Introducing G2.ai, the future of software buying.Try now

Best Attack Surface Management Software - Page 3

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks
Show More
Show Less

Featured Attack Surface Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Attack Surface Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
153 Listings in Attack Surface Management Available
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Offensity features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 9.0
    7.5
    Continuous Monitoring
    Average: 9.0
    7.5
    Compliance Monitoring
    Average: 8.5
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Vienna, AT
    Twitter
    @offensity
    266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Offensity is an automated vulnerability scanner helping professional IT teams identify and fix vulnerabilities. Offensity is an easy to use External Attack Surface Management solution and minimizes hu

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 27% Mid-Market
Offensity features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 9.0
7.5
Continuous Monitoring
Average: 9.0
7.5
Compliance Monitoring
Average: 8.5
9.4
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2017
HQ Location
Vienna, AT
Twitter
@offensity
266 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Vulnerability Detection
    8
    Vulnerability Identification
    6
    Customer Support
    4
    Detection
    4
    Cons
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Integration Issues
    1
    Lack of Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Vulnerability Intelligence
    Average: 9.0
    9.7
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.5
    9.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    33 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Vulnerability Detection
8
Vulnerability Identification
6
Customer Support
4
Detection
4
Cons
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Integration Issues
1
Lack of Integration
1
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Vulnerability Intelligence
Average: 9.0
9.7
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.5
9.7
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
33 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Asset Management
    2
    Customer Support
    2
    Detailed Information
    2
    Cons
    Integration Issues
    2
    Additional Costs
    1
    Complex Setup
    1
    Difficult Setup
    1
    Excessive Notifications
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    7.7
    Vulnerability Intelligence
    Average: 9.0
    7.3
    Continuous Monitoring
    Average: 9.0
    3.7
    Compliance Monitoring
    Average: 8.5
    8.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    San Francisco, US
    Twitter
    @ArmisSecurity
    2,771 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 33% Small-Business
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Asset Management
2
Customer Support
2
Detailed Information
2
Cons
Integration Issues
2
Additional Costs
1
Complex Setup
1
Difficult Setup
1
Excessive Notifications
1
Armis features and usability ratings that predict user satisfaction
7.7
Vulnerability Intelligence
Average: 9.0
7.3
Continuous Monitoring
Average: 9.0
3.7
Compliance Monitoring
Average: 8.5
8.7
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2015
HQ Location
San Francisco, US
Twitter
@ArmisSecurity
2,771 Twitter followers
LinkedIn® Page
www.linkedin.com
1,155 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,175 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,262 Twitter followers
LinkedIn® Page
www.linkedin.com
1,175 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HostedScan.com Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Affordable
    1
    Alert Notifications
    1
    Cloud Services
    1
    Communication
    1
    Cons
    Excessive Notifications
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    8.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    59 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Affordable
1
Alert Notifications
1
Cloud Services
1
Communication
1
Cons
Excessive Notifications
1
Limited Features
1
HostedScan.com features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
8.8
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
59 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Ranger is a real-time network attack surface control solution that finds and fingerprints all IP-enabled devices on your network, to deliver global visibility with zero additional agents,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Network Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detection
    1
    Easy Integrations
    1
    Efficiency Improvement
    1
    Focus
    1
    Visibility
    1
    Cons
    Complex Setup
    1
    Expensive
    1
    False Positives
    1
    Limited Customization
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Network Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    9.3
    Continuous Monitoring
    Average: 9.0
    8.8
    Compliance Monitoring
    Average: 8.5
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Ranger is a real-time network attack surface control solution that finds and fingerprints all IP-enabled devices on your network, to deliver global visibility with zero additional agents,

