Introducing G2.ai, the future of software buying.Try now

Best Attack Surface Management Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks
Show More
Show Less

Featured Attack Surface Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Attack Surface Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
153 Listings in Attack Surface Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bitsight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    14
    Risk Management
    12
    Ease of Use
    11
    Customer Support
    9
    Features
    8
    Cons
    Missing Features
    5
    Delay Issues
    3
    Improvement Needed
    3
    Inadequate Remediation
    3
    Information Management
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bitsight features and usability ratings that predict user satisfaction
    8.1
    Vulnerability Intelligence
    Average: 9.0
    8.8
    Continuous Monitoring
    Average: 9.0
    8.6
    Compliance Monitoring
    Average: 8.5
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bitsight
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, MA
    Twitter
    @BitSight
    4,484 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    738 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 6

Users
No information available
Industries
  • Hospital & Health Care
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 23% Mid-Market
Bitsight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
14
Risk Management
12
Ease of Use
11
Customer Support
9
Features
8
Cons
Missing Features
5
Delay Issues
3
Improvement Needed
3
Inadequate Remediation
3
Information Management
3
Bitsight features and usability ratings that predict user satisfaction
8.1
Vulnerability Intelligence
Average: 9.0
8.8
Continuous Monitoring
Average: 9.0
8.6
Compliance Monitoring
Average: 8.5
8.8
Ease of Admin
Average: 8.9
Seller Details
Seller
Bitsight
Company Website
Year Founded
2011
HQ Location
Boston, MA
Twitter
@BitSight
4,484 Twitter followers
LinkedIn® Page
www.linkedin.com
738 employees on LinkedIn®
(25)4.9 out of 5
8th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    10
    Threat Detection
    10
    Ease of Use
    7
    Detailed Analysis
    6
    Threat Intelligence
    6
    Cons
    Excessive Notifications
    4
    Information Overload
    4
    Limited Features
    4
    Inefficient Alerts
    3
    Inefficient Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.5
    9.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    15,200 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatMon is an AI-powered Cyber Threat Intelligence platform designed to proactively detect, analyze, and respond to external cyber threats targeting organizations’ digital assets and reputation. Thi

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
10
Threat Detection
10
Ease of Use
7
Detailed Analysis
6
Threat Intelligence
6
Cons
Excessive Notifications
4
Information Overload
4
Limited Features
4
Inefficient Alerts
3
Inefficient Alert System
3
ThreatMon features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.5
9.8
Ease of Admin
Average: 8.9
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
15,200 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A powerful Attack Surface Management solution designed to help you identify, assess, and monitor your organization's cybersecurity vulnerabilities. Stay ahead of potential threats with real-time insig

    Users
    No information available
    Industries
    • Information Technology and Services
    • Marketing and Advertising
    Market Segment
    • 68% Mid-Market
    • 16% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rankiteo Scoring Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Detection
    10
    Customer Support
    6
    Actionable Intelligence
    5
    Security Testing
    5
    Cons
    Expensive
    5
    Integration Issues
    5
    Limited Features
    4
    Complex Setup
    2
    Lack of Integration
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rankiteo Scoring Platform features and usability ratings that predict user satisfaction
    8.9
    Vulnerability Intelligence
    Average: 9.0
    8.9
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.5
    9.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rankiteo
    Year Founded
    2022
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A powerful Attack Surface Management solution designed to help you identify, assess, and monitor your organization's cybersecurity vulnerabilities. Stay ahead of potential threats with real-time insig

Users
No information available
Industries
  • Information Technology and Services
  • Marketing and Advertising
Market Segment
  • 68% Mid-Market
  • 16% Small-Business
Rankiteo Scoring Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Detection
10
Customer Support
6
Actionable Intelligence
5
Security Testing
5
Cons
Expensive
5
Integration Issues
5
Limited Features
4
Complex Setup
2
Lack of Integration
2
Rankiteo Scoring Platform features and usability ratings that predict user satisfaction
8.9
Vulnerability Intelligence
Average: 9.0
8.9
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.5
9.6
Ease of Admin
Average: 8.9
Seller Details
Seller
Rankiteo
Year Founded
2022
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot® is a sophisticated AI-powered automated penetration testing solution designed to assist organizations in evaluating their cybersecurity posture and controls. By simulating real-world attacks

