2026 Best Software Awards are here!See the list

Best Attack Surface Management Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks
Show More
Show Less

Featured Attack Surface Management Software At A Glance

Free Plan Available:
Halo Security
Sponsored
Leader:
Easiest to Use:
Top Trending:
Show LessShow More
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
156 Listings in Attack Surface Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 64% Small-Business
    • 18% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CODA Footprint features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.1
    9.0
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Greater Boston Area, US
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CODA Footprint is an AI-driven, cloud-agnostic Attack Surface Reduction and Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 64% Small-Business
  • 18% Enterprise
CODA Footprint features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.1
9.0
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2015
HQ Location
Greater Boston Area, US
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 27% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Offensity features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 9.0
    7.5
    Continuous Monitoring
    Average: 9.1
    7.5
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 27% Small-Business
Offensity features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 9.0
7.5
Continuous Monitoring
Average: 9.1
7.5
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
262 Twitter followers
LinkedIn® Page
www.linkedin.com
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Vulnerability Detection
    8
    Vulnerability Identification
    6
    Customer Support
    4
    Detection
    4
    Cons
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Integration Issues
    1
    Lack of Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Vulnerability Intelligence
    Average: 9.0
    9.7
    Continuous Monitoring
    Average: 9.1
    9.5
    Compliance Monitoring
    Average: 8.6
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    33 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Vulnerability Detection
8
Vulnerability Identification
6
Customer Support
4
Detection
4
Cons
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Integration Issues
1
Lack of Integration
1
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Vulnerability Intelligence
Average: 9.0
9.7
Continuous Monitoring
Average: 9.1
9.5
Compliance Monitoring
Average: 8.6
9.7
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
33 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Onapsis is a specialized cybersecurity solution designed to help organizations secure their SAP environments while ensuring compliance with industry standards. As a leader in SAP cybersecurity, Onapsi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 68% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • The Onapsis Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Customer Support
    6
    Helpful
    6
    Vulnerability Detection
    5
    Detection
    4
    Cons
    Integration Issues
    4
    Lack of Integration
    4
    UX Design
    3
    UX Improvement
    3
    Dashboard Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The Onapsis Platform features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.1
    9.2
    Compliance Monitoring
    Average: 8.6
    8.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Onapsis
    Company Website
    Year Founded
    2009
    HQ Location
    Boston, Massachusetts, United States
    Twitter
    @onapsis
    4,451 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    343 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Onapsis is a specialized cybersecurity solution designed to help organizations secure their SAP environments while ensuring compliance with industry standards. As a leader in SAP cybersecurity, Onapsi

Users
No information available
Industries
No information available
Market Segment
  • 68% Enterprise
  • 18% Mid-Market
The Onapsis Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Customer Support
6
Helpful
6
Vulnerability Detection
5
Detection
4
Cons
Integration Issues
4
Lack of Integration
4
UX Design
3
UX Improvement
3
Dashboard Issues
2
The Onapsis Platform features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.1
9.2
Compliance Monitoring
Average: 8.6
8.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Onapsis
Company Website
Year Founded
2009
HQ Location
Boston, Massachusetts, United States
Twitter
@onapsis
4,451 Twitter followers
LinkedIn® Page
www.linkedin.com
343 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Enterprise
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Asset Management
    2
    Customer Support
    2
    Detailed Information
    2
    Cons
    Integration Issues
    2
    Additional Costs
    1
    Complex Setup
    1
    Difficult Setup
    1
    Excessive Notifications
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    7.7
    Vulnerability Intelligence
    Average: 9.0
    7.3
    Continuous Monitoring
    Average: 9.1
    3.7
    Compliance Monitoring
    Average: 8.6
    8.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    San Francisco, US
    Twitter
    @ArmisSecurity
    2,821 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,268 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

