, including scanning behind a login, and the customer service is excellent and very personalised. Review collected by and hosted on G2.com.
I can't think of anything that I dislike about the product. Review collected by and hosted on G2.com.
18 out of 19 Total Reviews for Probely
Overall Review Sentiment for Probely
Log in to view review sentiment.
It is very easy to use since it has a user friendly interface with customized cookies and headers
When done by a tech savvy person, implemetation is quite easy and smooth
By integrating into our CI/CD pipelines, it helps to fully automate our web application and API security testing. This enhances the security of our systems
By scanning web applications and API, it allows us manage lifecycle of vulnerabilities that have been found.
Helps to fix the identified vulnerabilities by providing guidance on how to fix them. This makes it easy for team of developers and engineers fixing the issues found.
It easily integrates with CI/CD tools, Slack and Jira
Provides you with unlimited scans
It helps the user get compliant as well security reports Review collected by and hosted on G2.com.
It is way much pricey for any sized firm to afford
It only provides a single scan so you cannot conduct concurrent scans
Scanning large files or app takes so much time Review collected by and hosted on G2.com.
It has efficient features being a vulnerability scanner ad-on which automates security testing
It has continous scanning of web applications and the APIs thus helps you manage vulnerabilities lifecycle it finds. It also provides you with ways to fix the vulnerabilities it finds.
It easily integrates a users secutity testing with its CI/CD pipeline.
It is easy to use du to its user friendly interface and its implementation is also smooth when done by the right personnel. Review collected by and hosted on G2.com.
Offers limited customization and this may limit those that use it due to the customization and reporting not matching with theirs.
Its pricing may not favor firms or users on budget Review collected by and hosted on G2.com.
The implementation was fast and it was easy to configure. It can take a subnet or a range for scanning in one go and gives a full report including the URL when scanning a web application. Review collected by and hosted on G2.com.
Nothing really to dislike. The vulnerability is scanner is totally accurate. Review collected by and hosted on G2.com.
Probely explains any issues it finds very clearly, giving each a severity level grade and also including guidance on resolving them.
It checks for compliance with various web security standards. Review collected by and hosted on G2.com.
There's not much wrong with the tool. Just a couple of minor things. If you have to change the target of your scans at some point, for whatever reason, you have to ask their support ot do this. They have done this quickly whenever we have asked for a change.
The other minor issue is, if the scan target is changed, all the historical scans are labelled with the new target name. This could be misleading. For example, we were scanning clear on a site of ours and suddenly issues were reported. It turned out that site had moved away to another supplier. We changed the target but the records now make it look like our current target had a blip where issues appeared. Review collected by and hosted on G2.com.
Helps the development team in building secure apps through scanning for vulnerabilities before going live.
Provides reports and insights that help future app development.
Secure web applications and API's access. Review collected by and hosted on G2.com.
I find access not to be fully secure due to poor definition of users and password policy Review collected by and hosted on G2.com.
Provides reports on zero day exploit on web url ,API's and SQL injections that would harm our applications that are accesed over web preventing further losses from attacks. Review collected by and hosted on G2.com.
Working fine and have found no shortcomings for the moment. Review collected by and hosted on G2.com.
Prevention of threats and vulnerabilities that are web based like SQL injections among others by powerfully scanning and preventing these attacks. Gives reports on threats and attacks for future changes. Review collected by and hosted on G2.com.
The features are great and found no loophole as of now. Review collected by and hosted on G2.com.
Their setup wizard is straightforward and it is backed by a great team. I would recommend it to anyone who ise serious about web application security. Review collected by and hosted on G2.com.
There is nothing I see as an issue at this stage. I am so happy with it. Review collected by and hosted on G2.com.

User-Friendly Interface: Users often appreciate platforms with intuitive and user-friendly interfaces, making it easier to navigate, interpret results, and take necessary actions. Review collected by and hosted on G2.com.
Limited Customization: Some users may find that the level of customization available in the scanning process or reporting may not fully align with their specific requirements. Review collected by and hosted on G2.com.
Safety from SQL injections through our access to external applications using API's and web applications. Review collected by and hosted on G2.com.
Poor documentation makes it hard to train new users. Review collected by and hosted on G2.com.