# Best Enterprise  Attack Surface Management Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Attack Surface Management category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Attack Surface Management to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Attack Surface Management category.

In addition to qualifying for inclusion in the Attack Surface Management Software category, to qualify for inclusion in the Enterprise Business Attack Surface Management Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 161


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 5,100+ Authentic Reviews
- 161+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### Intruder

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent breaches. Unifying Attack Surface Management, Vulnerability Management and Cloud security into one powerful, easy to use platform, Intruder simplifies the complex task of securing an ever-expanding attack surface. Recognizing no two business are alike, Intruder provides real-time, accurate scanning combined with intelligent risk prioritization, ensuring businesses focus on the exposures that are most relevant to them. And our proactive approach limits the window of risk, continuously monitoring for new threats while eliminating the noise that slows teams down. Whether you&#39;re an IT Manager, in DevOps or a CISO, Intruder&#39;s easy setup and context-driven approach will free you up to focus on exposures that cause real breaches, not just technical vulnerabilities. Keeping you one step ahead of attackers.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2832&amp;secure%5Bdisplayable_resource_id%5D=2832&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2832&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=27706&amp;secure%5Bresource_id%5D=2832&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fattack-surface-management%3Fpage%3D5&amp;secure%5Btoken%5D=b38ce1e3520e082c3e055e2596b4f6c224bcef766f0ab27115494d1d3ad35d01&amp;secure%5Burl%5D=https%3A%2F%2Fwww.intruder.io%2F%3Futm_source%3Dg2%26utm_medium%3Dp_referral%26utm_campaign%3Dglobal%7Cfixed%7Cg2_clicks_2025&amp;secure%5Burl_type%5D=free_trial)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
  Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the development lifecycle, empowering them to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) consolidates CSPM, KSPM, CWPP, Vulnerability management, IaC scanning, CIEM, DSPM into a single platform. Wiz drives visibility, risk prioritization, and business agility. Protecting Your Cloud Environments Requires a Unified, Cloud Native Platform. Wiz connects to every cloud environment, scans every layer, and covers every aspect of your cloud security - including elements that normally require installing agents. Its comprehensive approach has all of these cloud security solutions built in. Hundreds of organizations worldwide, including 50 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman &amp; Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 772

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.0/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.0/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Wiz](https://www.g2.com/sellers/wiz-76a0133b-42e5-454e-b5da-860e503471db)
- **Company Website:** https://www.wiz.io/
- **Year Founded:** 2020
- **HQ Location:** New York, US
- **Twitter:** @wiz_io (22,550 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/wizsecurity/ (3,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CISO, Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 54% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Security (107 reviews)
- Ease of Use (104 reviews)
- Visibility (87 reviews)
- Easy Setup (68 reviews)

**Cons:**

- Improvement Needed (35 reviews)
- Feature Limitations (34 reviews)
- Learning Curve (34 reviews)
- Improvements Needed (29 reviews)
- Complexity (27 reviews)

### 2. [CloudSEK](https://www.g2.com/products/cloudsek/reviews)
  CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give context to our customers’ digital risks.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 132

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 9.0/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.6/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 9.4/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.6/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [CloudSEK](https://www.g2.com/sellers/cloudsek)
- **Year Founded:** 2015
- **HQ Location:** Singapore, SG
- **Twitter:** @cloudsek (2,417 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cloudsek/ (231 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Analyst
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 52% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (53 reviews)
- Monitoring (47 reviews)
- Customer Support (44 reviews)
- Features (42 reviews)
- Threat Intelligence (34 reviews)

**Cons:**

- False Positives (36 reviews)
- Inefficient Alerts (22 reviews)
- Dashboard Issues (16 reviews)
- Inefficient Alert System (15 reviews)
- Complex UI (8 reviews)

