Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated ThreatMapper Alternatives

ThreatMapper Reviews & Product Details - Page 2

ThreatMapper Overview

What is ThreatMapper?

Open source, multi-cloud platform for scanning, mapping, and ranking vulnerabilities in running containers, images, hosts, and repositories.

ThreatMapper Details
Show LessShow More
Product Description

ThreatMapper discovers the threats to your applications in production, across clouds, Kubernetes, serverless, and more. ThreatMapper discovers workloads and infrastructure, measures the topology, scans for vulnerabilities and then prioritises threats based on the nature of the vulnerability, its impact, proximity to the attack surface and ease of exploit. Discover what you need to fix first, to reduce your risk of exploit.


Seller Details
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
589 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®

Owen G.
OG
Overview Provided by:
Head of Products, Deepfence

Recent ThreatMapper Reviews

RANA S.
RS
RANA S.Mid-Market (51-1000 emp.)
4.0 out of 5
"Vulnerability Scanner!!"
To scan Kubernetes or fargate environments as installtion is very easy.
Azmeera Goutham N.
AN
Azmeera Goutham N.Small-Business (50 or fewer emp.)
4.0 out of 5
"Terrific ThreatMapper"
Real time visualization in the application and has various multi cloud apps and it helped monitoring features and sensored roadmaps with great support
Gaurav  R.
GR
Gaurav R.Mid-Market (51-1000 emp.)
4.5 out of 5
"Multiple cloud Scanner for vulernability bug of container, application"
Threat mapper is free and available for multiple cloud platform, best thing is it rank the vulnerability at risk level.
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ThreatMapper Media

ThreatMapper Demo - ThreatMapper Topology View
Use ThreatMapper to scan your infrastructure, discover workloads, and map the topology
ThreatMapper Demo - ThreatMapper Vulnerabilities View
Scan your workloads and infrastructure (containers, filesystems, hosts, applications) for vulnerabilities. Discover issues that were missed during CI scanning, or which were disclosed after the workload was deployed.
ThreatMapper Demo - ThreatMapper 'Most Exploitable Vulnerabilities' View
ThreatMapper correlates vulnerabilities against the measured attack surface, then ranks them using severity, exploit method, proximity to attack surface and presence of active connections. Know what to fix first, in order to minimise your exposure to risk.
Answer a few questions to help the ThreatMapper community
Have you used ThreatMapper before?
Yes

12 ThreatMapper Reviews

4.2 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Popular Mentions
The next elements are radio elements and sort the displayed results by the item selected and will update the results displayed.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
12 ThreatMapper Reviews
4.2 out of 5
12 ThreatMapper Reviews
4.2 out of 5

ThreatMapper Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
PP
Executive - Resourcing
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

The best product I have ever used for threat detection from different sources. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

There is nothing to dislike and they are improving and updating their product also. Review collected by and hosted on G2.com.

Recommendations to others considering ThreatMapper:

This is a great product to use as it simplifies threat detection and is easy to use. Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

As the ThreatMapper scans all the files and applications, it is solving my daily problems regarding threat. Review collected by and hosted on G2.com.

Verified User in Computer Software
UC
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatMapper?

Open Source, easy to deploy and very easy to use Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

sometimes it got hanged and not work properly Review collected by and hosted on G2.com.

Recommendations to others considering ThreatMapper:

Very easy to use, highly recommend Review collected by and hosted on G2.com.

What problems is ThreatMapper solving and how is that benefiting you?

Automatically map the applications across the cloud environments Review collected by and hosted on G2.com.