# Best Cloud Security Posture Management (CSPM) Software

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Cloud security posture management (CSPM) is an emerging market of vulnerability management and security compliance technologies designed to ensure protection for complex, modern hybrid computing environments. CSPM tools monitor cloud applications, services, containers, and infrastructure to detect and remediate misconfigurations, or incorrectly enforced policies. Cloud security posture management vendors create solutions that will typically remediate issues automatically when triggered by an anomaly or other misconfiguration based on rules set by the administrator.

Companies use these tools because it is very difficult to map out and consistently visualize all the components of a complex cloud computing environment. New tools have been developed to enable AI-based, automated management of identities, networks, infrastructure, etc. However, only CSPM software has emerged to provide continuous monitoring and visibility of a company’s security posture, and pair it with automated detection and remediation for issues as they emerge across disparate computing environments.

These tools are part of the emerging secure access service edge (SASE) technology market that also includes [software defined perimeter (SDP) software](https://www.g2.com/categories/software-defined-perimeter-sdp), [cloud access security brokers (CASB) software](https://www.g2.com/categories/cloud-access-security-broker-casb), [secure web gateways](https://www.g2.com/categories/secure-web-gateways), and [zero trust networking software](https://www.g2.com/categories/zero-trust-networking). Together, these tools are delivered virtually through [SD-WAN software](https://www.g2.com/categories/sd-wan) to provide an all-encompassing security solution for all components in any cloud environment.

To qualify for inclusion in the Cloud Security Posture Management (CSPM) category, a product must:

- Facilitate the automated detection and remediation of cloud misconfigurations
- Monitor security policies and configurations across infrastructure, applications, and other cloud environments
- Visualize cloud infrastructure in a single-pane-of-glass view
- Monitor for other issues relating to cloud compliance, infrastructure as code, and other potential security gaps





## Best Cloud Security Posture Management (CSPM) Software At A Glance

- **Leader:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
- **Highest Performer:** [SafeBase](https://www.g2.com/products/safebase/reviews)
- **Easiest to Use:** [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews)
- **Top Trending:** [Aikido Security](https://www.g2.com/products/aikido-security/reviews)
- **Best Free Software:** [Wiz](https://www.g2.com/products/wiz-wiz/reviews)


---

**Sponsored**

### Intruder

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent breaches. Unifying Attack Surface Management, Vulnerability Management and Cloud security into one powerful, easy to use platform, Intruder simplifies the complex task of securing an ever-expanding attack surface. Recognizing no two business are alike, Intruder provides real-time, accurate scanning combined with intelligent risk prioritization, ensuring businesses focus on the exposures that are most relevant to them. And our proactive approach limits the window of risk, continuously monitoring for new threats while eliminating the noise that slows teams down. Whether you&#39;re an IT Manager, in DevOps or a CISO, Intruder&#39;s easy setup and context-driven approach will free you up to focus on exposures that cause real breaches, not just technical vulnerabilities. Keeping you one step ahead of attackers.



[Try for Free](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2647&amp;secure%5Bdisplayable_resource_id%5D=2647&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2647&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=27706&amp;secure%5Bresource_id%5D=2647&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fcloud-security-posture-management-cspm%3Fpage%3D1&amp;secure%5Btoken%5D=3a5ace7f801c5c9317e1de09a43d0dc004883d968d65b467e844117fb4df5ff6&amp;secure%5Burl%5D=https%3A%2F%2Fwww.intruder.io%2F%3Futm_source%3Dg2%26utm_medium%3Dp_referral%26utm_campaign%3Dglobal%7Cfixed%7Cg2_clicks_2025&amp;secure%5Burl_type%5D=free_trial)