### 3. [Check Point Exposure Management](https://www.g2.com/products/check-point-exposure-management/reviews)
  Exposure Management isn’t just a buzzword, it’s the future of cybersecurity. Attackers move fast, exploiting misconfigurations, leaked credentials, and control gaps before patch cycles even start. Traditional tools give you dashboards and alerts, but visibility without action is just noise. Check Point’s latest innovation changes the game. By combining billions of internal telemetry points from Check Point’s global footprint with billions of external signals from the open, deep, and dark web via Cyberint, we deliver a Unified Intelligence Fabric that provides complete clarity across your attack surface. The industry is moving from fragmented feeds to real context on what’s an actual priority. Further prioritization is enabled through active validation of the threats, confirmation of compensating controls and deduplication of alerts between tools. Then, with Veriti’s safe-by-design remediation, we’re not just assigning tickets to the ether. Fixes are actually implemented. Every fix is validated before enforcement, meaning exposures are remediated without downtime, and risk reduction becomes measurable. Gartner predicts organizations adopting CTEM with mobilization will see 50% fewer successful attacks by 2028, and we’re leading that charge with action, not just tickets. Ready to see how exposure management done right looks? Get a 15-minute demo and experience preemptive security in action \&gt; https://l.cyberint.com/em-demo


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 8.8/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 8.7/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 8.3/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.1/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,978 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Threat Analyst, Cyber Security Analyst
  - **Top Industries:** Banking, Financial Services
  - **Company Size:** 69% Enterprise, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Threat Intelligence (63 reviews)
- Threat Detection (52 reviews)
- Insights (41 reviews)
- Customer Support (39 reviews)

**Cons:**

- Inefficient Alerts (21 reviews)
- False Positives (15 reviews)
- Inefficient Alert System (15 reviews)
- Integration Issues (11 reviews)
- Limited Features (11 reviews)

### 4. [Recorded Future](https://www.g2.com/products/recorded-future/reviews)
  Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,900 businesses and government organizations across 80 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 218

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 8.6/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 7.9/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 7.6/10 (Category avg: 8.6/10)
- **Ease of Admin:** 8.5/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Recorded Future](https://www.g2.com/sellers/recorded-future)
- **Company Website:** https://www.recordedfuture.com
- **Year Founded:** 2009
- **HQ Location:** Somerville, US
- **Twitter:** @RecordedFuture (108,201 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/678036/ (1,149 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Threat Intelligence Analyst, Cyber Threat Intelligence Analyst
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 68% Enterprise, 19% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (100 reviews)
- Features (96 reviews)
- Threat Intelligence (68 reviews)
- Threat Detection (65 reviews)
- Insights (64 reviews)

**Cons:**

- Complexity (38 reviews)
- Expensive (36 reviews)
- Learning Curve (30 reviews)
- Insufficient Information (26 reviews)
- Difficult Learning (25 reviews)

### 5. [SOCRadar Extended Threat Intelligence](https://www.g2.com/products/socradar-extended-threat-intelligence/reviews)
  Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar empowers security teams with our groundbreaking Extended Threat Intelligence (XTI) platform and is leading the charge toward the future with Agentic Threat Intelligence (ATI). What does SOCRadar do? At its core, SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain. We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business. By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. Our holistic approach offers a streamlined, modular experience, providing a complete, real-time view of your threat landscape to help you stay ahead of attackers. Our vision for Agentic Threat Intelligence (ATI) goes beyond today&#39;s chatbots and LLMs. We are focused on making it practical for security teams to use AI agents to solve real-world problems. Our initiative will empower you to either deploy pre-built agents or easily create your own, leveraging deep integrations to automate complex tasks that were previously difficult to perform accurately. SOCRadar is dedicated to pioneering this change, making autonomous security an accessible reality for your team.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 100

