Introducing G2.ai, the future of software buying.Try now

Top Free Cloud Security Posture Management (CSPM) Software

Check out our list of free Cloud Security Posture Management (CSPM) Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Cloud Security Posture Management (CSPM) Software to ensure you get the right product.

View Free Cloud Security Posture Management (CSPM) Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
32 Cloud Security Posture Management (CSPM) Products Available
(752)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Configuration Monitoring
    Average: 8.7
    9.2
    Vulnerability Scanning
    Average: 8.9
    8.4
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    19,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.9
Configuration Monitoring
Average: 8.7
9.2
Vulnerability Scanning
Average: 8.9
8.4
Threat Hunting
Average: 8.6
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
19,253 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(223)4.6 out of 5
Optimized for quick response
7th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • CISO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.5
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,854 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    474 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • CISO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 38% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.5
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,854 Twitter followers
LinkedIn® Page
www.linkedin.com
474 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(110)4.9 out of 5
8th Easiest To Use in Cloud Security Posture Management (CSPM) software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.8
    Configuration Monitoring
    Average: 8.7
    9.9
    Vulnerability Scanning
    Average: 8.9
    9.8
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,842 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.3
9.8
Configuration Monitoring
Average: 8.7
9.9
Vulnerability Scanning
Average: 8.9
9.8
Threat Hunting
Average: 8.6
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,842 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    9.1
    Vulnerability Scanning
    Average: 8.9
    8.9
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
    Lemmuel A.
    LA
    I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
9.1
Vulnerability Scanning
Average: 8.9
8.9
Threat Hunting
Average: 8.6
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Lemmuel A.
LA
I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,977 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
(200)4.8 out of 5
Optimized for quick response
10th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Starting at $149.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    5.0
    Configuration Monitoring
    Average: 8.7
    10.0
    Vulnerability Scanning
    Average: 8.9
    10.0
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RE
    Intruder delivers a great balance between strong vulnerability scanning capabilities and a clean, intuitive user experience. The setup was... Read review
    Yiannis B.
    YB
    Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
5.0
Configuration Monitoring
Average: 8.7
10.0
Vulnerability Scanning
Average: 8.9
10.0
Threat Hunting
Average: 8.6
RE
Intruder delivers a great balance between strong vulnerability scanning capabilities and a clean, intuitive user experience. The setup was... Read review
Yiannis B.
YB
Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
978 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
(142)4.7 out of 5
Optimized for quick response
13th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

    Users
    • Account Executive
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 73% Mid-Market
    • 20% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeBase features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.7
    8.3
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Hana M.
    HM
    The AI works very well and the customer support is stellar. I am new to enterprise sales, and the help from the team in understanding security... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SafeBase
    Company Website
    Year Founded
    2020
    HQ Location
    San Francisco, California
    Twitter
    @getsafebase
    300 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when respondi

Users
  • Account Executive
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 73% Mid-Market
  • 20% Enterprise
SafeBase features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.7
8.3
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Hana M.
HM
The AI works very well and the customer support is stellar. I am new to enterprise sales, and the help from the team in understanding security... Read review
Seller Details
Seller
SafeBase
Company Website
Year Founded
2020
HQ Location
San Francisco, California
Twitter
@getsafebase
300 Twitter followers
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
(104)4.6 out of 5
Optimized for quick response
9th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

    Users
    • CTO
    • Founder
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 75% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    7.8
    Configuration Monitoring
    Average: 8.7
    8.8
    Vulnerability Scanning
    Average: 8.9
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Wes M.
    WM
    The ease of setup and the overall UX have an astoundingly low barrier to entry, but as an experienced SRE/infra engineer, I can still find my way... Read review
    Verified User in Non-Profit Organization Management
    AN
    we now use safe-chain for our CI for better security Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    3,930 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