---

## Top-Rated Products (Ranked by G2 Score)
  ### 1. [Wiz](https://www.g2.com/products/wiz-wiz/reviews)
  Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the development lifecycle, empowering them to build fast and securely. Its Cloud Native Application Protection Platform (CNAPP) consolidates CSPM, KSPM, CWPP, Vulnerability management, IaC scanning, CIEM, DSPM into a single platform. Wiz drives visibility, risk prioritization, and business agility. Protecting Your Cloud Environments Requires a Unified, Cloud Native Platform. Wiz connects to every cloud environment, scans every layer, and covers every aspect of your cloud security - including elements that normally require installing agents. Its comprehensive approach has all of these cloud security solutions built in. Hundreds of organizations worldwide, including 50 percent of the Fortune 100, to rapidly identify and remove critical risks in cloud environments. Its customers include Salesforce, Slack, Mars, BMW, Avery Dennison, Priceline, Cushman &amp; Wakefield, DocuSign, Plaid, and Agoda, among others. Wiz is backed by Sequoia, Index Ventures, Insight Partners, Salesforce, Blackstone, Advent, Greenoaks, Lightspeed and Aglaé. Visit https://www.wiz.io for more information.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 772

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.9/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.2/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.4/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Wiz](https://www.g2.com/sellers/wiz-76a0133b-42e5-454e-b5da-860e503471db)
- **Company Website:** https://www.wiz.io/
- **Year Founded:** 2020
- **HQ Location:** New York, US
- **Twitter:** @wiz_io (22,413 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/wizsecurity/ (3,248 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CISO, Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 54% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Features (113 reviews)
- Security (107 reviews)
- Ease of Use (104 reviews)
- Visibility (87 reviews)
- Easy Setup (68 reviews)

**Cons:**

- Improvement Needed (35 reviews)
- Feature Limitations (34 reviews)
- Learning Curve (34 reviews)
- Improvements Needed (29 reviews)
- Complexity (27 reviews)

  ### 2. [Scrut Automation](https://www.g2.com/products/scrut-automation/reviews)
  Scrut Automation is a leading compliance automation platform designed for fast-growing businesses looking to streamline security, risk, and compliance without disrupting operations. It centralizes compliance functions, automates evidence collection, and simplifies audits, helping security teams reduce compliance efforts by up to 80%. Scrut supports 60+ out-of-the-box frameworks, including SOC 2, ISO 27001, GDPR, HIPAA, and PCI-DSS, with the flexibility to add custom frameworks for unique regulatory needs. With 100+ integrations, Scrut seamlessly integrates into your security and IT ecosystem, automating compliance, eliminating manual work, and improving risk visibility. Join 1700+ industry leaders who trust Scrut for simplified compliance and risk management. Schedule a demo today.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 1,297

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 9.3/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.3/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Scrut Automation](https://www.g2.com/sellers/scrut-automation)
- **Company Website:** https://www.scrut.io/
- **Year Founded:** 2022
- **HQ Location:** Palo Alto, US
- **Twitter:** @scrutsocial (120 Twitter followers)
- **LinkedIn® Page:** https://in.linkedin.com/company/scrut-automation (230 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 50% Small-Business, 48% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (276 reviews)
- Customer Support (249 reviews)
- Compliance Management (225 reviews)
- Helpful (216 reviews)
- Compliance (190 reviews)

**Cons:**

- Improvement Needed (69 reviews)
- Technical Issues (52 reviews)
- Missing Features (44 reviews)
- UX Improvement (44 reviews)
- Learning Curve (41 reviews)

  ### 3. [Forward Enterprise](https://www.g2.com/products/forward-enterprise/reviews)
  Forward Networks created the world’s first network digital twin, transforming how organizations manage and secure their networks. The company’s software creates a mathematically precise model of the production network, giving IT teams unmatched visibility, verification, and agility across multi-vendor environments and every major cloud, including AWS, Azure, and Google Cloud. Trusted by Fortune 100 enterprises and federal agencies, Forward Networks helps organizations reduce risk, ensure compliance, and prepare their networks for the demands of AI and the next wave of digital transformation.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 130

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 9.1/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.0/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Forward Networks](https://www.g2.com/sellers/forward-networks)
- **Company Website:** https://www.forwardnetworks.com/
- **Year Founded:** 2013
- **HQ Location:** Santa Clara, California, United States
- **Twitter:** @FwdNetworks (1,073 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/forward-networks (229 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Senior Network Engineer
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 54% Mid-Market, 40% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (52 reviews)
- Monitoring Performance (45 reviews)
- Visibility (38 reviews)
- Time-saving (29 reviews)
- Network Management (28 reviews)