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 9.2/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.2/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 8.4/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.2/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [SOCRadar ](https://www.g2.com/sellers/socradar)
- **Company Website:** https://socradar.io
- **Year Founded:** 2018
- **HQ Location:** Delaware
- **Twitter:** @socradar (5,688 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/socradar (195 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Computer &amp; Network Security
  - **Company Size:** 42% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (27 reviews)
- Threat Intelligence (25 reviews)
- Alerts (20 reviews)
- Insights (19 reviews)
- Monitoring (19 reviews)

**Cons:**

- Inefficient Alerts (10 reviews)
- Inefficient Alert System (10 reviews)
- False Positives (8 reviews)
- Insufficient Information (7 reviews)
- Limited Features (7 reviews)

### 6. [Cyble](https://www.g2.com/products/cyble/reviews)
  Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging advanced agentic AI and processing vast amounts of data, Cyble empowers businesses to navigate the complexities of the cyber threat landscape effectively. Its unique approach involves collecting and enriching signals from various sources, including the dark web, deep web, and surface web, providing unparalleled visibility into emerging threats and adversarial activities. Targeting a wide range of industries, Cyble&#39;s platform is particularly beneficial for security teams, risk management professionals, and organizations that prioritize safeguarding their digital assets. The comprehensive suite of solutions offered by Cyble includes Threat Intelligence, Dark Web &amp; Deep Web Monitoring, Attack Surface Management (ASM), and Brand Intelligence, among others. These tools are designed to address specific use cases such as identifying vulnerabilities, monitoring brand reputation, and managing third-party risks, making it an essential resource for organizations aiming to bolster their cybersecurity measures. Cyble&#39;s key features are centered around its unified platform, which integrates multiple cybersecurity functions into a single interface. This integration allows for seamless communication between different security components, enabling teams to anticipate, identify, and neutralize threats with remarkable speed and precision. For instance, the Digital Forensics &amp; Incident Response (DFIR) capabilities equip organizations with the tools needed to investigate and respond to incidents effectively, while the DDoS Protection and Cloud Security Posture Management (CSPM) features ensure that businesses can maintain operational integrity even under attack. Moreover, Cyble stands out in its category by combining vast data intelligence with cutting-edge AI automation. This proactive defense strategy not only helps organizations react to cyber threats but also empowers them to stay ahead of potential risks. By enhancing visibility into the threat landscape and providing actionable insights, Cyble enables enterprises to protect their assets, safeguard brand trust, and operate with confidence in an increasingly complex digital environment. The result is a robust cybersecurity framework that supports organizations in navigating the ever-evolving challenges of the cyber world.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 143

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 9.5/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.5/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 9.1/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.6/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Cyble](https://www.g2.com/sellers/cyble)
- **Company Website:** https://cyble.com
- **Year Founded:** 2019
- **HQ Location:** Alpharetta, US
- **Twitter:** @cybleglobal (16,408 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cyble-global/ (246 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 37% Enterprise, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (74 reviews)
- Threat Intelligence (71 reviews)
- Features (57 reviews)
- Insights (49 reviews)
- Threat Detection (49 reviews)

**Cons:**

- Inefficient Alerts (28 reviews)
- False Positives (20 reviews)
- Limited Customization (20 reviews)
- Poor Customer Support (20 reviews)
- Poor Support Management (19 reviews)

### 7. [Tenable Nessus](https://www.g2.com/products/tenable-nessus/reviews)
  Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly and easily identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations - across a variety of operating systems, devices, and applications. With features such as pre-built policies and templates, customizable reporting, group “snooze” functionality, and real-time updates, Nessus is designed to make vulnerability assessment simple, easy, and intuitive. The result: less time and effort to assess, prioritize, and remediate issues.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 287

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 10.0/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.2/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 8.6/10 (Category avg: 8.6/10)
- **Ease of Admin:** 8.9/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,651 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,357 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Network Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 40% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Vulnerability Identification (21 reviews)
- Vulnerability Detection (19 reviews)
- Automated Scanning (18 reviews)
- Ease of Use (17 reviews)
- Features (15 reviews)