Users
  • CTO
  • Founder
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 75% Small-Business
  • 21% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
7.8
Configuration Monitoring
Average: 8.7
8.8
Vulnerability Scanning
Average: 8.9
0.0
No information available
Wes M.
WM
The ease of setup and the overall UX have an astoundingly low barrier to entry, but as an experienced SRE/infra engineer, I can still find my way... Read review
Verified User in Non-Profit Organization Management
AN
we now use safe-chain for our CI for better security Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
3,930 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cortex Cloud features and usability ratings that predict user satisfaction
    8.0
    Has the product been a good partner in doing business?
    Average: 9.3
    7.6
    Configuration Monitoring
    Average: 8.7
    7.9
    Vulnerability Scanning
    Average: 8.9
    7.8
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Logistics and Supply Chain
    UL
    Strong cloud security – It catches misconfigurations and vulnerabilities fast. Easy to use – The dashboard is clean and gives clear... Read review
    Verified User in Computer Networking
    UC
    Gets the job done and has a good user interface. Smooth user experience and is usually free from any bugs. Support and implementation are also good... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,295 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud sec

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Enterprise
  • 32% Mid-Market
Cortex Cloud features and usability ratings that predict user satisfaction
8.0
Has the product been a good partner in doing business?
Average: 9.3
7.6
Configuration Monitoring
Average: 8.7
7.9
Vulnerability Scanning
Average: 8.9
7.8
Threat Hunting
Average: 8.6
Verified User in Logistics and Supply Chain
UL
Strong cloud security – It catches misconfigurations and vulnerabilities fast. Easy to use – The dashboard is clean and gives clear... Read review
Verified User in Computer Networking
UC
Gets the job done and has a good user interface. Smooth user experience and is usually free from any bugs. Support and implementation are also good... Read review
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,295 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(20)4.7 out of 5
Optimized for quick response
15th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Plerion is an Australian, AI-driven cloud security platform, with an AI teammate. We help our customers achieve better security outcomes in less time, by simplifying cloud security. Challenges we h

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Plerion features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Configuration Monitoring
    Average: 8.7
    9.7
    Vulnerability Scanning
    Average: 8.9
    9.6
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Joseph H.
    JH
    Plerion's strongest asset right now is Pleri, their AI agent. It is capable of acting like a security engineer; it can plan your remediation... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Plerion
    Company Website
    Year Founded
    2021
    HQ Location
    Sydney, AU
    Twitter
    @PlerionHQ
    144 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Plerion is an Australian, AI-driven cloud security platform, with an AI teammate. We help our customers achieve better security outcomes in less time, by simplifying cloud security. Challenges we h

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 25% Small-Business
Plerion features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
8.8
Configuration Monitoring
Average: 8.7
9.7
Vulnerability Scanning
Average: 8.9
9.6
Threat Hunting
Average: 8.6
Joseph H.
JH
Plerion's strongest asset right now is Pleri, their AI agent. It is capable of acting like a security engineer; it can plan your remediation... Read review
Seller Details
Seller
Plerion
Company Website
Year Founded
2021
HQ Location
Sydney, AU
Twitter
@PlerionHQ
144 Twitter followers
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(138)4.8 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    nOps leverages automation and intelligent insights to eliminate waste, drive efficiency, and ensure every dollar spent delivers maximum value. With nOps, reduce manual work, confidently optimize your

    Users
    • CTO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • nOps features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Configuration Monitoring
    Average: 8.7
    9.2
    Vulnerability Scanning
    Average: 8.9
    8.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Robert J. B.
    RB
    No risk/commitment savings on AWS Compute Read review
    Scott E.
    SE
    The nOps dashboard is very well constructed, and easy to navigate. The team are super helpful, and proactive in working with us to review usage and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    nOps
    Company Website
    Year Founded
    2017
    HQ Location
    San Francisco, California
    Twitter
    @nopsio
    1,533 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

nOps leverages automation and intelligent insights to eliminate waste, drive efficiency, and ensure every dollar spent delivers maximum value. With nOps, reduce manual work, confidently optimize your