**Cons:**

- Learning Difficulty (35 reviews)
- Complex Setup (21 reviews)
- Difficult Learning (18 reviews)
- Difficult Setup (16 reviews)
- Difficulty (16 reviews)

  ### 4. [Oneleet](https://www.g2.com/products/oneleet/reviews)
  Oneleet is the all-in-one security and compliance platform that gets companies genuinely secure while achieving SOC 2, ISO 27001, HIPAA and other compliance certifications faster than traditional approaches. Unlike compliance platforms that focus on checkbox evidence collection, Oneleet implements real security first. Compliance follows automatically as a natural outcome of effective cybersecurity, not as a separate goal. Most companies face a false choice: painful but effective security, or painless but ineffective compliance theater. Traditional compliance platforms require juggling multiple vendors, managing fragmented tools, spending months with consultants, and doing manual evidence collection to achieve a certificate that doesn&#39;t actually make you secure. Oneleet consolidates what previously required half a dozen vendors into one integrated platform: penetration testing by real security experts (not just vulnerability scans), code scanning with SAST and DAST, cloud security posture management, attack surface monitoring, mobile device management, security training and awareness, policy generation and management, and continuous compliance monitoring. Because we build everything ourselves and control the entire stack, we deploy comprehensive security with a click. No blind spots. No integration gaps. No vendor sprawl. We guarantee audit outcomes because our standards are higher than auditors&#39; standards. We use AI extensively but responsibly, automating threat modeling and risk assessments while keeping humans in the loop to ensure quality. Clients never see AI hallucinations. We take full responsibility for the entire security journey, from initial setup through audit completion and continuous monitoring. Companies achieve compliance readiness faster with Oneleet, not by doing less, but by making real security easier. We ship all the tools you would normally spend weeks or months setting up and adopting. Our customers regularly win deals they previously lost due to inadequate security postures. Oneleet is the fastest growing compliance company in the sector. A large number of Oneleet&#39;s newer clients come from platforms like Vanta and Drata. With Oneleet&#39;s all-in-one bundle pricing its ROI is significantly higher than that of Vanta, Drata and Delve. Companies that switch from Vanta, Drata, or Delve to Oneleet report faster audits, higher approval rates, and less manual effort. Vanta and Drata rely heavily on manual evidence collection and vendor integrations, creating delays and gaps. Delve emphasizes AI automation but often sacrifices accuracy—its generated outputs are frequently rejected or require manual fixes. Oneleet achieves both precision and speed by combining full-stack automation with expert oversight, producing the industry’s lowest audit-rejection rate and the fastest path to verified security. Oneleet serves SMBs and growth-stage companies that need compliance certifications to close enterprise deals, but want to be genuinely secure, not just certified on paper. Founded by professional penetration testers who spent over a decade breaching Fortune 500s and startups, we built Oneleet to end the disconnect between compliance and security.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 125

**User Satisfaction Scores:**

- **Configuration Monitoring:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 10.0/10 (Category avg: 8.7/10)
- **Threat Hunting:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Oneleet](https://www.g2.com/sellers/oneleet)
- **Company Website:** https://www.oneleet.com/
- **Year Founded:** 2022
- **HQ Location:** Atlanta, US
- **LinkedIn® Page:** http://www.linkedin.com/company/oneleet (34 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Engineer
  - **Top Industries:** Computer Software, Medical Devices
  - **Company Size:** 15% Small-Business, 10% Mid-Market


#### Pros & Cons

**Pros:**

- Security (302 reviews)
- Compliance (251 reviews)
- Ease of Use (228 reviews)
- Helpful (210 reviews)
- Compliance Management (199 reviews)

**Cons:**

- Integration Issues (22 reviews)
- Limited Customization (21 reviews)
- Limited Integrations (17 reviews)
- Lack of Integration (14 reviews)
- Lack of Customization (13 reviews)