**Cons:**

- Slow Scanning (8 reviews)
- Expensive (6 reviews)
- Limited Features (6 reviews)
- Complexity (5 reviews)
- False Positives (5 reviews)

### 8. [Bitsight](https://www.g2.com/products/bitsight/reviews)
  Bitsight is the global leader in cyber risk intelligence, leveraging advanced AI to empower organizations with precise insights derived from the industry’s most extensive external cybersecurity dataset. With more than 3,500 customers and over 68,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface. Bitsight proactively uncovers security gaps across infrastructure, cloud environments, digital identities, and third- and fourth-party ecosystems. From security operations and governance teams to executive boardrooms, Bitsight provides the unified intelligence backbone required to confidently manage cyber risk and address exposures before they impact performance.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 75

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 8.3/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.0/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Admin:** 8.8/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Bitsight](https://www.g2.com/sellers/bitsight)
- **Company Website:** https://www.bitsight.com/
- **Year Founded:** 2011
- **HQ Location:** Boston, MA
- **Twitter:** @BitSight (4,497 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/bitsight/ (740 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 72% Enterprise, 23% Mid-Market


#### Pros & Cons

**Pros:**

- Security (15 reviews)
- Risk Management (14 reviews)
- Ease of Use (13 reviews)
- Features (11 reviews)
- Customer Support (9 reviews)

**Cons:**

- Missing Features (6 reviews)
- Lack of Clarity (5 reviews)
- Poor Notifications (4 reviews)
- Slow Performance (4 reviews)
- Delay Issues (3 reviews)

### 9. [CTM360](https://www.g2.com/products/ctm360-ctm360/reviews)
  CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection &amp; Anti-phishing, Surface, Deep, &amp; Dark Web Monitoring, Security Ratings, Third-party risk Management, and fully managed unlimited Takedowns. As a pioneer and innovator in preemptive security, CTM360 operates as an external CTEM technology platform outside an organization’s perimeter. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 110

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 8.9/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.0/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 8.8/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.6/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [CTM360](https://www.g2.com/sellers/ctm360)
- **Company Website:** https://www.ctm360.com/
- **Year Founded:** 2014
- **HQ Location:** Manama, BH
- **Twitter:** @teamCTM360 (997 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/ctm360/ (125 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Financial Services
  - **Company Size:** 42% Mid-Market, 30% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (48 reviews)
- Ease of Use (45 reviews)
- Features (31 reviews)
- Monitoring (28 reviews)
- Detection Efficiency (24 reviews)

**Cons:**

- Limited Features (9 reviews)
- Integration Issues (8 reviews)
- Lack of Features (5 reviews)
- Lack of Integration (5 reviews)
- Lack of Integrations (5 reviews)

### 10. [SentinelOne Singularity Cloud Security](https://www.g2.com/products/sentinelone-singularity-cloud-security/reviews)
  Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 113

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 9.7/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.9/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 9.8/10 (Category avg: 8.6/10)
- **Ease of Admin:** 9.8/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,607 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 60% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Security (27 reviews)
- Ease of Use (20 reviews)
- Vulnerability Detection (19 reviews)
- Cloud Management (16 reviews)
- Cloud Security (15 reviews)

**Cons:**

- Complexity (5 reviews)
- Ineffective Alerts (5 reviews)
- Complex Setup (4 reviews)
- Difficult Configuration (4 reviews)
- Poor UI (4 reviews)

### 11. [Pentera](https://www.g2.com/products/pentera/reviews)
  Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. Its customers include Casey&#39;s General Stores, Emeria, LuLu International Exchange, IP Telecom PT, BrewDog, City National Bank, Schmitz Cargobull, and MBC Group. Pentera is backed by leading investors such as K1 Investment Management, Insight Partners, Blackstone, Evolution Equity Partners, and AWZ. Visit https://pentera.io for more information.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 141