Users
  • CTO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 41% Mid-Market
nOps features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.9
Configuration Monitoring
Average: 8.7
9.2
Vulnerability Scanning
Average: 8.9
8.3
Threat Hunting
Average: 8.6
Robert J. B.
RB
No risk/commitment savings on AWS Compute Read review
Scott E.
SE
The nOps dashboard is very well constructed, and easy to navigate. The team are super helpful, and proactive in working with us to review usage and... Read review
Seller Details
Seller
nOps
Company Website
Year Founded
2017
HQ Location
San Francisco, California
Twitter
@nopsio
1,533 Twitter followers
LinkedIn® Page
www.linkedin.com
155 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Configuration Monitoring
    Average: 8.7
    9.7
    Vulnerability Scanning
    Average: 8.9
    8.5
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abdurrahman A.
    AA
    This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
    Mandira G.
    MG
    I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    80 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
8.9
Configuration Monitoring
Average: 8.7
9.7
Vulnerability Scanning
Average: 8.9
8.5
Threat Hunting
Average: 8.6
Abdurrahman A.
AA
This really excellent security tool from Armo is designed explicitly for Kubernetes environments. It checks everything - containers, workloads, and... Read review
Mandira G.
MG
I am a DevOps enthusiast. I work with Kubernetes and ARMO helps in protecting my workloads from threats. It is very easy to use. Read review
Seller Details
Seller
ARMO
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,128 Twitter followers
LinkedIn® Page
www.linkedin.com
80 employees on LinkedIn®
(42)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Calico Cloud is a fully-managed SaaS platform that provides unified networking, network security, and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is buil

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 36% Mid-Market
    • 36% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calico features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Configuration Monitoring
    Average: 8.7
    8.6
    Vulnerability Scanning
    Average: 8.9
    8.0
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in International Trade and Development
    AI
    1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
    Verified User in Computer Software
    AC
    Very easy to integrate into kubernetes, deployment is quick and painless. Tigera support is knowledgeable and helpful. The network security... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tigera
    Company Website
    Year Founded
    2016
    HQ Location
    San Jose, CA
    Twitter
    @tigeraio
    1,967 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    128 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Calico Cloud is a fully-managed SaaS platform that provides unified networking, network security, and observability to prevent, detect and mitigate security breaches in Kubernetes clusters. It is buil

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 36% Mid-Market
  • 36% Enterprise
Calico features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.3
Configuration Monitoring
Average: 8.7
8.6
Vulnerability Scanning
Average: 8.9
8.0
Threat Hunting
Average: 8.6
Verified User in International Trade and Development
AI
1. Detailed network policy control 2. Scalability and efficiency 3. Effortless management 4. Prompt support 5. Seamless Integration Read review
Verified User in Computer Software
AC
Very easy to integrate into kubernetes, deployment is quick and painless. Tigera support is knowledgeable and helpful. The network security... Read review
Seller Details
Seller
Tigera
Company Website
Year Founded
2016
HQ Location
San Jose, CA
Twitter
@tigeraio
1,967 Twitter followers
LinkedIn® Page
www.linkedin.com
128 employees on LinkedIn®
(21)4.9 out of 5
3rd Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudMatos stands as a game-changing solution in the realm of cloud & cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and ef

    Users
    • Cloud Security Engineer
    Industries
    • Computer Software
    Market Segment
    • 52% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MatosSphere features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Configuration Monitoring
    Average: 8.7
    9.6
    Vulnerability Scanning
    Average: 8.9
    9.6
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AP
    The CSPM and AI-SPM featrures are great; they keep our cloud security and give us peace oif mind. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    N/A
    Twitter
    @RestoLabs
    5 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudMatos stands as a game-changing solution in the realm of cloud & cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and ef

Users
  • Cloud Security Engineer
Industries
  • Computer Software
Market Segment
  • 52% Small-Business
  • 33% Mid-Market
MatosSphere features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Configuration Monitoring
Average: 8.7
9.6
Vulnerability Scanning
Average: 8.9
9.6
Threat Hunting
Average: 8.6
AP
The CSPM and AI-SPM featrures are great; they keep our cloud security and give us peace oif mind. Read review
Seller Details
Year Founded
2022
HQ Location
N/A
Twitter
@RestoLabs
5 Twitter followers
LinkedIn® Page
www.linkedin.com
12 employees on LinkedIn®
(20)4.8 out of 5
14th Easiest To Use in Cloud Security Posture Management (CSPM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • BL
    Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,130 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
BL
Runecast is an extremely powerful tool that provides value out-of-the-box in minutes. It scans your VMware vSphere, NSX-T, Azure, AWS, VMware... Read review
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,130 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Configuration Monitoring
    Average: 8.7
    9.0
    Vulnerability Scanning
    Average: 8.9
    9.3
    Threat Hunting
    Average: 8.6
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NS
    It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
    PS
    What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    446 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.3
Configuration Monitoring
Average: 8.7
9.0
Vulnerability Scanning
Average: 8.9
9.3
Threat Hunting
Average: 8.6
NS
It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
PS
What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
446 Twitter followers
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®