  ### 5. [Orca Security](https://www.g2.com/products/orca-security/reviews)
  The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google Cloud, Kubernetes, Alibaba Cloud, and Oracle Cloud. Orca offers the industry’s most comprehensive cloud security solution in a single platform — eliminating the need to deploy and maintain multiple point solutions. Orca is agentless-first, and connects to your environment in minutes using Orca’s patented SideScanning™ technology that provides deep and wide visibility into your cloud environment, without requiring agents. In addition, Orca can integrate with third-party agents for runtime visibility and protection for critical workloads. Orca is at the forefront of leveraging Generative AI for simplified investigations and accelerated remediation – reducing required skill levels and saving cloud security, DevOps, and development teams time and effort, while significantly improving security outcomes. As a Cloud Native Application Protection Platform (CNAPP), Orca consolidates many point solutions in one platform, including: CSPM, CWPP, CIEM, Vulnerability Management, Container and Kubernetes Security, DSPM, API Security, CDR, Multi-cloud Compliance, Shift Left Security, and AI-SPM.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 235

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.5/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.2/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Orca Security](https://www.g2.com/sellers/orca-security)
- **Company Website:** https://orca.security
- **Year Founded:** 2019
- **HQ Location:** Portland, Oregon
- **Twitter:** @orcasec (4,822 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/35573984/ (495 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, CISO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 48% Mid-Market, 40% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (37 reviews)
- Features (33 reviews)
- Security (29 reviews)
- User Interface (22 reviews)
- Visibility (22 reviews)

**Cons:**

- Improvement Needed (15 reviews)
- Feature Limitations (12 reviews)
- Limited Features (10 reviews)
- Missing Features (10 reviews)
- Ineffective Alerts (9 reviews)

  ### 6. [Sysdig Secure](https://www.g2.com/products/sysdig-sysdig-secure/reviews)
  Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig uniquely delivers runtime-powered visibility and agentic AI to stop cloud attacks instantly, not after the damage is done. With Sysdig, you can: - Stop threats in 2 seconds and respond in minutes - Cut vulnerability noise by 95% with runtime prioritization - Detect real risk instantly across workloads, identities, and misconfigurations - Close permissions gaps in under 2 minutes Sysdig Secure consolidates CSPM, CWPP, CIEM, vulnerability management, and threat detection into a single open, real-time platform. Unlike other CNAPPs, Sysdig connects signals across runtime, identity, and posture to eliminate blind spots, reduce tool sprawl, and accelerate innovation without compromise. No guesswork. No black boxes. Just cloud security, the right way. Learn more at https://sysdig.com


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 110

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 9.4/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.6/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Sysdig](https://www.g2.com/sellers/sysdig-715eaed9-9743-4f27-bd2b-d3730923ac3e)
- **Company Website:** https://www.sysdig.com
- **Year Founded:** 2013
- **HQ Location:** San Francisco, California
- **Twitter:** @Sysdig (10,260 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3592486/ (640 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 46% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Security (33 reviews)
- Vulnerability Detection (32 reviews)
- Threat Detection (31 reviews)
- Detection Efficiency (30 reviews)
- Features (23 reviews)

**Cons:**

- Feature Limitations (10 reviews)
- Complexity (9 reviews)
- Missing Features (8 reviews)
- Difficult Learning (7 reviews)
- Feature Complexity (7 reviews)

  ### 7. [Torq AI SOC Platform](https://www.g2.com/products/torq-ai-soc-platform/reviews)
  Torq is transforming cybersecurity with the Torq AI SOC Platform. Torq empowers enterprises to instantly and precisely detect and respond to security events at scale. Torq’s customer base includes major multinational enterprise customers, including Abnormal Security, Armis, Check Point Security, Chipotle Mexican Grill, Inditex (Zara, Bershka, and Pull &amp; Bear), Informatica, Kyocera, PepsiCo, Procter &amp; Gamble, Siemens, Telefónica, Valvoline, Virgin Atlantic, and Wiz.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 149

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.5/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [torq](https://www.g2.com/sellers/torq)
- **Company Website:** https://torq.io/
- **Year Founded:** 2020
- **HQ Location:** New York, US
- **Twitter:** @torq_io (1,921 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/torqio/mycompany (393 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 50% Mid-Market, 29% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (66 reviews)
- Security (61 reviews)
- Automation (58 reviews)
- Features (54 reviews)
- Threat Detection (41 reviews)

**Cons:**

- Difficult Learning (18 reviews)
- Learning Curve (17 reviews)
- Missing Features (10 reviews)
- Improvement Needed (8 reviews)
- Poor Interface Design (8 reviews)

  ### 8. [CrowdStrike Falcon Cloud Security](https://www.g2.com/products/crowdstrike-falcon-cloud-security/reviews)
  Crowdstrike Falcon Cloud Security is the only CNAPP to stop breaches in the cloud Built for today’s hybrid and multi-cloud environments, Falcon Cloud Security protects the entire cloud attack surface - from code to runtime - by combining continuous agentless visibility with real-time detection and response. At runtime, Falcon Cloud Security delivers best-in-class cloud workload protection and real-time cloud detection and response (CDR) to stop active threats across hybrid environments. Integrated with the CrowdStrike Falcon platform, it correlates signals across endpoint, identity, and cloud to detect sophisticated cross-domain attacks that point solutions miss—enabling teams to respond faster and stop breaches in progress. To reduce risk before attacks occur, Falcon Cloud Security also delivers agentless-driven posture management that proactively shrinks the cloud attack surface. Unlike typical solutions, Crowdstrike enriches cloud risk detections with adversary intelligence and graph-based context, enabling security teams to prioritize exploitable exposures and prevent breaches before they happen. Customers using Falcon Cloud Security consistently see measurable results: 89% faster cloud detection and response 100x reduction in false positives by prioritizing exploitable, business-critical risk 83% reduction in cloud security licenses due to elimination of redundant tools


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.9/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.8/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [CrowdStrike](https://www.g2.com/sellers/crowdstrike)
- **Company Website:** https://www.crowdstrike.com
- **Year Founded:** 2011
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @CrowdStrike (110,002 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2497653/ (11,258 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 45% Enterprise, 43% Mid-Market


#### Pros & Cons

**Pros:**

- Security (49 reviews)
- Cloud Security (37 reviews)
- Detection Efficiency (34 reviews)
- Vulnerability Detection (31 reviews)
- Ease of Use (29 reviews)

**Cons:**

- Expensive (17 reviews)
- Improvements Needed (14 reviews)
- Improvement Needed (13 reviews)
- Feature Complexity (8 reviews)
- Learning Curve (8 reviews)

  ### 9. [Cymulate](https://www.g2.com/products/cymulate/reviews)
  Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry&#39;s most comprehensive and user-friendly Breach and Attack Simulation technology. We empower security teams to prioritize remediation by continuously testing and harden defenses against immediate threats from the attacker&#39;s point of view. Cymulate deploys within an hour, integrating with a vast tech alliance of security controls, from EDR, to email gateways, web gateways, SIEM, WAF and more across hybrid, on-premise, cloud and Kubernetes environments. Customers see increased prevention, detection and improvement to overall security posture from optimizing their existing defense investments end-to-end across the MITRE ATT&amp;CK® framework. The platform provides out-of-the-box, expert, and threat intelligence-led risk assessments that are simple to deploy and use for all maturity levels, and are constantly updated. It also provides an open framework to create and automate red and purple teaming by generating penetration scenarios and advanced attack campaigns tailored to their unique environments and security policies.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 175

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 6.7/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 6.7/10 (Category avg: 8.7/10)
- **Threat Hunting:** 6.1/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Cymulate](https://www.g2.com/sellers/cymulate)
- **Company Website:** https://www.cymulate.com
- **Year Founded:** 2016
- **HQ Location:** Holon, Israel
- **Twitter:** @CymulateLtd (1,086 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cymulate (251 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Analyst, Cyber Security Engineer
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 56% Enterprise, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (73 reviews)
- Security (41 reviews)
- Vulnerability Identification (41 reviews)
- Features (39 reviews)
- Customer Support (33 reviews)

**Cons:**

- Improvement Needed (12 reviews)
- Integration Issues (10 reviews)
- Reporting Issues (8 reviews)
- Complexity (6 reviews)
- Inefficient Alert System (6 reviews)

  ### 10. [Microsoft Defender for Cloud](https://www.g2.com/products/microsoft-defender-for-cloud/reviews)
  Microsoft Defender for Cloud is a cloud native application protection platform for multicloud and hybrid environments with comprehensive security across the full lifecycle, from development to runtime.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 277

