2026 Best Software Awards are here!See the list

Best Attack Surface Management Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks
Show More
Show Less

Featured Attack Surface Management Software At A Glance

Free Plan Available:
Intruder
Sponsored
Leader:
Easiest to Use:
Top Trending:
Show LessShow More
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
156 Listings in Attack Surface Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hunto AI is an agentic, 100% autonomous platform purpose-built for monitoring and quantifying your external threats. We proactively monitor external assets, detect real-world brand impersonation and f

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hunto AI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hunto AI
    Year Founded
    2023
    HQ Location
    Melbourne, AU
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hunto AI is an agentic, 100% autonomous platform purpose-built for monitoring and quantifying your external threats. We proactively monitor external assets, detect real-world brand impersonation and f

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 25% Small-Business
Hunto AI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.2
Ease of Admin
Average: 8.9
Seller Details
Seller
Hunto AI
Year Founded
2023
HQ Location
Melbourne, AU
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Styx Intelligence Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    7
    Detailed Analysis
    4
    Ease of Use
    4
    Helpful
    4
    Efficiency
    3
    Cons
    Software Bugs
    2
    Technical Issues
    2
    Bugs
    1
    False Positives
    1
    Improvement Needed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Styx Intelligence features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    8.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Vancouver, CA
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Styx Intelligence is an AI-powered, unified, purpose-built platform to protect your brand’s reputation, trust, and identity from cyber threats. We monitor your digital footprint — domains, executives,

Users
No information available
Industries
No information available
Market Segment
  • 71% Enterprise
  • 29% Mid-Market
Styx Intelligence Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
7
Detailed Analysis
4
Ease of Use
4
Helpful
4
Efficiency
3
Cons
Software Bugs
2
Technical Issues
2
Bugs
1
False Positives
1
Improvement Needed
1
Styx Intelligence features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
0.0
No information available
0.0
No information available
8.9
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2020
HQ Location
Vancouver, CA
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Truzta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    29
    Customer Support
    25
    Compliance
    19
    Ease of Use
    15
    Automation
    14
    Cons
    Integration Issues
    6
    Improvement Needed
    4
    Limitations
    3
    Limited Scope
    3
    UX Improvement
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Truzta features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.1
    10.0
    Compliance Monitoring
    Average: 8.6
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    29 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Mid-Market
  • 37% Small-Business
Truzta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
29
Customer Support
25
Compliance
19
Ease of Use
15
Automation
14
Cons
Integration Issues
6
Improvement Needed
4
Limitations
3
Limited Scope
3
UX Improvement
3
Truzta features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.1
10.0
Compliance Monitoring
Average: 8.6
9.2
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2021
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
29 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Axonius is the cybersecurity asset management platform that lets IT and Security teams see devices for what they are in order to manage and secure all.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Axonius Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Features
    1
    Useful
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axonius features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    8.9
    Continuous Monitoring
    Average: 9.1
    6.7
    Compliance Monitoring
    Average: 8.6
    7.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Axonius
    Year Founded
    2017
    HQ Location
    New York, New York, United States
    Twitter
    @AxoniusInc
    1,846 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    764 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Axonius is the cybersecurity asset management platform that lets IT and Security teams see devices for what they are in order to manage and secure all.

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Axonius Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Features
1
Useful
1
Cons
This product has not yet received any negative sentiments.
Axonius features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
8.9
Continuous Monitoring
Average: 9.1
6.7
Compliance Monitoring
Average: 8.6
7.8
Ease of Admin
Average: 8.9
Seller Details
Seller
Axonius
Year Founded
2017
HQ Location
New York, New York, United States
Twitter
@AxoniusInc
1,846 Twitter followers
LinkedIn® Page
www.linkedin.com
764 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 83% Mid-Market
    • 17% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ImmuniWeb Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    2
    Monitoring Efficiency
    2
    Alert Notifications
    1
    Dark Web Monitoring
    1
    Detection
    1
    Cons
    Integration Issues
    1
    Lack of Integration
    1
    Limited Flexibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.1
    9.2
    Compliance Monitoring
    Average: 8.6
    8.9
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    Geneva, CH
    Twitter
    @immuniweb
    8,502 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

Users
No information available
Industries
No information available
Market Segment
  • 83% Mid-Market
  • 17% Small-Business
ImmuniWeb Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
2
Monitoring Efficiency
2
Alert Notifications
1
Dark Web Monitoring
1
Detection
1
Cons
Integration Issues
1
Lack of Integration
1
Limited Flexibility
1
ImmuniWeb Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.1
9.2
Compliance Monitoring
Average: 8.6
8.9
Ease of Admin
Average: 8.9
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
Geneva, CH
Twitter
@immuniweb
8,502 Twitter followers
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JupiterOne Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Technology
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JupiterOne features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Durham, US
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
JupiterOne Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Technology
1
Security
1
Cons
This product has not yet received any negative sentiments.
JupiterOne features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 8.9
Seller Details
HQ Location
Durham, US
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    14,270 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    168 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
0.0
No information available
0.0
No information available
9.2
Ease of Admin
Average: 8.9
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
14,270 Twitter followers
LinkedIn® Page
www.linkedin.com
168 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetSPI PTaaS is a type of penetration testing as a service (PTaaS) solution designed to help organizations identify and remediate vulnerabilities within their systems, applications, and networks. This

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NetSPI Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Expertise
    4
    Team Quality
    4
    Communication
    3
    Ease of Use
    3
    Service Quality
    3
    Cons
    Difficult Navigation
    1
    False Positives
    1
    Information Management
    1
    Lack of Detail
    1
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetSPI features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetSPI
    Company Website
    Year Founded
    2001
    HQ Location
    Minneapolis, MN
    Twitter
    @NetSPI
    4,043 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    592 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetSPI PTaaS is a type of penetration testing as a service (PTaaS) solution designed to help organizations identify and remediate vulnerabilities within their systems, applications, and networks. This