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 51% Small-Business
    • 46% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Automation
    18
    Pentesting Efficiency
    14
    Vulnerability Identification
    14
    Features
    11
    Cons
    Complex Setup
    6
    Missing Features
    6
    Complexity
    4
    Difficult Setup
    4
    Expensive
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RidgeBot features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 9.0
    8.5
    Continuous Monitoring
    Average: 9.0
    8.5
    Compliance Monitoring
    Average: 8.5
    9.1
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,278 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    45 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot® is a sophisticated AI-powered automated penetration testing solution designed to assist organizations in evaluating their cybersecurity posture and controls. By simulating real-world attacks

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 51% Small-Business
  • 46% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Automation
18
Pentesting Efficiency
14
Vulnerability Identification
14
Features
11
Cons
Complex Setup
6
Missing Features
6
Complexity
4
Difficult Setup
4
Expensive
4
RidgeBot features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 9.0
8.5
Continuous Monitoring
Average: 9.0
8.5
Compliance Monitoring
Average: 8.5
9.1
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,278 Twitter followers
LinkedIn® Page
www.linkedin.com
45 employees on LinkedIn®
(76)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Saner CVEM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    22
    Ease of Use
    19
    Features
    17
    Customer Support
    14
    Patch Management
    14
    Cons
    Integration Issues
    7
    Expensive
    6
    Slow Performance
    6
    Missing Features
    5
    Dashboard Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 9.0
    9.1
    Continuous Monitoring
    Average: 9.0
    9.1
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SecPod
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    552 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    159 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
22
Ease of Use
19
Features
17
Customer Support
14
Patch Management
14
Cons
Integration Issues
7
Expensive
6
Slow Performance
6
Missing Features
5
Dashboard Issues
4
Saner CVEM features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 9.0
9.1
Continuous Monitoring
Average: 9.0
9.1
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
SecPod
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
552 Twitter followers
LinkedIn® Page
www.linkedin.com
159 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Glasstrail Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Customer Support
    6
    Vulnerability Detection
    6
    Ease of Use
    5
    Features
    5
    Cons
    Expensive
    2
    Learning Curve
    2
    Complexity
    1
    Complex UI
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.5
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
Glasstrail Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Customer Support
6
Vulnerability Detection
6
Ease of Use
5
Features
5
Cons
Expensive
2
Learning Curve
2
Complexity
1
Complex UI
1
False Positives
1
Glasstrail features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.5
8.8
Ease of Admin
Average: 8.9
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Detectify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Automation Testing
    2
    Customizability
    2
    Features
    2
    Security
    2
    Cons
    Complexity
    1
    Complex Queries
    1
    Complex Setup
    1
    Expensive
    1
    Inaccuracy
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.5
    8.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,355 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Automation Testing
2
Customizability
2
Features
2
Security
2
Cons
Complexity
1
Complex Queries
1
Complex Setup
1
Expensive
1
Inaccuracy
1
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.5
8.7
Ease of Admin
Average: 8.9
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,355 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. Continuously discover, prioritize, and mitigate exposures with evidence-backed Attack Surface Management,

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 54% Small-Business
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Breachlock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    8
    Communication
    7
    Pentesting Efficiency
    6
    Ease of Use
    5
    Reporting Quality
    5
    Cons
    False Positives
    5
    Poor Interface Design
    3
    Expensive
    2
    Inadequate Reporting
    2
    Lack of Detail
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Breachlock features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.1
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    New York, NY
    Twitter
    @BreachLock
    270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. Continuously discover, prioritize, and mitigate exposures with evidence-backed Attack Surface Management,

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 54% Small-Business
  • 38% Mid-Market
Breachlock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
8
Communication
7
Pentesting Efficiency
6
Ease of Use
5
Reporting Quality
5
Cons
False Positives
5
Poor Interface Design
3
Expensive
2
Inadequate Reporting
2
Lack of Detail
2
Breachlock features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.1
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2019
HQ Location
New York, NY
Twitter
@BreachLock
270 Twitter followers
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
(58)4.3 out of 5
14th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VIPRE Endpoint Security Cloud Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alert Notifications
    1
    Antivirus Software
    1
    Ease of Use
    1
    Easy Installation
    1
    Easy Setup
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
    6.7
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    5.0
    Compliance Monitoring
    Average: 8.5
    8.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,333 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Security Cloud is a next-generation antivirus (NGAV) platform, a.k.a. Endpoint Protection Platform (EPP), that detects and blocks malicious activity on your Microsoft Windows and Apple