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.7/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.9/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.6/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,090,464 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Who Uses This:** Saas Consultant, Software Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Mid-Market, 35% Enterprise


#### Pros & Cons

**Pros:**

- Security (121 reviews)
- Comprehensive Security (92 reviews)
- Cloud Security (71 reviews)
- Vulnerability Detection (63 reviews)
- Threat Detection (57 reviews)

**Cons:**

- Complexity (27 reviews)
- Expensive (24 reviews)
- Delayed Detection (22 reviews)
- False Positives (19 reviews)
- Improvement Needed (19 reviews)

  ### 11. [SentinelOne Singularity Cloud Security](https://www.g2.com/products/sentinelone-singularity-cloud-security/reviews)
  Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure and protect your multi-cloud infrastructure, services, and containers from build time to runtime. SentinelOne’s CNAPP applies an attacker’s mindset to help security practitioners better prioritize their remediation tasks with evidence-backed Verified Exploit Paths™. The efficient and scalable runtime protection, proven over 5 years and trusted by many of the world’s leading cloud enterprises, harnesses local, autonomous AI engines to detect and thwart runtime threats in real-time. CNAPP data and workload telemetry is recorded to SentinelOne’s unified security lake, for easy access and investigation.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 112

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 9.8/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.9/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [SentinelOne](https://www.g2.com/sellers/sentinelone)
- **Company Website:** https://www.sentinelone.com
- **Year Founded:** 2013
- **HQ Location:** Mountain View, CA
- **Twitter:** @SentinelOne (57,389 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2886771/ (3,183 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 60% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Security (27 reviews)
- Ease of Use (20 reviews)
- Vulnerability Detection (19 reviews)
- Cloud Management (16 reviews)
- Cloud Security (15 reviews)

**Cons:**

- Complexity (5 reviews)
- Ineffective Alerts (5 reviews)
- Complex Setup (4 reviews)
- Difficult Configuration (4 reviews)
- Poor UI (4 reviews)

  ### 12. [Intruder](https://www.g2.com/products/intruder/reviews)
  Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent breaches. Unifying Attack Surface Management, Vulnerability Management and Cloud security into one powerful, easy to use platform, Intruder simplifies the complex task of securing an ever-expanding attack surface. Recognizing no two business are alike, Intruder provides real-time, accurate scanning combined with intelligent risk prioritization, ensuring businesses focus on the exposures that are most relevant to them. And our proactive approach limits the window of risk, continuously monitoring for new threats while eliminating the noise that slows teams down. Whether you&#39;re an IT Manager, in DevOps or a CISO, Intruder&#39;s easy setup and context-driven approach will free you up to focus on exposures that cause real breaches, not just technical vulnerabilities. Keeping you one step ahead of attackers.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 206

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 5.0/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 10.0/10 (Category avg: 8.7/10)
- **Threat Hunting:** 10.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Intruder](https://www.g2.com/sellers/intruder)
- **Company Website:** https://www.intruder.io
- **Year Founded:** 2015
- **HQ Location:** London
- **Twitter:** @intruder_io (979 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6443623/ (84 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO, Director
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 57% Small-Business, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (41 reviews)
- Vulnerability Detection (30 reviews)
- Customer Support (26 reviews)
- User Interface (24 reviews)
- Vulnerability Identification (24 reviews)

**Cons:**

- Expensive (10 reviews)
- Slow Scanning (8 reviews)
- Licensing Issues (7 reviews)
- False Positives (6 reviews)
- Limited Features (6 reviews)

  ### 13. [Aikido Security](https://www.g2.com/products/aikido-security/reviews)
  Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido helps teams of any size ship secure software faster, automate protection, and simulate real-world attacks with AI-driven precision. The platform’s proprietary AI cuts noise by 95%, delivers one-click fixes, and saves developers 10+ hours per week. Aikido Intel proactively uncovers vulnerabilities in open source packages before disclosure, helping secure more than 50,000 organizations worldwide, including Revolut, Niantic, Visma, Montblanc, and GoCardless.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 139

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 7.8/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.8/10 (Category avg: 8.7/10)


**Seller Details:**

- **Seller:** [Aikido Security](https://www.g2.com/sellers/aikido-security)
- **Company Website:** https://aikido.dev
- **Year Founded:** 2022
- **HQ Location:** Ghent, Belgium
- **Twitter:** @AikidoSecurity (6,187 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/aikido-security/ (175 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CTO, Founder
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 71% Small-Business, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (78 reviews)
- Security (55 reviews)
- Features (52 reviews)
- Easy Integrations (47 reviews)
- Easy Setup (47 reviews)

**Cons:**

- Missing Features (19 reviews)
- Expensive (17 reviews)
- Limited Features (16 reviews)
- Pricing Issues (15 reviews)
- Lacking Features (14 reviews)

  ### 14. [Check Point CloudGuard CNAPP](https://www.g2.com/products/check-point-cloudguard-cnapp/reviews)
  CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter. With CloudGuard&#39;s unified &amp; modular platform , customers receive: Enhanced Cloud Security Posture Management Deep Workload Security Visibility at Scale with No Agents Enforcement of Least Privilege with Cloud Infrastructure Entitlement Management (CIEM) Runtime Protection for Cloud Workloads (CWPP) Context-Based Web Application and API Protection (WAF) Shift CNAPP Left to Secure Applications in the CI/CD Pipeline Context Graph Visualization &amp; Cloud Detection and Response For more information on CloudGuard CNAPP, visit https://www.checkpoint.com/cloudguard/cnapp/


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.7/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.2/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.1/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,927 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)
- **Ownership:** NASDAQ:CHKP

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Software Engineer
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 48% Enterprise, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Security (45 reviews)
- Cloud Security (35 reviews)
- Ease of Use (30 reviews)
- Cloud Integration (29 reviews)
- Comprehensive Security (29 reviews)

**Cons:**

- Improvement Needed (13 reviews)
- Complexity (12 reviews)
- Difficult Setup (10 reviews)
- Integration Issues (10 reviews)
- Poor Customer Support (10 reviews)

  ### 15. [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews)
  Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud security and SOC workflows enables teams to achieve holistic visibility, trace risk across the lifecycle, and correlate real-time threat activity with development and runtime contexts. Cortex Cloud is a unified platform built on three core pillars: data integration, AI-driven intelligence, and automation. Now you can safeguard applications, data, and infrastructure across multicloud and hybrid environments with a unified data model that consolidates telemetry from code, runtime, identity, and endpoints, all into a single data source. Empower teams with precise, AI-powered insights and 2200+ machine learning models to identify and stop zero-day threats with real-time advanced threat detection and response. And automate with 1000+ prebuilt playbooks across your cloud stack to reduce manual workloads, accelerate remediations, and cut response times tenfold. Cortex Cloud delivers more than tools—it transforms how organizations secure their cloud environments.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 109

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 7.6/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 7.9/10 (Category avg: 8.7/10)
- **Threat Hunting:** 7.8/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Company Website:** https://www.paloaltonetworks.com
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,510 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 39% Enterprise, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (49 reviews)
- Features (45 reviews)
- Security (43 reviews)
- Visibility (38 reviews)
- Cloud Integration (34 reviews)

**Cons:**

- Expensive (31 reviews)
- Difficult Learning (30 reviews)
- Learning Curve (29 reviews)
- Pricing Issues (24 reviews)
- Complex Setup (21 reviews)

  ### 16. [AlgoSec Horizon](https://www.g2.com/products/algosec-horizon/reviews)
  AlgoSec, a global cybersecurity leader, empowers organizations to securely accelerate application delivery up to 10 times faster by automating application connectivity and security policy across the hybrid network environment. With two decades of expertise securing hybrid networks, over 2200 of the world&#39;s most complex organizations trust AlgoSec to help secure their most critical workloads. AlgoSec Horizon platform utilizes advanced AI capabilities, enabling users to automatically discover and identify their business applications across multi-clouds, and remediate risks more effectively. It serves as a single source for visibility into security and compliance issues across the hybrid network environment, to ensure ongoing adherence to internet security standards, industry, and internal regulations. Additionally, organizations can leverage intelligent change automation to streamline security change processes, thus improving security and agility. Learn how AlgoSec enables application owners, information security experts, SecOps and cloud security teams to deploy business applications faster while maintaining security at www.algosec.com.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 215