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 36% Mid-Market
NetSPI Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Expertise
4
Team Quality
4
Communication
3
Ease of Use
3
Service Quality
3
Cons
Difficult Navigation
1
False Positives
1
Information Management
1
Lack of Detail
1
Lack of Information
1
NetSPI features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
9.4
Ease of Admin
Average: 8.9
Seller Details
Seller
NetSPI
Company Website
Year Founded
2001
HQ Location
Minneapolis, MN
Twitter
@NetSPI
4,043 Twitter followers
LinkedIn® Page
www.linkedin.com
592 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Detection
    1
    Detection Efficiency
    1
    Security
    1
    Threat Detection
    1
    Cons
    Limited Features
    3
    Complexity
    2
    Asset Management
    1
    Expensive
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable OT Security features and usability ratings that predict user satisfaction
    7.8
    Vulnerability Intelligence
    Average: 9.0
    8.9
    Continuous Monitoring
    Average: 9.1
    6.7
    Compliance Monitoring
    Average: 8.6
    7.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,453 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,357 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Tenable OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Detection
1
Detection Efficiency
1
Security
1
Threat Detection
1
Cons
Limited Features
3
Complexity
2
Asset Management
1
Expensive
1
Inadequate Reporting
1
Tenable OT Security features and usability ratings that predict user satisfaction
7.8
Vulnerability Intelligence
Average: 9.0
8.9
Continuous Monitoring
Average: 9.1
6.7
Compliance Monitoring
Average: 8.6
7.5
Ease of Admin
Average: 8.9
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,453 Twitter followers
LinkedIn® Page
www.linkedin.com
2,357 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Risk Quantifier (RQ) translates cyber risk into clear financial terms, allowing security leaders to prioritize defenses and communicate impact in the language of business. By mapping MITRE ATT&CK

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect Risk Quantifier Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Easy Integrations
    1
    Platform Usability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect Risk Quantifier features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 9.0
    9.4
    Continuous Monitoring
    Average: 9.1
    10.0
    Compliance Monitoring
    Average: 8.6
    8.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,223 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Risk Quantifier (RQ) translates cyber risk into clear financial terms, allowing security leaders to prioritize defenses and communicate impact in the language of business. By mapping MITRE ATT&CK

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
ThreatConnect Risk Quantifier Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Easy Integrations
1
Platform Usability
1
Security
1
Cons
This product has not yet received any negative sentiments.
ThreatConnect Risk Quantifier features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 9.0
9.4
Continuous Monitoring
Average: 9.1
10.0
Compliance Monitoring
Average: 8.6
8.3
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,223 Twitter followers
LinkedIn® Page
www.linkedin.com
155 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AttackMetricX is an AI-driven Cyber Threat Exposure Management (CTEM) platform that provides organizations with continuous visibility into their external digital risk landscape. The platform enables

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Attackmetricx features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.1
    0.0
    No information available
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymetricx
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AttackMetricX is an AI-driven Cyber Threat Exposure Management (CTEM) platform that provides organizations with continuous visibility into their external digital risk landscape. The platform enables

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Attackmetricx features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.1
0.0
No information available
9.4
Ease of Admin
Average: 8.9
Seller Details
Seller
Cymetricx
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censys Attack Surface Management features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    9.4
    Continuous Monitoring
    Average: 9.1
    8.3
    Compliance Monitoring
    Average: 8.6
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censys
    Year Founded
    2017
    HQ Location
    Ann Arbor, MI
    Twitter
    @censysio
    11,935 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize,

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Censys Attack Surface Management features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
9.4
Continuous Monitoring
Average: 9.1
8.3
Compliance Monitoring
Average: 8.6
9.4
Ease of Admin
Average: 8.9
Seller Details
Seller
Censys
Year Founded
2017
HQ Location
Ann Arbor, MI
Twitter
@censysio
11,935 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyCognito features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.1
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Year Founded
    2017
    HQ Location
    Palo Alto, California, United States
    Twitter
    @CyCognito
    10,395 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
CyCognito features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.1
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 8.9
Seller Details
Seller
CyCognito
Year Founded
2017
HQ Location
Palo Alto, California, United States
Twitter
@CyCognito
10,395 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hacknoid Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    1
    Customization Control
    1
    Risk Management
    1
    Scanning Efficiency
    1
    Scanning Technology
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hacknoid features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.1
    10.0
    Compliance Monitoring
    Average: 8.6
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hacknoid
    Year Founded
    2013
    HQ Location
    Montevideo, UY
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
Hacknoid Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
1
Customization Control
1
Risk Management
1
Scanning Efficiency
1
Scanning Technology
1
Cons
This product has not yet received any negative sentiments.
Hacknoid features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.1
10.0
Compliance Monitoring
Average: 8.6
10.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Hacknoid
Year Founded
2013
HQ Location
Montevideo, UY
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Identify the Security Score associated with any Android Mobile App on your phone.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudSEK BeVigil Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Navigation Ease
    1
    Vulnerability Detection
    1
    Cons
    Dashboard Issues
    1
    False Positives
    1
    Reporting Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK BeVigil features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,385 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    231 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Identify the Security Score associated with any Android Mobile App on your phone.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
CloudSEK BeVigil Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Navigation Ease
1
Vulnerability Detection
1
Cons
Dashboard Issues
1
False Positives
1
Reporting Issues
1
CloudSEK BeVigil features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 8.9
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,385 Twitter followers
LinkedIn® Page
www.linkedin.com
231 employees on LinkedIn®