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 8.3/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 7.9/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 7.8/10 (Category avg: 8.6/10)
- **Ease of Admin:** 8.7/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Pentera](https://www.g2.com/sellers/pentera)
- **Company Website:** https://pentera.io/
- **Year Founded:** 2015
- **HQ Location:** Boston, MA
- **Twitter:** @penterasec (3,324 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/penterasecurity/ (486 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Information Technology and Services
  - **Company Size:** 51% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Vulnerability Identification (8 reviews)
- Automation (7 reviews)
- Customer Support (7 reviews)
- Security (6 reviews)

**Cons:**

- Inadequate Reporting (3 reviews)
- Access Control (2 reviews)
- False Positives (2 reviews)
- Limited Reporting (2 reviews)
- Missing Features (2 reviews)

### 12. [Halo Security](https://www.g2.com/products/halo-security/reviews)
  Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enables security teams to view their infrastructure from an attacker&#39;s perspective, providing continuous visibility into vulnerabilities, exposed assets, and potential security risks across web applications, cloud resources, and third-party services. Halo Security was founded in 2013 and is headquartered in the United States. With a team of experienced security professionals, the company has assisted thousands of organizations in strengthening their security posture. Their fully US-based operations have earned the trust of organizations across various industries seeking to protect their digital assets from evolving cyber threats. The platform combines automated discovery with expert analysis to deliver comprehensive attack surface monitoring, vulnerability detection, and technology identification. Key features include continuous asset discovery that automatically identifies unknown digital resources, real-time alerts for newly discovered vulnerabilities delivered via integrations with dozens of tools, technology fingerprinting to detect potential vulnerabilities in third-party services, and subdomain takeover protection that identifies dangerous DNS misconfigurations before attackers can exploit them. Halo Security empowers organizations to eliminate blind spots in their attack surface, prioritize remediation efforts based on real risk, and secure their external-facing assets against increasingly sophisticated cyber threats. The solution solves critical challenges for security teams by providing visibility into forgotten or unknown assets, detecting vulnerabilities in third-party platforms, and alerting teams to changes that introduce security risks. Whether managing a growing digital footprint or meeting compliance requirements, Halo Security provides the visibility and tools needed to maintain a strong security posture in today&#39;s complex threat landscape.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 55

**User Satisfaction Scores:**

- **Vulnerability Intelligence:** 8.5/10 (Category avg: 9.0/10)
- **Continuous Monitoring:** 9.4/10 (Category avg: 9.1/10)
- **Compliance Monitoring:** 9.3/10 (Category avg: 8.6/10)
- **Ease of Admin:** 8.4/10 (Category avg: 8.9/10)


**Seller Details:**

- **Seller:** [Halo Security](https://www.g2.com/sellers/halo-security)
- **Company Website:** https://www.halosecurity.com/
- **Year Founded:** 2013
- **HQ Location:** Miami Beach, US
- **LinkedIn® Page:** https://www.linkedin.com/company/halo-security (33 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Retail
  - **Company Size:** 53% Mid-Market, 24% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (6 reviews)
- Easy Integrations (4 reviews)
- Features (4 reviews)
- Real-time Notifications (4 reviews)
- Security (4 reviews)

**Cons:**

- Difficult Navigation (4 reviews)
- Complex UI (2 reviews)
- Complexity (1 reviews)
- Complex Setup (1 reviews)
- Dashboard Issues (1 reviews)



## Parent Category

[Vulnerability Management Software](https://www.g2.com/categories/vulnerability-management)



## Related Categories

- [Threat Intelligence Software](https://www.g2.com/categories/threat-intelligence)
- [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)
- [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools)
- [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management)
- [Dark Web Monitoring Tools](https://www.g2.com/categories/dark-web-monitoring)
- [Exposure Management Platforms](https://www.g2.com/categories/exposure-management-platforms)
- [Digital Risk Protection (DRP) Platforms](https://www.g2.com/categories/digital-risk-protection-drp-platforms)