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 33% Mid-Market
SentinelOne Singularity Network Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detection
1
Easy Integrations
1
Efficiency Improvement
1
Focus
1
Visibility
1
Cons
Complex Setup
1
Expensive
1
False Positives
1
Limited Customization
1
Slow Performance
1
SentinelOne Singularity Network Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
9.3
Continuous Monitoring
Average: 9.0
8.8
Compliance Monitoring
Average: 8.5
10.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,749 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Onapsis is a specialized cybersecurity solution designed to help organizations secure their SAP environments while ensuring compliance with industry standards. As a leader in SAP cybersecurity, Onapsi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 24% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • The Onapsis Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    7
    Reliability
    4
    Vulnerability Detection
    4
    Customer Support
    3
    Detection
    3
    Cons
    Integration Issues
    4
    Lack of Integration
    4
    UX Design
    3
    UX Improvement
    3
    Dashboard Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • The Onapsis Platform features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.0
    9.2
    Compliance Monitoring
    Average: 8.5
    7.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Onapsis
    Company Website
    Year Founded
    2009
    HQ Location
    Boston, Massachusetts, United States
    Twitter
    @onapsis
    4,462 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    288 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Onapsis is a specialized cybersecurity solution designed to help organizations secure their SAP environments while ensuring compliance with industry standards. As a leader in SAP cybersecurity, Onapsi

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 24% Mid-Market
The Onapsis Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
7
Reliability
4
Vulnerability Detection
4
Customer Support
3
Detection
3
Cons
Integration Issues
4
Lack of Integration
4
UX Design
3
UX Improvement
3
Dashboard Issues
2
The Onapsis Platform features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.0
9.2
Compliance Monitoring
Average: 8.5
7.7
Ease of Admin
Average: 8.9
Seller Details
Seller
Onapsis
Company Website
Year Founded
2009
HQ Location
Boston, Massachusetts, United States
Twitter
@onapsis
4,462 Twitter followers
LinkedIn® Page
www.linkedin.com
288 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    8.8
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    8.9
    Compliance Monitoring
    Average: 8.5
    9.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    582 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
8.8
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
8.9
Compliance Monitoring
Average: 8.5
9.3
Ease of Admin
Average: 8.9
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
582 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 19% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brinqa features and usability ratings that predict user satisfaction
    3.9
    Vulnerability Intelligence
    Average: 9.0
    6.7
    Continuous Monitoring
    Average: 9.0
    4.4
    Compliance Monitoring
    Average: 8.5
    5.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    brinqa
    Year Founded
    2009
    HQ Location
    Austin, TX
    Twitter
    @brinqa
    487 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    104 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 19% Mid-Market
Brinqa features and usability ratings that predict user satisfaction
3.9
Vulnerability Intelligence
Average: 9.0
6.7
Continuous Monitoring
Average: 9.0
4.4
Compliance Monitoring
Average: 8.5
5.2
Ease of Admin
Average: 8.9
Seller Details
Seller
brinqa
Year Founded
2009
HQ Location
Austin, TX
Twitter
@brinqa
487 Twitter followers
LinkedIn® Page
www.linkedin.com
104 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgio Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Use
    1
    Easy Integrations
    1
    Easy Setup
    1
    Features
    1
    Cons
    CDN Limitations
    1
    Difficult Setup
    1
    Hidden Costs
    1
    Inflexible Pricing
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgio features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    7.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgio
    Year Founded
    2001
    HQ Location
    Scottsdale, Arizona
    LinkedIn® Page
    www.linkedin.com
    531 employees on LinkedIn®
    Ownership
    NASDAQ:LLNW
    Total Revenue (USD mm)
    $200
Product Description
How are these determined?Information
This description is provided by the seller.

Edgio (NASDAQ: EGIO) helps companies deliver online experiences and content faster, safer, and with more control. Our developer-friendly, globally scaled edge network, combined with our fully integrat

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Edgio Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Use
1
Easy Integrations
1
Easy Setup
1
Features
1
Cons
CDN Limitations
1
Difficult Setup
1
Hidden Costs
1
Inflexible Pricing
1
Integration Issues
1
Edgio features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
7.3
Ease of Admin
Average: 8.9
Seller Details
Seller
Edgio
Year Founded
2001
HQ Location
Scottsdale, Arizona
LinkedIn® Page
www.linkedin.com
531 employees on LinkedIn®
Ownership
NASDAQ:LLNW
Total Revenue (USD mm)
$200
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    2
    Visibility
    2
    Vulnerability Identification
    2
    Actionable Intelligence
    1
    Alert Notifications
    1
    Cons
    Dashboard Issues
    1
    Inefficient Alert System
    1
    Integration Issues
    1
    Lack of Detail
    1
    Poor Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 9.0
    9.4
    Continuous Monitoring
    Average: 9.0
    8.1
    Compliance Monitoring
    Average: 8.5
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    London, GB
    Twitter
    @RedHuntLabs
    3,644 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
2
Visibility
2
Vulnerability Identification
2
Actionable Intelligence
1
Alert Notifications
1
Cons
Dashboard Issues
1
Inefficient Alert System
1
Integration Issues
1
Lack of Detail
1
Poor Usability
1
RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 9.0
9.4
Continuous Monitoring
Average: 9.0
8.1
Compliance Monitoring
Average: 8.5
9.2
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
London, GB
Twitter
@RedHuntLabs
3,644 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
(12)4.7 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    By combining automation with expert-driven human testing, Sprocket Security delivers Continuous Penetration Testing to help businesses continuously validate their security posture and resilience. This

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sprocket Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Pentesting Efficiency
    4
    Customer Support
    3
    Ease of Use
    2
    Expertise
    2
    Remediation Efficiency
    2
    Cons
    False Positives
    2
    Poor Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sprocket Security features and usability ratings that predict user satisfaction
    9.6
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    9.2
    Compliance Monitoring
    Average: 8.5
    9.6
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Madison, US
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

By combining automation with expert-driven human testing, Sprocket Security delivers Continuous Penetration Testing to help businesses continuously validate their security posture and resilience. This

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
Sprocket Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Pentesting Efficiency
4
Customer Support
3
Ease of Use
2
Expertise
2
Remediation Efficiency
2
Cons
False Positives
2
Poor Integration
1
Sprocket Security features and usability ratings that predict user satisfaction
9.6
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
9.2
Compliance Monitoring
Average: 8.5
9.6
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2017
HQ Location
Madison, US
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DeCYFIR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    12
    Threat Intelligence
    10
    Cybersecurity
    9
    Features
    7
    Security
    7
    Cons
    Not User-Friendly
    4
    Complexity
    3
    Learning Curve
    3
    Limited Customization
    3
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeCYFIR features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    10.0
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYFIRMA
    Year Founded
    2017
    HQ Location
    Singapore, SG
    Twitter
    @cyfirma
    984 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    122 employees on LinkedIn®
    Phone
    marketing@cyfirma.com
Product Description
How are these determined?Information
This description is provided by the seller.

DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
DeCYFIR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
12
Threat Intelligence
10
Cybersecurity
9
Features
7
Security
7
Cons
Not User-Friendly
4
Complexity
3
Learning Curve
3
Limited Customization
3
Complex Setup
2
DeCYFIR features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
0.0
No information available
10.0
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
CYFIRMA
Year Founded
2017
HQ Location
Singapore, SG
Twitter
@cyfirma
984 Twitter followers
LinkedIn® Page
www.linkedin.com
122 employees on LinkedIn®
Phone
marketing@cyfirma.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ethiack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Cybersecurity
    3
    Innovation
    3
    Automation
    2
    Real-time Monitoring
    2
    Cons
    Asset Management
    2
    Expensive
    1
    Lack of Automation
    1
    Limited Features
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ethiack features and usability ratings that predict user satisfaction
    8.9
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.0
    7.2
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ethiack
    Year Founded
    2022
    HQ Location
    Coimbra, Coimbra, Portugal
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Ethiack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Cybersecurity
3
Innovation
3
Automation
2
Real-time Monitoring
2
Cons
Asset Management
2
Expensive
1
Lack of Automation
1
Limited Features
1
Missing Features
1
Ethiack features and usability ratings that predict user satisfaction
8.9
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.0
7.2
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Ethiack
Year Founded
2022
HQ Location
Coimbra, Coimbra, Portugal
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Styx Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Detailed Analysis
    4
    Ease of Use
    4
    Helpful
    4
    Efficiency
    3
    Cons
    Software Bugs
    2
    Technical Issues
    2
    Bugs
    1
    False Positives
    1
    Improvement Needed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styx Intelligence features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Vancouver, CA
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 29% Mid-Market
Styx Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Detailed Analysis
4
Ease of Use
4
Helpful
4
Efficiency
3
Cons
Software Bugs
2
Technical Issues
2
Bugs
1
False Positives
1
Improvement Needed
1
Styx Intelligence features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
0.0
No information available
0.0
No information available
8.9
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2020
HQ Location
Vancouver, CA
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®