Skip to Navigation
Skip to Navigation
G2 - Business Software Reviews
Search for software, category
Software
Expand/Collapse Software
Services
Expand/Collapse Services
G2 for Business
Expand/Collapse vendor
For Marketers
Enhance your G2 profile and reach in-market buyers
For Sales
Find, engage, and convert in-market buyers
For Services
Reach companies that need you, when they’re ready to buy
For Investments
Gain access to real-time software trends
Deals
Language Selector
EN
More Language Options
Choose a language
Deutsch
Français
Português
Español
Write a Review
Join or Log In
Search
Search Software and Services
Language Selector
Choose a language
Deutsch
Français
Português
Español
Expand/Collapse
Home
...
All Categories
Security Risk Analysis Software Discussions
Security Risk Analysis Software Discussions
Share
All Security Risk Analysis Software Discussions
Search
Most Commented
Most Helpful
Pinned by G2
Newest
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Filter
Filter
Filter by
Expand/Collapse
Sort by
Most Commented
Most Helpful
Pinned by G2
Newest
Filter by
All Discussions
Discussions with Comments
Pinned by G2
Discussions without Comments
Posted within
Microsoft Defender for Cloud
1
1
Is Azure security Center a SIEM?
Is Azure security Center a SIEM?
Cloud Compliance Software
Cloud Workload Protection Platforms
Security Risk Analysis Software
Extended Detection and Response (XDR) Platforms
Cloud Security Posture Management (CSPM) Software
1
person commented
AM
Ayush M.
Pinned by G2 as a
common question.
Posted within
Tenable Nessus
0
0
What is Nessus used for?
What is Nessus used for?
Security Risk Analysis Software
Vulnerability Scanner Software
Pinned by G2 as a
common question.
Posted within
AlienVault USM (from AT&T Cybersecurity)
0
0
What is AlienVault USM (from AT&T Cybersecurity) used for?
What is AlienVault USM (from AT&T Cybersecurity) used for?
Security Risk Analysis Software
Vulnerability Scanner Software
Incident Response Software
Security Information and Event Management (SIEM) Software
Cloud Compliance Software
Intrusion Detection and Prevention Systems (IDPS)
Pinned by G2 as a
common question.
Posted within
WithSecure Elements Endpoint Protection
0
0
What is WithSecure Elements Endpoint Protection used for?
What is WithSecure Elements Endpoint Protection used for?
Endpoint Protection Suites
Security Risk Analysis Software
Endpoint Management Software
Antivirus Software
Endpoint Protection Platforms
Pinned by G2 as a
common question.
Posted within
Tenable Vulnerability Management
0
0
What is Tenable.io used for?
What is Tenable.io used for?
Risk-based Vulnerability Management Software
Cloud Infrastructure Monitoring Software
Security Risk Analysis Software
ServiceNow Marketplace Apps
Vulnerability Scanner Software
1
person commented
DH
David H.
Pinned by G2 as a
common question.
Posted within
Tenable Security Center
0
0
What is Tenable.sc used for?
What is Tenable.sc used for?
Risk-based Vulnerability Management Software
Security Risk Analysis Software
Vulnerability Scanner Software
1
person commented
SW
Sanford W.
Pinned by G2 as a
common question.
Posted within
SecurityScorecard
0
0
What is SecurityScorecard used for?
What is SecurityScorecard used for?
Vendor Security and Privacy Assessment Software
Third Party & Supplier Risk Management Software
IT Risk Management Software
Security Risk Analysis Software
1
person commented
MD
Mimoh D.
Pinned by G2 as a
common question.
Posted within
Apptega
0
0
What is Apptega used for?
What is Apptega used for?
Enterprise Risk Management (ERM)
IT Risk Management Software
Regulatory Change Management Software
Audit Management Software
Security Risk Analysis Software
Cloud Compliance Software
Security Compliance Software
Pinned by G2 as a
common question.
Posted within
Netwrix Auditor
0
0
What is Netwrix Auditor used for?
What is Netwrix Auditor used for?
Insider Threat Management (ITM) Software
Data-Centric Security Software
Data Governance Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
SanerNow
0
0
What is SanerNow used for?
What is SanerNow used for?
Security Risk Analysis Software
Patch Management Software
IT Asset Management Software
Endpoint Detection & Response (EDR) Software
Risk-based Vulnerability Management Software
Vulnerability Scanner Software
Pinned by G2 as a
common question.
Posted within
Microsoft Defender for Cloud
0
0
What is Microsoft Defender for Cloud used for?
What is Microsoft Defender for Cloud used for?
