Introducing G2.ai, the future of software buying.Try now

Best Attack Surface Management Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Attack surface management software is used to continuously monitor networks, assets, cloud services and other artifacts to identify, address, and remediate vulnerabilities. These tools automate numerous tasks and aid in prioritizing impactful threats and vulnerabilities to minimize risk. These tools also expand on the functionality of code-focused vulnerability management tools to address infrastructural and other internet-facing assets.

Modern applications and computing environments create numerous threat vectors that allow attackers to gain system access and/or impact performance. Attack surface management solutions aim to provide a real-time analysis of network and cloud assets for misconfigurations, weak passwords, shadow IT, and myriad other vectors. Once known and tracked, companies integrate threat data into other security solutions, automate remediation and continuously update network defenses as threats emerge.

To qualify for inclusion in the Attack Surface Management category, a product must:

Monitor network, cloud, and application components for vulnerabilities
Automate discovery of IPv4, IPv6, Cloud, and IoT Assets
Provide risk-based prioritization for remediation
Facilitate remediation efforts based on prioritized risks
Show More
Show Less

Featured Attack Surface Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Attack Surface Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
153 Listings in Attack Surface Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 47% Mid-Market
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Truzta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    27
    Customer Support
    24
    Compliance
    17
    Compliance Support
    13
    Ease of Use
    13
    Cons
    Integration Issues
    6
    Improvement Needed
    3
    Limitations
    3
    Limited Scope
    3
    Cloud Dependency
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Truzta features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.5
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    36 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Truzta is an AI-powered Compliance Automation & Security Platform that simplifies regulatory compliance and strengthens cybersecurity with proactive risk management. It automates SOC 2, ISO 27

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 47% Mid-Market
  • 40% Small-Business
Truzta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
27
Customer Support
24
Compliance
17
Compliance Support
13
Ease of Use
13
Cons
Integration Issues
6
Improvement Needed
3
Limitations
3
Limited Scope
3
Cloud Dependency
2
Truzta features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.5
9.2
Ease of Admin
Average: 8.9
Seller Details
Company Website
Year Founded
2021
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
36 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 17% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JupiterOne Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Technology
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JupiterOne features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Durham, US
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JupiterOne is a leading cybersecurity company specializing in cyber asset and attack surface management. Customers use the JupiterOne platform to connect the dots between all assets, people, and risks

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 17% Enterprise
JupiterOne Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Technology
1
Security
1
Cons
This product has not yet received any negative sentiments.
JupiterOne features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
10.0
Ease of Admin
Average: 8.9
Seller Details
HQ Location
Durham, US
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Maltego features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    0.0
    No information available
    0.0
    No information available
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Maltego
    Year Founded
    2017
    HQ Location
    Munich, DE
    Twitter
    @MaltegoHQ
    14,134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    125 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maltego is the world’s most widely used cyber investigation platform, offering an all-in-one solution for both quick OSINT investigations and complex link analysis of large datasets with seamless data

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 27% Mid-Market
Maltego features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
0.0
No information available
0.0
No information available
9.2
Ease of Admin
Average: 8.9
Seller Details
Seller
Maltego
Year Founded
2017
HQ Location
Munich, DE
Twitter
@MaltegoHQ
14,134 Twitter followers
LinkedIn® Page
www.linkedin.com
125 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Risk Quantifier (RQ) translates cyber risk into clear financial terms, allowing security leaders to prioritize defenses and communicate impact in the language of business. By mapping MITRE ATT&CK

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect Risk Quantifier Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Ease of Use
    2
    Easy Integrations
    1
    Platform Usability
    1
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect Risk Quantifier features and usability ratings that predict user satisfaction
    9.4
    Vulnerability Intelligence
    Average: 9.0
    9.4
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.5
    8.3
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Risk Quantifier (RQ) translates cyber risk into clear financial terms, allowing security leaders to prioritize defenses and communicate impact in the language of business. By mapping MITRE ATT&CK

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
ThreatConnect Risk Quantifier Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Ease of Use
2
Easy Integrations
1
Platform Usability
1
Security
1
Cons
This product has not yet received any negative sentiments.
ThreatConnect Risk Quantifier features and usability ratings that predict user satisfaction
9.4
Vulnerability Intelligence
Average: 9.0
9.4
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.5
8.3
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,266 Twitter followers
LinkedIn® Page
www.linkedin.com
162 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Axonius is the cybersecurity asset management platform that lets IT and Security teams see devices for what they are in order to manage and secure all.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Axonius Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Features
    1
    Useful
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Axonius features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.0
    6.7
    Compliance Monitoring
    Average: 8.5
    7.8
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Axonius
    Year Founded
    2017
    HQ Location
    New York, New York, United States
    Twitter
    @AxoniusInc
    1,854 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    764 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Axonius is the cybersecurity asset management platform that lets IT and Security teams see devices for what they are in order to manage and secure all.

