2026 Best Software Awards are here!See the list

Top Free Attack Surface Management Software

Check out our list of free Attack Surface Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Attack Surface Management Software to ensure you get the right product.

View Free Attack Surface Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
50 Attack Surface Management Products Available
(770)4.7 out of 5
Optimized for quick response
8th Easiest To Use in Attack Surface Management software
View top Consulting Services for Wiz
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 9.0
    9.0
    Continuous Monitoring
    Average: 9.1
    8.8
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Services
    UI
    Wiz gave us a single pane of glass for cloud security . This agentless and mostly hassle-free onboarding presented us a impressive cloud scanning... Read review
    GD
    Easy investigation and quick releases of new features. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    20,754 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,248 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 9.0
9.0
Continuous Monitoring
Average: 9.1
8.8
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 8.9
Verified User in Information Services
UI
Wiz gave us a single pane of glass for cloud security . This agentless and mostly hassle-free onboarding presented us a impressive cloud scanning... Read review
GD
Easy investigation and quick releases of new features. Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
20,754 Twitter followers
LinkedIn® Page
www.linkedin.com
3,248 employees on LinkedIn®
(300)4.5 out of 5
Optimized for quick response
View top Consulting Services for Tenable Nessus
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.1
    8.6
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
    PS
    The format of the report with vulnerabilities and it's associated CVE with a detailed explanation is really commendable. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,453 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,357 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.1
8.6
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 8.9
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
PS
The format of the report with vulnerabilities and it's associated CVE with a detailed explanation is really commendable. Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,453 Twitter followers
LinkedIn® Page
www.linkedin.com
2,357 employees on LinkedIn®
Ownership
NASDAQ: TENB
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(204)4.8 out of 5
Optimized for quick response
10th Easiest To Use in Attack Surface Management software
Entry Level Price:Starting at $149.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.1
    9.3
    Compliance Monitoring
    Average: 8.6
    9.5
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yiannis B.
    YB
    Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
    Andy M.
    AM
    My company was looking for a good service to enhance our managed platform offer to clients. While we were using some automated scanning before,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.1
9.3
Compliance Monitoring
Average: 8.6
9.5
Ease of Admin
Average: 8.9
Yiannis B.
YB
Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
Andy M.
AM
My company was looking for a good service to enhance our managed platform offer to clients. While we were using some automated scanning before,... Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
978 Twitter followers
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    9.9
    Continuous Monitoring
    Average: 9.1
    9.9
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Krishna Chaitanya P.
    KP
    Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
    Tanuj M.
    TM
    Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    28 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosyst

