Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated ThreatMapper Alternatives

ThreatMapper Reviews & Product Details

Azmeera Goutham N.
AN
Graduate Engineering Trainee
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
What do you like best about ThreatMapper?

Real time visualization in the application and has various multi cloud apps and it helped monitoring features and sensored roadmaps with great support Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

It is an open source platform and with that third party resources are not so good and couldn't find all vulnerabilities Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

Devops practices in organisation and helpful in ddos and some phishing scam Review collected by and hosted on G2.com.

ThreatMapper Overview

What is ThreatMapper?

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories.

ThreatMapper Details
Show LessShow More
Product Description

ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. ThreatMapper discovers workloads and infrastructure, measures the topology, scans for vulnerabilities and then prioritises threats based on the nature of the vulnerability, its impact, proximity to the attack surface and ease of exploit. Discover what you need to fix first, to reduce your risk of exploit.


Seller Details
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
589 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®

Owen G.
OG
Overview Provided by:
Head of Products, Deepfence

Recent ThreatMapper Reviews

RANA S.
RS
RANA S.Mid-Market (51-1000 emp.)
4.0 out of 5
"Vulnerability Scanner!!"
To scan Kubernetes or fargate environments as installtion is very easy.
Azmeera Goutham N.
AN
Azmeera Goutham N.Small-Business (50 or fewer emp.)
4.0 out of 5
"Terrific ThreatMapper"
Real time visualization in the application and has various multi cloud apps and it helped monitoring features and sensored roadmaps with great support
Gaurav  R.
GR
Gaurav R.Mid-Market (51-1000 emp.)
4.5 out of 5
"Multiple cloud Scanner for vulernability bug of container, application"
Threat mapper is free and available for multiple cloud platform, best thing is it rank the vulnerability at risk level.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ThreatMapper Media

ThreatMapper Demo - ThreatMapper Topology View
Use ThreatMapper to scan your infrastructure, discover workloads, and map the topology
ThreatMapper Demo - ThreatMapper Vulnerabilities View
Scan your workloads and infrastructure (containers, filesystems, hosts, applications) for vulnerabilities. Discover issues that were missed during CI scanning, or which were disclosed after the workload was deployed.
ThreatMapper Demo - ThreatMapper 'Most Exploitable Vulnerabilities' View
ThreatMapper correlates vulnerabilities against the measured attack surface, then ranks them using severity, exploit method, proximity to attack surface and presence of active connections. Know what to fix first, in order to minimise your exposure to risk.
Answer a few questions to help the ThreatMapper community
Have you used ThreatMapper before?
Yes

11 out of 12 Total Reviews for ThreatMapper

4.2 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.

ThreatMapper Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
Gaurav  R.
GR
DevOps Engineer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Business partner of the seller or seller's competitor, not included in G2 scores.
What do you like best about ThreatMapper?

Threat mapper is free and available for multiple cloud platform, best thing is it rank the vulnerability at risk level. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

Not more to dislike about threatmapper, can provide better documentation Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

Threat mapper help to improve code and application quality. Review collected by and hosted on G2.com.

Aman P.
AP
Security Services Senior Consultant
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

The best thing about ThreatMapper is an open-source tool that scans, maps and ranks all the known vulnerabilities in the hosts, applications, containers etc. The kind of reliability ThreatMapper offers is unmatchable also that is the best thing about this wonderful tool. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

There is not much to dislike about ThreatMapper but just want the developers to add more robust threat/vulnerabilities list for CMS platforms like wordpress, drupal and joomla. Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

ThreatMapper is solving the biggest problem for a product development organization, that is to scan, map and rank the security vulnerabilities in their applications, hosts and containers during the SDLC phase to mitigate and minimize the possible future threats and risks associated with the code. Review collected by and hosted on G2.com.

RR
Associate Editor
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: Organic Review from User Profile
What do you like best about ThreatMapper?

Effective visualization and discovery of threats and vulnerabilities in real-time, multi-cloud implementation. Easy accessibility and set-up, enable effective monitoring with loaded tools. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

More updates are required and set-up should be simpler. More interactive Ui will be an add-on. Overall nothing to complain but the interface can be much better. No doubt the product is efficient. Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

It offers a fully integrated platform for threat detection and mitigation. Effectively eliminates remote vulnerabilities, DDoS attacks and phishing attempts and empowers integrity and security in the organization. Review collected by and hosted on G2.com.

RANA S.
RS
Piping Engineer
Mechanical or Industrial Engineering
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about ThreatMapper?

To scan Kubernetes or fargate environments as installtion is very easy. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

For Setup require skilled worker. Community support require. Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

GUI gives you traffic flows and vulnerability which are high risk. It is opensource. Review collected by and hosted on G2.com.

Raunak G.
RG
Product Growth
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

It is difficult to set up Threatmapper with your tech. However, once done properly it can help significantly in assessing the potential sources from where cyber attacks or DDoS attacks might happen. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

The setting up is very difficult. It is not a plug-n-play solution. Need a dedicated developer to get this up and running within the organisation. Also, the learning curve is pretty steep for non-tech business owners. Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

ThreatMapper helps in detecting the potential sources from where a cyber attack might happen in your company and it helps you plan accordingly.

If assesses your server, API, your code base; basically everything to detect any vulnerabilities. Review collected by and hosted on G2.com.

Isra K.
IK
Manager
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

Good Service of 24/7

Real-time discovery and visualization of applications in production

Sensored Roadmaps

Supports multi-cloud and multi-modality apps

Helpful Monitoring features

Notifications for every activity Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

Multiple limitations on threatmapper

Now Threatmapper is Open source platform

Third-party resources are not appropriate

Unknown vulnerabilities

Dev/DevOps are not aligned

Not all vulnerabilities can be patched Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

Good network traffic stats to identify anomalies

Frequent upgrades and add ons

gathering of web application traffics

Use of eBPF to gather attach information

Aligned Ecosystem

New Scanning Tools Review collected by and hosted on G2.com.

Shivaling P.
SP
C
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

The best thing i like is threatmapper is opensource now and can't wait to explore its full capabilities for multicloud implementation and kubernetes security scanning Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

since it is relatively new no community support available online to tune it to meet security best scanning across multicloud and also securing by scanning kubernetes clusters Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

It is solving to best implement DevSecOps practices in organizations to remove security vulnerabilities ddos attacks and other phishing scams so that our applications are safe Review collected by and hosted on G2.com.

Apoorv C.
AC
Consultant
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

It notifies the developer about build failure. Users can also monitor the build status. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

There should be training videos published itself by Threatmapper Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

Increased Security Review collected by and hosted on G2.com.

Julie G.
JG
Cybersecurity Ambassador
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

not intimidating in design and it's results are understandable Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

Seems to lack some of the sparkliest regard Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

Helped me through my cyber masters degree Review collected by and hosted on G2.com.

PP
Executive - Resourcing
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

The best product I have ever used for threat detection from different sources. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

There is nothing to dislike and they are improving and updating their product also. Review collected by and hosted on G2.com.

Recommendations to others considering ThreatMapper:

This is a great product to use as it simplifies threat detection and is easy to use. Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

As the ThreatMapper scans all the files and applications, it is solving my daily problems regarding threat. Review collected by and hosted on G2.com.