Top Rated Threat Command by Rapid7 Alternatives
(1,052)
4.6 out of 5
Visit Website
Sponsored
UE
Verified User in Environmental Services
Mid-Market(51-1000 emp.)
What do you like best about Threat Command by Rapid7?
Everything can be found in just place yet easily identifiable. It is very easy to add a new system and run the scans. It shows deep insights into the vulnerabilities found in the network and how to remediate them. Review collected by and hosted on G2.com.
What do you dislike about Threat Command by Rapid7?
Sometimes it also shows an extra vulnerability that might not exactly relate to your application, and you end up researching about it and then after all that time, you come to know that it is not for you. Review collected by and hosted on G2.com.
1 out of 2 Total Reviews for Threat Command by Rapid7
4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.
AG
Arnaud G.
Investigator
Enterprise(> 1000 emp.)
What do you like best about Threat Command by Rapid7?
The platform is fairly easy to use. The newly revamped assets page is much better than before. Review collected by and hosted on G2.com.
What do you dislike about Threat Command by Rapid7?
Policies and alert profiler are complicated to set up. Review collected by and hosted on G2.com.
There are not enough reviews of Threat Command by Rapid7 for G2 to provide buying insight. Below are some alternatives with more reviews:
1
LastPass
4.5
(1,751)
LastPass business solutions help teams & businesses take control of their identity management with password management, single sign-on (SSO), and adaptive multifactor authentication (MFA).
2
1Password
4.7
(1,362)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know.
3

Keeper Password Manager
4.6
(1,052)
Securely store, share and manage your passwords, logins, credit card numbers, bank accounts and private information in your encrypted digital vault.
4

Cloudflare Application Security and Performance
4.5
(530)
Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.
5
Progress WhatsUp Gold
4.4
(344)
WhatsUp Gold is unified infrastructure and application monitoring software that gives modern IT teams the ability to monitor their increasingly complex IT environment with a single product.
6
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
7
Mimecast Advanced Email Security
4.4
(296)
Mimecast Email Security with Targeted Threat Protection solution that offers comprehensive, multi-layered email security and content controls.
8
CrowdStrike Falcon Endpoint Protection Platform
4.7
(288)
CrowdStrike Falcon endpoint protection unifies the technologies required to successfully stop breaches: next-generation antivirus, endpoint detection and response, IT hygiene, 24/7 threat hunting and threat intelligence. They combine to provide continuous breach prevention in a single agent.
9
usecure
4.6
(274)
usecure enables businesses to measure their employee security posture against evolving cyber threats, reduce security incidents caused by human error and demonstrate compliance with core security standards
To manage human cyber risk, usecure combines user-tailored security awareness training programs, custom phishing simulations, ongoing dark web monitoring, simplified policy management processes and ongoing human risk scoring.
10
ThreatLocker
4.8
(268)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
Threat Command by Rapid7 Categories on G2