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 33% Small-Business
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
9.9
Continuous Monitoring
Average: 9.1
9.9
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 8.9
Krishna Chaitanya P.
KP
Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
Tanuj M.
TM
Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
183 Twitter followers
LinkedIn® Page
www.linkedin.com
28 employees on LinkedIn®
(112)4.9 out of 5
14th Easiest To Use in Attack Surface Management software
View top Consulting Services for SentinelOne Singularity Cloud Security
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    9.9
    Continuous Monitoring
    Average: 9.1
    9.8
    Compliance Monitoring
    Average: 8.6
    9.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    57,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
9.9
Continuous Monitoring
Average: 9.1
9.8
Compliance Monitoring
Average: 8.6
9.8
Ease of Admin
Average: 8.9
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
57,217 Twitter followers
LinkedIn® Page
www.linkedin.com
3,171 employees on LinkedIn®
(130)4.8 out of 5
1st Easiest To Use in Attack Surface Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    9.1
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.1
    9.5
    Compliance Monitoring
    Average: 8.6
    9.6
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Naveez S.
    NS
    CloudSEK is the best application is Al-based threat management platform that detects, analyses, and reports actionable threats to organizations. In... Read review
    Aditya  S.
    AS
    CloudSEK (specifically their XVigil platform) turns noise into actual "hey, you should fix this" alerts. Instead of "hackers are talking." Their... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,385 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    231 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Banking
Market Segment
  • 52% Enterprise
  • 27% Mid-Market
CloudSEK features and usability ratings that predict user satisfaction
9.1
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.1
9.5
Compliance Monitoring
Average: 8.6
9.6
Ease of Admin
Average: 8.9
Naveez S.
NS
CloudSEK is the best application is Al-based threat management platform that detects, analyses, and reports actionable threats to organizations. In... Read review
Aditya  S.
AS
CloudSEK (specifically their XVigil platform) turns noise into actual "hey, you should fix this" alerts. Instead of "hackers are talking." Their... Read review
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,385 Twitter followers
LinkedIn® Page
www.linkedin.com
231 employees on LinkedIn®
(149)4.8 out of 5
Optimized for quick response
3rd Easiest To Use in Attack Surface Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 37% Enterprise
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 9.0
    9.5
    Continuous Monitoring
    Average: 9.1
    9.1
    Compliance Monitoring
    Average: 8.6
    9.6
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SM
    I use Cyble for our comprehensive cyber defense strategy as a one-stop toolkit, which helps us in brand protection, dark web monitoring, and... Read review
    AB
    I really appreciate Cyble for its amazing speed of threat detection. Its new-age features provide a single data lake for faster correlation, which... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    16,653 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    246 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 37% Enterprise
  • 17% Mid-Market
Cyble features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 9.0
9.5
Continuous Monitoring
Average: 9.1
9.1
Compliance Monitoring
Average: 8.6
9.6
Ease of Admin
Average: 8.9
SM
I use Cyble for our comprehensive cyber defense strategy as a one-stop toolkit, which helps us in brand protection, dark web monitoring, and... Read review
AB
I really appreciate Cyble for its amazing speed of threat detection. Its new-age features provide a single data lake for faster correlation, which... Read review
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
16,653 Twitter followers
LinkedIn® Page
www.linkedin.com
246 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    9.1
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.1
    8.4
    Compliance Monitoring
    Average: 8.6
    9.1
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Logistics and Supply Chain
    AL
    You get pretty much all the options your heart desires. The service is five stars and they provide great integration/implementation support +... Read review
    Serdar A.
    SA
    I can use it as a Dark Web tool. That is very interesting and powerful. I can perform an external vulnerability scan with SocRadar and more. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,553 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 40% Mid-Market
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
9.1
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.1
8.4
Compliance Monitoring
Average: 8.6
9.1
Ease of Admin
Average: 8.9
Verified User in Logistics and Supply Chain
AL
You get pretty much all the options your heart desires. The service is five stars and they provide great integration/implementation support +... Read review
Serdar A.
SA
I can use it as a Dark Web tool. That is very interesting and powerful. I can perform an external vulnerability scan with SocRadar and more. Read review
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,553 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(105)4.7 out of 5
4th Easiest To Use in Attack Surface Management software
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 43% Mid-Market
    • 29% Enterprise
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a digital risk protection platform that provides comprehensive external threat monitoring and quick remediation, enhancing cyber risk visibility and response.
    • Reviewers frequently mention the platform's user-friendly design, efficient setup, and its ability to detect and take down brand impersonation attempts across multiple platforms over the internet and dark web.
    • Users reported that the interface can be complex at times, the Android app lacks certain features available on the web portal, and the CYNA module needs to authenticate threat actor claims more rigorously before publishing it.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.9
    Vulnerability Intelligence
    Average: 9.0
    9.0
    Continuous Monitoring
    Average: 9.1
    8.8
    Compliance Monitoring
    Average: 8.6
    9.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, BH
    Twitter
    @teamCTM360
    991 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    121 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 43% Mid-Market
  • 29% Enterprise
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a digital risk protection platform that provides comprehensive external threat monitoring and quick remediation, enhancing cyber risk visibility and response.
  • Reviewers frequently mention the platform's user-friendly design, efficient setup, and its ability to detect and take down brand impersonation attempts across multiple platforms over the internet and dark web.
  • Users reported that the interface can be complex at times, the Android app lacks certain features available on the web portal, and the CYNA module needs to authenticate threat actor claims more rigorously before publishing it.
CTM360 features and usability ratings that predict user satisfaction
8.9
Vulnerability Intelligence
Average: 9.0
9.0
Continuous Monitoring
Average: 9.1
8.8
Compliance Monitoring
Average: 8.6
9.6
Ease of Admin
Average: 8.9
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, BH
Twitter
@teamCTM360
991 Twitter followers
LinkedIn® Page
www.linkedin.com
121 employees on LinkedIn®
(76)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Attack Surface Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 9.0
    9.1
    Continuous Monitoring
    Average: 9.1
    9.1
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
    SV
    I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecPod
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    549 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    171 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 9.0
9.1
Continuous Monitoring
Average: 9.1
9.1
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 8.9
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
SV
I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
Seller Details
Seller
SecPod
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
549 Twitter followers
LinkedIn® Page
www.linkedin.com
171 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.1
    9.4
    Compliance Monitoring
    Average: 8.6
    8.7
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    Easy to use. At the same time it saves us a lot of the guessing work. Read review
    Verified User in Gambling & Casinos
    AG
    The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.1
9.4
Compliance Monitoring
Average: 8.6
8.7
Ease of Admin
Average: 8.9
Verified User in Computer Software
AC
Easy to use. At the same time it saves us a lot of the guessing work. Read review
Verified User in Gambling & Casinos
AG
The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,306 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    9.9
    Continuous Monitoring
    Average: 9.1
    9.6
    Compliance Monitoring
    Average: 8.6
    8.5
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
9.9
Continuous Monitoring
Average: 9.1
9.6
Compliance Monitoring
Average: 8.6
8.5
Ease of Admin
Average: 8.9
Verified User in Information Technology and Services
CI
Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail is a cloud-native External Attack Surface Management (EASM) platform designed to help organizations continuously discover, monitor, and remediate vulnerabilities across their entire digital