Cloud Detection and Response (CDR) Software
Cloud-Native Application Protection Platform (CNAPP)
Cloud Security Posture Management (CSPM) Software
Secure Code Review Software
API Security Tools
Cloud Security Monitoring and Analytics Software
Software Composition Analysis Tools
Cloud Compliance Software
Container Security Tools
Cloud Workload Protection Platforms
Security Risk Analysis Software
Container Monitoring Software
1
person commented
CS
Chandru S.
Pinned by G2 as a
common question.
Posted within
ProcessBolt
0
0
What is ProcessBolt used for?
What is ProcessBolt used for?
Vendor Security and Privacy Assessment Software
Third Party & Supplier Risk Management Software
Security Risk Analysis Software
1
person commented
ProcessBolt
Pinned by G2 as a
common question.
Posted within
Cyberint, a Check Point Company
0
0
What is Argos™ Threat Intelligence Platform used for?
What is Argos™ Threat Intelligence Platform used for?
Dark Web Monitoring Tools
Risk-based Vulnerability Management Software
Brand Protection Software
Security Risk Analysis Software
Threat Intelligence Software
Attack Surface Management Software
1
person commented
Cyberint, a Check Point Company
Pinned by G2 as a
common question.
Posted within
Certa
0
0
What is Certa used for?
What is Certa used for?
Third Party & Supplier Risk Management Software
Security Risk Analysis Software
Enterprise Risk Management (ERM)
Procure to Pay Software
Pinned by G2 as a
common question.
Posted within
Haystax Enterprise Security Solution
0
0
What is Haystax Enterprise Security Solution used for?
What is Haystax Enterprise Security Solution used for?
Insider Threat Management (ITM) Software
Cloud Security Monitoring and Analytics Software
User and Entity Behavior Analytics (UEBA) Software
Security Risk Analysis Software
Protective Intelligence Platforms
Pinned by G2 as a
common question.
Posted within
Swascan Security Suite
0
0
What is Swascan Security Suite used for?
What is Swascan Security Suite used for?
Vulnerability Scanner Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Netwrix Change Tracker
0
0
What is Change Tracker Gen7 R2 used for?
What is Change Tracker Gen7 R2 used for?
Network Security Policy Management (NSPM)
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
ARCON | Secure Compliance Management (SCM
0
0
What is ARCON | Secure Compliance Management (SCM used for?
What is ARCON | Secure Compliance Management (SCM used for?
Patch Management Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
ManageEngine DataSecurity Plus
0
0
What is ManageEngine DataSecurity Plus used for?
What is ManageEngine DataSecurity Plus used for?
Sensitive Data Discovery Software
Data-Centric Security Software
Data Loss Prevention (DLP) Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Fieldguide
0
0
What is Fieldguide used for?
What is Fieldguide used for?
Security Risk Analysis Software
Cloud Content Collaboration Software
Accounting Practice Management Software
Pinned by G2 as a
common question.
Posted within
N-able Risk Intelligence
0
0
What is N-able Risk Intelligence used for?
What is N-able Risk Intelligence used for?
Threat Intelligence Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
IBM Guardium Vulnerability Assessment
0
0
What is IBM Security Guardium Vulnerability Assessment used for?
What is IBM Security Guardium Vulnerability Assessment used for?
Database Security Software
Vulnerability Scanner Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Cortex Data Lake
0
0
What is Cortex Data Lake used for?
What is Cortex Data Lake used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Onlayer Merchant Risk Management
0
0
What is PCI Checklist Merchant Risk Assessment used for?
What is PCI Checklist Merchant Risk Assessment used for?
GRC Tools
Security Risk Analysis Software
Vendor Security and Privacy Assessment Software
1
person commented
B
Bartu .
Pinned by G2 as a
common question.
Posted within
beSECURE
0
0
What is beSECURE used for?
What is beSECURE used for?
Security Risk Analysis Software
Vulnerability Scanner Software
Pinned by G2 as a
common question.
Posted within
Media Sonar
0
0
What is Media Sonar used for?
What is Media Sonar used for?
Dark Web Monitoring Tools
Social Discovery Software
Security Risk Analysis Software
Threat Intelligence Software
Pinned by G2 as a
common question.
Posted within
DomainTools
0
0
What is DomainTools used for?
What is DomainTools used for?
DNS Security Solutions
Threat Intelligence Software
Incident Response Software
Digital Forensics Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
FortifyData Continuous Threat Exposure Management
0
0
What is FortifyData Cyber Risk Scoring used for?
What is FortifyData Cyber Risk Scoring used for?
Vendor Security and Privacy Assessment Software
Security Risk Analysis Software
Attack Surface Management Software
Risk-based Vulnerability Management Software
Pinned by G2 as a
common question.
Posted within
Reflectiz
0
0
What is Reflectiz used for?
What is Reflectiz used for?
Web Application Firewalls (WAF)
Security Risk Analysis Software
Runtime Application Self-Protection (RASP) Tools
Website Security Software
Pinned by G2 as a
common question.
