Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search for software, category
Software
Expand/Collapse Software
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
Deals
Language Selector
EN
More Language Options
Choose a language
Deutsch
Français
Português
Español
Write a Review
Join or Log In
Search
Search Software and Services
Language Selector
Choose a language
Deutsch
Français
Português
Español
Expand/Collapse
You must be logged in to access this page.
Home
...
All Categories
Attack Surface Management Software Discussions
Attack Surface Management Software Discussions
Share
All Attack Surface Management Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
PingSafe
0
0
Do you recommend PingSafe for cloud security, and what has been your experience so far?
Do you recommend PingSafe for cloud security, and what has been your experience so far?
Attack Surface Management Software
Cloud Security Posture Management (CSPM) Software
Cloud Security Monitoring and Analytics Software
Cloud Compliance Software
Container Security Tools
Cloud Workload Protection Platforms
Vulnerability Scanner Software
Exposure Management Platforms
Cloud-Native Application Protection Platform (CNAPP)
Pinned by G2 as a
common question.
Posted within
Detectify
0
0
What is Detectify used for?
What is Detectify used for?
Dynamic Application Security Testing (DAST) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Exposure Management Platforms
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Scrut Automation
0
0
What is Scrut Automation used for?
What is Scrut Automation used for?
Attack Surface Management Software
Security Compliance Software
Cloud Security Posture Management (CSPM) Software
Vendor Security and Privacy Assessment Software
Cloud Compliance Software
Third Party & Supplier Risk Management Software
IT Asset Management Software
Pinned by G2 as a
common question.
Posted within
Edgescan
0
0
What is edgescan used for?
What is edgescan used for?
API Security Tools
Risk-based Vulnerability Management Software
Penetration Testing Software
Vulnerability Scanner Software
Exposure Management Platforms
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Cyberint, a Check Point Company
0
0
What is Argos™ Threat Intelligence Platform used for?
What is Argos™ Threat Intelligence Platform used for?
Dark Web Monitoring Tools
Risk-based Vulnerability Management Software
Brand Protection Software
Security Risk Analysis Software
Threat Intelligence Software
Attack Surface Management Software
1
person commented
Cyberint, a Check Point Company
Pinned by G2 as a
common question.
Posted within
CODA Footprint
0
0
What is CODA Footprint used for?
What is CODA Footprint used for?
Attack Surface Management Software
Risk-based Vulnerability Management Software
Pinned by G2 as a
common question.
Posted within
Offensity
0
0
What is Offensity used for?
What is Offensity used for?
Vulnerability Scanner Software
Exposure Management Platforms
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Brinqa
0
0
What is Brinqa used for?
What is Brinqa used for?
Attack Surface Management Software
Risk-based Vulnerability Management Software
Pinned by G2 as a
common question.
Posted within
The Onapsis Platform
0
0
What is Onapsis used for?
What is Onapsis used for?
Other SAP Resellers
Security Software
Audit Management Software
Business Continuity Management Software
Attack Surface Management Software
SAP Store Software
Pinned by G2 as a
common question.
Posted within
FortifyData Continuous Threat Exposure Management
0
0
What is FortifyData Cyber Risk Scoring used for?
What is FortifyData Cyber Risk Scoring used for?
Vendor Security and Privacy Assessment Software
Security Risk Analysis Software
Attack Surface Management Software
Risk-based Vulnerability Management Software
Pinned by G2 as a
common question.
Posted within
ImmuniWeb Discovery
0
0
What is ImmuniWeb Discovery used for?
What is ImmuniWeb Discovery used for?
Dark Web Monitoring Tools
Website Security Software
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Axonius
0
0
What is Axonius used for?
What is Axonius used for?
Attack Surface Management Software
Security Risk Analysis Software
IT Asset Management Software
Application Portfolio Management Software
Enterprise IT Management Software
Cloud Compliance Software
Pinned by G2 as a
common question.
Posted within
Quantum Armor
0
0
What is Quantum Armor used for?
What is Quantum Armor used for?
Attack Surface Management Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
Maltego
0
0
How good is Maltego?
How good is Maltego?
Threat Intelligence Software
Brand Protection Software
Investigation Management Software
Anti Money Laundering Software
Fraud Detection Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Digital Forensics Software
Data Mapping Software
Security Orchestration, Automation, and Response (SOAR) Software
Mind Mapping Software
Disinformation Detection Tools
Insider Threat Management (ITM) Software
Network Detection and Response (NDR) Software
Attack Surface Management Software
Analytics Platforms
1
person commented
NZ
Norakmal Z.
Pinned by G2 as a
common question.
Posted within
Detectify
0
0
Is Detectify a DAST tool?
Is Detectify a DAST tool?
Dynamic Application Security Testing (DAST) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Maltego
0
0
How many versions of Maltego client software are there?
How many versions of Maltego client software are there?
Threat Intelligence Software
Brand Protection Software
Investigation Management Software
Anti Money Laundering Software
Fraud Detection Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Digital Forensics Software
Data Mapping Software
Security Orchestration, Automation, and Response (SOAR) Software
Mind Mapping Software
Disinformation Detection Tools
Insider Threat Management (ITM) Software
Network Detection and Response (NDR) Software
Attack Surface Management Software
Analytics Platforms
Pinned by G2 as a
common question.
Posted within
Detectify
0
0
How does Detectify app work?
How does Detectify app work?
Dynamic Application Security Testing (DAST) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Detectify
0
0
What does Detectify scan for?
What does Detectify scan for?
Dynamic Application Security Testing (DAST) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Attack Surface Management Software
Pinned by G2 as a
common question.
Posted within
Sysdig Secure
0
0
Is Sysdig free?
Is Sysdig free?
Cloud Security Monitoring and Analytics Software
Container Security Software
Cloud Workload Protection Platforms
Container Monitoring Software
Cloud Security Posture Management (CSPM) Software
Cloud Compliance Software
Vulnerability Scanner Software
Attack Surface Management Software
2
people commented
CS
Chandan S.
AS
Pinned by G2 as a
common question.
Posted within
Detectify
0
0
What is Detectify Deep scan?
What is Detectify Deep scan?
Dynamic Application Security Testing (DAST) Software
Penetration Testing Software
Website Security Software
Vulnerability Scanner Software
Attack Surface Management Software
Pinned by G2 as a
common question.
Top Contributors in Attack Surface Management Software
1
AS
Loading...
Amanda S.
1
2
NZ
Loading...
Norakmal Z.
1
3
GG
Loading...
Gemma G.
1
4
CS
Loading...
Chandan S.
1
Popular Discussions without Comments
0
0
Do you recommend pingsafe for cloud security, and what has been your experience so far?
0
0
What is detectify used for?
0
0
What is scrut automation used for?
0
0
What is edgescan used for?
0
0
What is coda footprint used for?
Hunting for software
insights
?
With over 2.5 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy