Top Rated Xygeni Alternatives
1 Xygeni Reviews
5.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.

AA
Alvaro A.
Small-Business(50 or fewer emp.)
What do you like best about Xygeni?
Its scanning capabilities (very robust), the fact that it prevents secrets from reaching the repository, and the direct feedback it provides to developers via Slack. Thanks to its Git Hook integration, we can proceed with immedate corrective actions (across the entire Software Supply Chain) Review collected by and hosted on G2.com.
What do you dislike about Xygeni?
The platform provides a lot of information as it recognizes and validates an extensive array of secret formats, whether they are passwords, API keys, tokens, or cryptographic keys. It would be nice if the platform was able to validate even a major number of secrets and to discern whether a password is valid or not. There are too many things to validate. Review collected by and hosted on G2.com.
There are not enough reviews of Xygeni for G2 to provide buying insight. Below are some alternatives with more reviews:
1
Wiz
4.7
(697)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2

GitHub
4.7
(2,194)
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
3
GitLab
4.5
(823)
An open source web interface and source control platform based on Git.
4
Lacework
4.3
(381)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings.
Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
5

Red Hat Ansible Automation Platform
4.6
(307)
Red Hat Ansible Automation Platform is a simple way to automate apps and infrastructure. Application Deployment + Configuration Management + Continuous Delivery.
6
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
7
Tenable Nessus
4.5
(284)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
8
Orca Security
4.6
(209)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
9

AlgoSec
4.5
(189)
AlgoSec is a business-driven security management solution.
10
SentinelOne Singularity
4.7
(183)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.