Top Rated ThreatMapper Alternatives
11 out of 12 Total Reviews for ThreatMapper

Real time visualization in the application and has various multi cloud apps and it helped monitoring features and sensored roadmaps with great support Review collected by and hosted on G2.com.
It is an open source platform and with that third party resources are not so good and couldn't find all vulnerabilities Review collected by and hosted on G2.com.

Threat mapper is free and available for multiple cloud platform, best thing is it rank the vulnerability at risk level. Review collected by and hosted on G2.com.
Not more to dislike about threatmapper, can provide better documentation Review collected by and hosted on G2.com.

The best thing about ThreatMapper is an open-source tool that scans, maps and ranks all the known vulnerabilities in the hosts, applications, containers etc. The kind of reliability ThreatMapper offers is unmatchable also that is the best thing about this wonderful tool. Review collected by and hosted on G2.com.
There is not much to dislike about ThreatMapper but just want the developers to add more robust threat/vulnerabilities list for CMS platforms like wordpress, drupal and joomla. Review collected by and hosted on G2.com.
Effective visualization and discovery of threats and vulnerabilities in real-time, multi-cloud implementation. Easy accessibility and set-up, enable effective monitoring with loaded tools. Review collected by and hosted on G2.com.
More updates are required and set-up should be simpler. More interactive Ui will be an add-on. Overall nothing to complain but the interface can be much better. No doubt the product is efficient. Review collected by and hosted on G2.com.


It is difficult to set up Threatmapper with your tech. However, once done properly it can help significantly in assessing the potential sources from where cyber attacks or DDoS attacks might happen. Review collected by and hosted on G2.com.
The setting up is very difficult. It is not a plug-n-play solution. Need a dedicated developer to get this up and running within the organisation. Also, the learning curve is pretty steep for non-tech business owners. Review collected by and hosted on G2.com.

Good Service of 24/7
Real-time discovery and visualization of applications in production
Sensored Roadmaps
Supports multi-cloud and multi-modality apps
Helpful Monitoring features
Notifications for every activity Review collected by and hosted on G2.com.
Multiple limitations on threatmapper
Now Threatmapper is Open source platform
Third-party resources are not appropriate
Unknown vulnerabilities
Dev/DevOps are not aligned
Not all vulnerabilities can be patched Review collected by and hosted on G2.com.

The best thing i like is threatmapper is opensource now and can't wait to explore its full capabilities for multicloud implementation and kubernetes security scanning Review collected by and hosted on G2.com.
since it is relatively new no community support available online to tune it to meet security best scanning across multicloud and also securing by scanning kubernetes clusters Review collected by and hosted on G2.com.

It notifies the developer about build failure. Users can also monitor the build status. Review collected by and hosted on G2.com.
There should be training videos published itself by Threatmapper Review collected by and hosted on G2.com.
