Show rating breakdown
Save to My Lists
Claimed
Claimed

ThreatStryker Reviews & Product Details

ThreatStryker Overview

What is ThreatStryker?

ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your applications, know the weak points, prioritise vulnerabilities for remediation. Observe security events (indicators of attack and indicators of compromise) using deep packet inspection and lightweight on-host sensors. Correlate events and vulnerabilities to track the risk posed by attacker behaviour, then intervene with quarantine and firewall actions to stop attackers in their tracks.

ThreatStryker Details
Show LessShow More
Product Description

ThreatStryker builds on the ThreatMapper open source platform. ThreatStryker extends the vulnerability discovery capabilities, adding runtime attack detection, prediction and protection. Map your applications, know the weak points, prioritise vulnerabilities for remediation. Observe security events (indicators of attack and indicators of compromise) using deep packet inspection and lightweight on-host sensors. Correlate events and vulnerabilities to track the risk posed by attacker behaviour, then intervene with quarantine and firewall actions to stop attackers in their tracks.


Seller Details
Year Founded
2018
HQ Location
Palo Alto, US
Twitter
@deepfence
589 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®

Owen G.
OG
Overview Provided by:
Head of Products, Deepfence

Recent ThreatStryker Reviews

AM
Ali M.Mid-Market (51-1000 emp.)
4.0 out of 5
"Vulnerability identification and attack monitoring"
ThreatStryker is good at mapping my applications and identifying threats or weak points. This made it easy for me to understand my level of vulnera...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

ThreatStryker Media

ThreatStryker Demo - ThreatStryker Topology View
Discover assets and measure the attack surface. View vulnerabilities and top risks.
ThreatStryker Demo - ThreatStryker Alerts View
What is happening within your application? Capture and interrogate alerts - network DPI indicators of attack, and on-host sensor indicators of compromise. ThreatStryker will correlate these events and assess the risk that each attack poses to your applications.
ThreatStryker Demo - ThreatStryker Exploits View
Understand which vulnerabilities pose the greatest risk of exploit to the integrity of your running applications.
Answer a few questions to help the ThreatStryker community
Have you used ThreatStryker before?
Yes

1 ThreatStryker Reviews

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
1 ThreatStryker Reviews
4.0 out of 5
1 ThreatStryker Reviews
4.0 out of 5

ThreatStryker Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
AM
Senior HR Business Partner
Hospital & Health Care
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about ThreatStryker?

ThreatStryker is good at mapping my applications and identifying threats or weak points. This made it easy for me to understand my level of vulnerability, and what aspects to focus on first. The incorporation of runtime attack detection did look like the protection for active threat prevention. Review collected by and hosted on G2.com.

What do you dislike about ThreatStryker?

ThreatStryker can accurately identify threats, it does not offer an automated method to address them. It became arduous to fix each vulnerability individually since it was coupled with a massive environment. The lack of an automated patching function is a significant disadvantage for ThreatStryker. Review collected by and hosted on G2.com.

What problems is ThreatStryker solving and how is that benefiting you?

ThreatStryker does help me to a certain extent because it is a vulnerability discovery and attack detection tool. I believe that being aware of my limitations are and the ability to detect untoward movement make me secure against threats. Review collected by and hosted on G2.com.

There are not enough reviews of ThreatStryker for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Lacework Logo
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
2
Wiz Logo
Wiz
4.7
(698)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Scrut Automation Logo
Scrut Automation
4.9
(1,081)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
4
Vanta Logo
Vanta
4.6
(1,717)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
5
Sprinto Logo
Sprinto
4.8
(1,261)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
6
Drata Logo
Drata
4.8
(977)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
7
Thoropass Logo
Thoropass
4.7
(428)
8
Secureframe Logo
Secureframe
4.7
(377)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
9
Scytale Logo
Scytale
4.8
(371)
Compliance automation platform and dedicated expert services that fast-track and streamline 30+ compliance frameworks such as SOC 2, ISO 27001 and GDPR, as well as all your GRC processes.
10
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
Show More