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 43% Mid-Market
VIPRE Endpoint Security Cloud Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alert Notifications
1
Antivirus Software
1
Ease of Use
1
Easy Installation
1
Easy Setup
1
Cons
This product has not yet received any negative sentiments.
VIPRE Endpoint Security Cloud features and usability ratings that predict user satisfaction
6.7
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
5.0
Compliance Monitoring
Average: 8.5
8.5
Ease of Admin
Average: 8.9
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,333 Twitter followers
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®
(51)4.8 out of 5
11th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Evolve Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Vulnerability Identification
    5
    Remediation Efficiency
    4
    Actionable Intelligence
    3
    Communication
    3
    Cons
    Difficult Navigation
    1
    Inadequate Reporting
    1
    Limited Reporting
    1
    Poor Notifications
    1
    Reporting Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evolve Security features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 9.0
    8.0
    Continuous Monitoring
    Average: 9.0
    9.0
    Compliance Monitoring
    Average: 8.5
    9.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chicago, Illinois
    Twitter
    @theevolvesec
    796 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 20% Small-Business
Evolve Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Vulnerability Identification
5
Remediation Efficiency
4
Actionable Intelligence
3
Communication
3
Cons
Difficult Navigation
1
Inadequate Reporting
1
Limited Reporting
1
Poor Notifications
1
Reporting Issues
1
Evolve Security features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 9.0
8.0
Continuous Monitoring
Average: 9.0
9.0
Compliance Monitoring
Average: 8.5
9.3
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
796 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 69% Mid-Market
    • 13% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Halo Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Easy Integrations
    4
    Features
    4
    Real-time Notifications
    4
    Security
    4
    Cons
    Difficult Navigation
    3
    Complex UI
    2
    Complexity
    1
    Complex Setup
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Halo Security features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    8.8
    Continuous Monitoring
    Average: 9.0
    8.6
    Compliance Monitoring
    Average: 8.5
    8.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Miami Beach, US
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 69% Mid-Market
  • 13% Enterprise
Halo Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Easy Integrations
4
Features
4
Real-time Notifications
4
Security
4
Cons
Difficult Navigation
3
Complex UI
2
Complexity
1
Complex Setup
1
Expensive
1
Halo Security features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
8.8
Continuous Monitoring
Average: 9.0
8.6
Compliance Monitoring
Average: 8.5
8.0
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2013
HQ Location
Miami Beach, US
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Notus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Time-saving
    2
    Automation
    1
    Cloud Management
    1
    Customer Support
    1
    Efficiency Improvement
    1
    Cons
    Update Delays
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    9.9
    Continuous Monitoring
    Average: 9.0
    9.6
    Compliance Monitoring
    Average: 8.5
    8.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Time-saving
2
Automation
1
Cloud Management
1
Customer Support
1
Efficiency Improvement
1
Cons
Update Delays
1
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
9.9
Continuous Monitoring
Average: 9.0
9.6
Compliance Monitoring
Average: 8.5
8.5
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    13
    Ease of Use
    13
    Vulnerability Detection
    13
    Features
    11
    Vulnerability Identification
    10
    Cons
    Dashboard Issues
    4
    Slow Performance
    4
    Inadequate Reporting
    3
    Limited Customization
    3
    Poor Navigation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    6.1
    Continuous Monitoring
    Average: 9.0
    5.0
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,296 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    92 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
  • Computer Software
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
13
Ease of Use
13
Vulnerability Detection
13
Features
11
Vulnerability Identification
10
Cons
Dashboard Issues
4
Slow Performance
4
Inadequate Reporting
3
Limited Customization
3
Poor Navigation
3
Edgescan features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
6.1
Continuous Monitoring
Average: 9.0
5.0
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,296 Twitter followers
LinkedIn® Page
www.linkedin.com
92 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cavelo helps businesses achieve attack surface management with automated data discovery, classification and reporting. Its cloud compatible cyber asset attack surface management (CAASM) platform conti

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 38% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cavelo features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cavelo
    Year Founded
    2021
    HQ Location
    Kitchener, CA
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cavelo helps businesses achieve attack surface management with automated data discovery, classification and reporting. Its cloud compatible cyber asset attack surface management (CAASM) platform conti

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 38% Small-Business
Cavelo features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
0.0
No information available
0.0
No information available
8.9
Ease of Admin
Average: 8.9
Seller Details
Seller
Cavelo
Year Founded
2021
HQ Location
Kitchener, CA
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Small-Business
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CODA Footprint features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.0
    9.0
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Greater Boston Area, US
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Small-Business
  • 18% Enterprise
CODA Footprint features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.0
9.0
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2015
HQ Location
Greater Boston Area, US
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®