Posted within
Tenable Identity Exposure
0
0
What is Tenable.ad used for?
What is Tenable.ad used for?
Cloud Security Monitoring and Analytics Software
Risk-based Vulnerability Management Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Smarsh Cyber Compliance
0
0
What is Smarsh Cybersecurity with Entreda Unify used for?
What is Smarsh Cybersecurity with Entreda Unify used for?
Security Risk Analysis Software
Cloud Compliance Software
Pinned by G2 as a
common question.
Posted within
Atomic Enterprise OSSEC
0
0
What is Atomic Enterprise OSSEC used for?
What is Atomic Enterprise OSSEC used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
CyberSmart
0
0
What is CyberSmart used for?
What is CyberSmart used for?
Security Awareness Training Software
Security Risk Analysis Software
Policy Management Software
Vulnerability Scanner Software
Pinned by G2 as a
common question.
Posted within
Vigilante Operative
0
0
What is Vigilante Operative used for?
What is Vigilante Operative used for?
Security Risk Analysis Software
Threat Intelligence Software
Dark Web Monitoring Tools
Pinned by G2 as a
common question.
Posted within
Cymptom
0
0
What is Cymptom used for?
What is Cymptom used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Rescana
0
0
What is Rescana used for?
What is Rescana used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Lynis Enterprise
0
0
What is Lynis Enterprise used for?
What is Lynis Enterprise used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Google Cloud Web Risk API
0
0
What is Google Cloud Web Risk API used for?
What is Google Cloud Web Risk API used for?
Security Risk Analysis Software
Website Security Software
Pinned by G2 as a
common question.
Posted within
Axonius
0
0
What is Axonius used for?
What is Axonius used for?
Attack Surface Management Software
Security Risk Analysis Software
IT Asset Management Software
Application Portfolio Management Software
Enterprise IT Management Software
Cloud Compliance Software
Pinned by G2 as a
common question.
Posted within
ControlCase Compliance as a Service (CaaS)
0
0
What is ControlCase Compliance as a Service (CaaS) used for?
What is ControlCase Compliance as a Service (CaaS) used for?
Security Risk Analysis Software
Security Compliance Software
Pinned by G2 as a
common question.
Posted within
TrustMAPP
0
0
What is TrustMAPP used for?
What is TrustMAPP used for?
Security Compliance Software
IT Risk Management Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Templarbit Sonar
0
0
What is Templarbit Sonar used for?
What is Templarbit Sonar used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
TrustMAPP
0
0
What is TrustMAPP used for?
What is TrustMAPP used for?
Security Compliance Software
IT Risk Management Software
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Templarbit Sonar
0
0
What is Templarbit Sonar used for?
What is Templarbit Sonar used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
ASPIA
0
0
What is ASPIA used for?
What is ASPIA used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Panorays
0
0
What is Panorays used for?
What is Panorays used for?
Security Risk Analysis Software
Vendor Security and Privacy Assessment Software
Pinned by G2 as a
common question.
Posted within
Centraleyezer
0
0
What is Centraleyezer used for?
What is Centraleyezer used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
Hyperion BDiscover
0
0
What is Hyperion BDiscover used for?
What is Hyperion BDiscover used for?
Security Risk Analysis Software
Pinned by G2 as a
common question.
Posted within
RiskRecon
0
0
What is RiskRecon used for?
What is RiskRecon used for?
Risk-based Vulnerability Management Software
Security Risk Analysis Software
Application Portfolio Management Software
Vendor Security and Privacy Assessment Software
Pinned by G2 as a
common question.
Posted within
The Respond Analyst
0
0
What is The Respond Analyst used for?
What is The Respond Analyst used for?
Security Risk Analysis Software
Incident Response Software
Threat Intelligence Software
Pinned by G2 as a
common question.
1
2
3
4
Next ›
Last »
Top Contributors in Security Risk Analysis Software
1
KR
Loading...
Katie R.
12
2
SZ
Loading...
Sarah Z.
3
3
CL
Loading...
Cece L.
3
4
AS
Loading...
Anuj S.
2
5
NF
Loading...
Naman F.
2
Popular Discussions without Comments
1
1
¿como puedo aprovechar el workflow de tickets?
1
1
How do we improve performance for large assessment.
1
1
Can i use nessus to scan protocols such as quic and radius
1
1
What does certa do for you?
1
1
Why you don't provide full guidence to the companey.
Hunting for software
insights
?
With over 2.5 million reviews, we can provide the specific details that help you make an informed software buying decision for your business. Finding the right product is important, let us help.
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
G2 - Business Software Reviews
Create an account
Already have an account?
Log in
or continue with
LinkedIn
Google
Google
By proceeding, you agree to our
Terms of Use
and
Privacy Policy