Users
No information available
Industries
No information available
Market Segment
  • 46% Enterprise
  • 31% Small-Business
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Asset Management
2
Customer Support
2
Detailed Information
2
Cons
Integration Issues
2
Additional Costs
1
Complex Setup
1
Difficult Setup
1
Excessive Notifications
1
Armis features and usability ratings that predict user satisfaction
7.7
Vulnerability Intelligence
Average: 9.0
7.3
Continuous Monitoring
Average: 9.1
3.7
Compliance Monitoring
Average: 8.6
8.7
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2015
HQ Location
San Francisco, US
Twitter
@ArmisSecurity
2,821 Twitter followers
LinkedIn® Page
www.linkedin.com
1,268 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,199 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,215 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,199 Twitter followers
LinkedIn® Page
www.linkedin.com
1,215 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HostedScan.com Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Communication
    1
    Customer Support
    1
    Detailed Information
    1
    Ease of Use
    1
    Information
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    59 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Communication
1
Customer Support
1
Detailed Information
1
Ease of Use
1
Information
1
Cons
This product has not yet received any negative sentiments.
HostedScan.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
59 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Ranger is a real-time network attack surface control solution that finds and fingerprints all IP-enabled devices on your network, to deliver global visibility with zero additional agents,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Network Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection
    2
    Visibility
    2
    Easy Integrations
    1
    Efficiency Improvement
    1
    Focus
    1
    Cons
    Complex Setup
    2
    Expensive
    1
    False Positives
    1
    Filtering Problems
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Network Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    9.3
    Continuous Monitoring
    Average: 9.1
    8.8
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    57,217 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,171 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Ranger is a real-time network attack surface control solution that finds and fingerprints all IP-enabled devices on your network, to deliver global visibility with zero additional agents,

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 33% Mid-Market
SentinelOne Singularity Network Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection
2
Visibility
2
Easy Integrations
1
Efficiency Improvement
1
Focus
1
Cons
Complex Setup
2
Expensive
1
False Positives
1
Filtering Problems
1
Limited Customization
1
SentinelOne Singularity Network Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
9.3
Continuous Monitoring
Average: 9.1
8.8
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
57,217 Twitter followers
LinkedIn® Page
www.linkedin.com
3,171 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.1
    8.9
    Compliance Monitoring
    Average: 8.6
    9.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    576 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.1
8.9
Compliance Monitoring
Average: 8.6
9.3
Ease of Admin
Average: 8.9
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
576 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brinqa features and usability ratings that predict user satisfaction
    3.9
    Vulnerability Intelligence
    Average: 9.0
    6.7
    Continuous Monitoring
    Average: 9.1
    4.4
    Compliance Monitoring
    Average: 8.6
    5.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    brinqa
    Year Founded
    2009
    HQ Location
    Austin, TX
    Twitter
    @brinqa
    483 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    106 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 19% Mid-Market
Brinqa features and usability ratings that predict user satisfaction
3.9
Vulnerability Intelligence
Average: 9.0
6.7
Continuous Monitoring
Average: 9.1
4.4
Compliance Monitoring
Average: 8.6
5.2
Ease of Admin
Average: 8.9
Seller Details
Seller
brinqa
Year Founded
2009
HQ Location
Austin, TX
Twitter
@brinqa
483 Twitter followers
LinkedIn® Page
www.linkedin.com
106 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Features
    1
    Cons
    CDN Limitations
    1
    Difficult Setup
    1
    Hidden Costs
    1
    Inflexible Pricing
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgio
    Year Founded
    2001
    HQ Location
    Scottsdale, Arizona
    LinkedIn® Page
    www.linkedin.com
    486 employees on LinkedIn®
    Ownership
    NASDAQ:LLNW
    Total Revenue (USD mm)
    $200
Product Description
How are these determined?Information
This description is provided by the seller.

Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Edgio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Features
1
Cons
CDN Limitations
1
Difficult Setup
1
Hidden Costs
1
Inflexible Pricing
1
Integration Issues
1
Edgio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.3
Ease of Admin
Average: 8.9
Seller Details
Seller
Edgio
Year Founded
2001
HQ Location
Scottsdale, Arizona
LinkedIn® Page
www.linkedin.com
486 employees on LinkedIn®
Ownership
NASDAQ:LLNW
Total Revenue (USD mm)
$200
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    2
    Visibility
    2
    Vulnerability Identification
    2
    Actionable Intelligence
    1
    Alert Notifications
    1
    Cons
    Dashboard Issues
    1
    Inefficient Alert System
    1
    Integration Issues
    1
    Lack of Detail
    1
    Poor Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 9.0
    9.4
    Continuous Monitoring
    Average: 9.1
    8.1
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    London, GB
    Twitter
    @RedHuntLabs
    3,637 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
2
Visibility
2
Vulnerability Identification
2
Actionable Intelligence
1
Alert Notifications
1
Cons
Dashboard Issues
1
Inefficient Alert System
1
Integration Issues
1
Lack of Detail
1
Poor Usability
1
RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 9.0
9.4
Continuous Monitoring
Average: 9.1
8.1
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
London, GB
Twitter
@RedHuntLabs
3,637 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    By combining automation with expert-driven human testing, Sprocket Security delivers Continuous Penetration Testing to help businesses continuously validate their security posture and resilience. This

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sprocket Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Pentesting Efficiency
    5
    Customer Support
    3
    Ease of Use
    3
    Expertise
    2
    Remediation Efficiency
    2
    Cons
    False Positives
    2
    Expensive
    1
    Limited Scope
    1
    Poor Customer Support
    1
    Poor Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sprocket Security features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.1
    9.2
    Compliance Monitoring
    Average: 8.6
    9.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Madison, US
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

By combining automation with expert-driven human testing, Sprocket Security delivers Continuous Penetration Testing to help businesses continuously validate their security posture and resilience. This

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
Sprocket Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Pentesting Efficiency
5
Customer Support
3
Ease of Use
3
Expertise
2
Remediation Efficiency
2
Cons
False Positives
2
Expensive
1
Limited Scope
1
Poor Customer Support
1
Poor Integration
1
Sprocket Security features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.1
9.2
Compliance Monitoring
Average: 8.6
9.6
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2017
HQ Location
Madison, US
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DeCYFIR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    12
    Threat Intelligence
    10
    Cybersecurity
    9
    Features
    7
    Security
    7
    Cons
    Not User-Friendly
    4
    Complexity
    3
    Learning Curve
    3
    Limited Customization
    3
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeCYFIR features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    10.0
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYFIRMA
    Year Founded
    2017
    HQ Location
    Singapore, SG
    Twitter
    @cyfirma
    1,002 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
    Phone
    marketing@cyfirma.com
Product Description
How are these determined?Information
This description is provided by the seller.

DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
DeCYFIR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
12
Threat Intelligence
10
Cybersecurity
9
Features
7
Security
7
Cons
Not User-Friendly
4
Complexity
3
Learning Curve
3
Limited Customization
3
Complex Setup
2
DeCYFIR features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
0.0
No information available
10.0
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
CYFIRMA
Year Founded
2017
HQ Location
Singapore, SG
Twitter
@cyfirma
1,002 Twitter followers
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
Phone
marketing@cyfirma.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ethiack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Cybersecurity
    3
    Innovation
    3
    Automation
    2
    Real-time Monitoring
    2
    Cons
    Asset Management
    2
    Expensive
    1
    Lack of Automation
    1
    Limited Features
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ethiack features and usability ratings that predict user satisfaction
    8.9
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.1
    7.2
    Compliance Monitoring
    Average: 8.6
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ethiack
    Year Founded
    2022
    HQ Location
    Coimbra, Coimbra, Portugal
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Ethiack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Cybersecurity
3
Innovation
3
Automation
2
Real-time Monitoring
2
Cons
Asset Management
2
Expensive
1
Lack of Automation
1
Limited Features
1
Missing Features
1
Ethiack features and usability ratings that predict user satisfaction
8.9
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.1
7.2
Compliance Monitoring
Average: 8.6
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Ethiack
Year Founded
2022
HQ Location
Coimbra, Coimbra, Portugal
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®