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.1
    9.5
    Compliance Monitoring
    Average: 8.6
    8.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Raj kumar k.
    RK
    By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
    Deep Shree V.
    DV
    Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail is a cloud-native External Attack Surface Management (EASM) platform designed to help organizations continuously discover, monitor, and remediate vulnerabilities across their entire digital

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
Glasstrail features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.1
9.5
Compliance Monitoring
Average: 8.6
8.8
Ease of Admin
Average: 8.9
Raj kumar k.
RK
By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
Deep Shree V.
DV
Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 69% Mid-Market
    • 13% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Halo Security features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    8.8
    Continuous Monitoring
    Average: 9.1
    8.6
    Compliance Monitoring
    Average: 8.6
    8.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SH
    I appreciate the easy user experience of Halo Security, which makes it simple to use once installed. I value the software's ability to protect... Read review
    Verified User in Information Technology and Services
    EI
    I appreciate the actionable insights that Halo Security offers. Instead of simply listing vulnerabilities, it helps you identify which ones are... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Miami Beach, US
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 69% Mid-Market
  • 13% Enterprise
Halo Security features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
8.8
Continuous Monitoring
Average: 9.1
8.6
Compliance Monitoring
Average: 8.6
8.0
Ease of Admin
Average: 8.9
SH
I appreciate the easy user experience of Halo Security, which makes it simple to use once installed. I value the software's ability to protect... Read review
Verified User in Information Technology and Services
EI
I appreciate the actionable insights that Halo Security offers. Instead of simply listing vulnerabilities, it helps you identify which ones are... Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Miami Beach, US
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous proactive security, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 33% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 9.0
    7.1
    Continuous Monitoring
    Average: 9.1
    5.0
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Evan B.
    EB
    The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
    Mark H.
    MH
    Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2017
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,275 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    89 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous proactive security, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 33% Enterprise
  • 31% Mid-Market
Edgescan features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 9.0
7.1
Continuous Monitoring
Average: 9.1
5.0
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 8.9
Evan B.
EB
The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
Mark H.
MH
Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
Seller Details
Seller
Edgescan
Company Website
Year Founded
2017
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,275 Twitter followers
LinkedIn® Page
www.linkedin.com
89 employees on LinkedIn®