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Axonius Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Features
1
Useful
1
Cons
This product has not yet received any negative sentiments.
Axonius features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.0
6.7
Compliance Monitoring
Average: 8.5
7.8
Ease of Admin
Average: 8.9
Seller Details
Seller
Axonius
Year Founded
2017
HQ Location
New York, New York, United States
Twitter
@AxoniusInc
1,854 Twitter followers
LinkedIn® Page
www.linkedin.com
764 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Censys Attack Surface Management features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    9.4
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.5
    9.4
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Censys
    Year Founded
    2017
    HQ Location
    Ann Arbor, MI
    Twitter
    @censysio
    11,194 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    154 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Censys’ Exposure Management solution arms organizations a real-time, contextualized view into all of their internet and cloud assets. This information empowers security teams to aggregate, prioritize,

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Censys Attack Surface Management features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
9.4
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.5
9.4
Ease of Admin
Average: 8.9
Seller Details
Seller
Censys
Year Founded
2017
HQ Location
Ann Arbor, MI
Twitter
@censysio
11,194 Twitter followers
LinkedIn® Page
www.linkedin.com
154 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyCognito features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.5
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Year Founded
    2017
    HQ Location
    Palo Alto, California, United States
    Twitter
    @CyCognito
    10,442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
CyCognito features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.5
10.0
Ease of Admin
Average: 8.9
Seller Details
Seller
CyCognito
Year Founded
2017
HQ Location
Palo Alto, California, United States
Twitter
@CyCognito
10,442 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ImmuniWeb Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    2
    Monitoring Efficiency
    2
    Alert Notifications
    1
    Dark Web Monitoring
    1
    Detection
    1
    Cons
    Integration Issues
    1
    Lack of Integration
    1
    Limited Flexibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Discovery features and usability ratings that predict user satisfaction
    8.3
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.5
    9.2
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    Geneva, CH
    Twitter
    @immuniweb
    8,534 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ImmuniWeb Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
2
Monitoring Efficiency
2
Alert Notifications
1
Dark Web Monitoring
1
Detection
1
Cons
Integration Issues
1
Lack of Integration
1
Limited Flexibility
1
ImmuniWeb Discovery features and usability ratings that predict user satisfaction
8.3
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.5
9.2
Ease of Admin
Average: 8.9
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
Geneva, CH
Twitter
@immuniweb
8,534 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable OT Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Security
    1
    Threat Detection
    1
    Vulnerability Detection
    1
    Cons
    Limited Features
    2
    Asset Management
    1
    Complexity
    1
    Limited Detection
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable OT Security features and usability ratings that predict user satisfaction
    7.8
    Vulnerability Intelligence
    Average: 9.0
    8.9
    Continuous Monitoring
    Average: 9.0
    6.7
    Compliance Monitoring
    Average: 8.5
    7.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,340 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and net

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tenable OT Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Security
1
Threat Detection
1
Vulnerability Detection
1
Cons
Limited Features
2
Asset Management
1
Complexity
1
Limited Detection
1
Missing Features
1
Tenable OT Security features and usability ratings that predict user satisfaction
7.8
Vulnerability Intelligence
Average: 9.0
8.9
Continuous Monitoring
Average: 9.0
6.7
Compliance Monitoring
Average: 8.5
7.5
Ease of Admin
Average: 8.9
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,340 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM). FireCompass continuously indexes and monitors the deep, dark, and surface webs using nat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FireCompass Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring Efficiency
    1
    Security
    1
    Cons
    Bugs
    1
    Technical Glitches
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FireCompass features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    8.3
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.5
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Boston, Massachusetts, United States
    LinkedIn® Page
    www.linkedin.com
    83 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FireCompass is a SaaS platform for Continuous Automated Red Teaming (CART) and Attack Surface Management (ASM). FireCompass continuously indexes and monitors the deep, dark, and surface webs using nat

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
FireCompass Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring Efficiency
1
Security
1
Cons
Bugs
1
Technical Glitches
1
FireCompass features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
8.3
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.5
10.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2019
HQ Location
Boston, Massachusetts, United States
LinkedIn® Page
www.linkedin.com
83 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    6.7
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.5
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Acworth, US
    Twitter
    @fortifydata
    91 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
6.7
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.5
10.0
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2015
HQ Location
Acworth, US
Twitter
@fortifydata
91 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hacknoid Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    1
    Customization Control
    1
    Risk Management
    1
    Scanning Efficiency
    1
    Scanning Technology
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hacknoid features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    10.0
    Compliance Monitoring
    Average: 8.5
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hacknoid
    Year Founded
    2013
    HQ Location
    Montevideo, UY
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 50% Mid-Market
Hacknoid Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
1
Customization Control
1
Risk Management
1
Scanning Efficiency
1
Scanning Technology
1
Cons
This product has not yet received any negative sentiments.
Hacknoid features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
10.0
Compliance Monitoring
Average: 8.5
10.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Hacknoid
Year Founded
2013
HQ Location
Montevideo, UY
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Holm Security VMP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Aware
    1
    Awareness Increase
    1
    Innovation
    1
    Scanning Efficiency
    1
    Cons
    False Positives
    1
    Scanning Issues
    1
    Technical Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    6.7
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Aware
1
Awareness Increase
1
Innovation
1
Scanning Efficiency
1
Cons
False Positives
1
Scanning Issues
1
Technical Issues
1
Holm Security VMP features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
6.7
Ease of Admin
Average: 8.9
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
Entry Level Price:Starting at $129.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Panop is a Extended Security Posture Management Platform It enables customers to understand in minutes their degree of exposure to external attacks, classify the findings according to their risk appe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Panop Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    2
    Vulnerability Detection
    2
    Communication
    1
    Customization
    1
    Detection
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Panop features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.5
    10.0
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Panop SA
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Panop is a Extended Security Posture Management Platform It enables customers to understand in minutes their degree of exposure to external attacks, classify the findings according to their risk appe

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Panop Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
2
Vulnerability Detection
2
Communication
1
Customization
1
Detection
1
Cons
This product has not yet received any negative sentiments.
Panop features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.5
10.0
Ease of Admin
Average: 8.9
Seller Details
Seller
Panop SA
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Quantum Armor features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    New York, US
    Twitter
    @SilentBreach
    4,802 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Quantum Armor is an Attack Surface Management (ASM) platform. It lets your company have an instant snapshot of your cyber security posture and provides tips to reduce your exposure to potential data b

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
Quantum Armor features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2017
HQ Location
New York, US
Twitter
@SilentBreach
4,802 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®