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.8/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.8/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [AlgoSec](https://www.g2.com/sellers/algosec)
- **Company Website:** https://www.algosec.com
- **Year Founded:** 2004
- **HQ Location:** Ridgefield Park, New Jersey
- **Twitter:** @AlgoSec (2,423 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/algosec/ (559 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 51% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (15 reviews)
- Policy Management (13 reviews)
- Risk Management (9 reviews)
- Automation (8 reviews)
- Useful (8 reviews)

**Cons:**

- Improvement Needed (8 reviews)
- Integration Issues (6 reviews)
- Difficult Setup (5 reviews)
- Complex Setup (4 reviews)
- Expensive (4 reviews)

  ### 17. [Hybrid Cloud Security](https://www.g2.com/products/trend-micro-hybrid-cloud-security/reviews)
  In today&#39;s complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend&#39;s Cloud Security provides essential visibility, allowing you and your teams to secure every aspect of your transformation and eliminate disruptive security silos. Automate security policies, deployments, monitoring, and compliance audits seamlessly from a single console, ensuring the automatic protection of all workloads from both known and unknown threats. With Cloud-Native Application Protection and robust platform capabilities, Trend empowers you to proactively address vulnerabilities and defend against threats. Gain centralized visibility, continuous asset discovery, and contextualized risk assessments, equipping your team with everything necessary to stay ahead of potential cloud security risks.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 181

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.8/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.1/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.9/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Trend Micro](https://www.g2.com/sellers/trend-micro)
- **Year Founded:** 1988
- **HQ Location:** Tokyo
- **LinkedIn® Page:** https://www.linkedin.com/company/4312/ (8,090 employees on LinkedIn®)
- **Ownership:** OTCMKTS:TMICY
- **Total Revenue (USD mm):** $1,515

**Reviewer Demographics:**
  - **Who Uses This:** Cyber Security Engineer, Cyber Security Associate
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 43% Mid-Market, 34% Enterprise


#### Pros & Cons

**Pros:**

- Security (9 reviews)
- Security Protection (7 reviews)
- Compliance (6 reviews)
- Cloud Security (4 reviews)
- Comprehensive Security (4 reviews)

**Cons:**

- Complexity (6 reviews)
- Complex Setup (4 reviews)
- Feature Complexity (4 reviews)
- Learning Curve (4 reviews)
- Difficult Learning (3 reviews)

  ### 18. [Pentera](https://www.g2.com/products/pentera/reviews)
  Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. Its customers include Casey&#39;s General Stores, Emeria, LuLu International Exchange, IP Telecom PT, BrewDog, City National Bank, Schmitz Cargobull, and MBC Group. Pentera is backed by leading investors such as K1 Investment Management, Insight Partners, Blackstone, Evolution Equity Partners, and AWZ. Visit https://pentera.io for more information.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 141

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 9.0/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.7/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.5/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Pentera](https://www.g2.com/sellers/pentera)
- **Company Website:** https://pentera.io/
- **Year Founded:** 2015
- **HQ Location:** Boston, MA
- **Twitter:** @penterasec (3,322 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/penterasecurity/ (486 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Information Technology and Services
  - **Company Size:** 51% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Vulnerability Identification (8 reviews)
- Automation (7 reviews)
- Customer Support (7 reviews)
- Security (6 reviews)

**Cons:**

- Inadequate Reporting (3 reviews)
- Access Control (2 reviews)
- False Positives (2 reviews)
- Limited Reporting (2 reviews)
- Missing Features (2 reviews)

  ### 19. [SafeBase](https://www.g2.com/products/safebase/reviews)
  SafeBase is a comprehensive Trust Center Platform designed specifically for enterprises to facilitate seamless security reviews. This platform addresses the challenges organizations face when responding to security questionnaires by significantly reducing the volume of inbound inquiries. By providing self-serve, secure access to essential information, SafeBase empowers customers to find the answers they need without the friction typically associated with traditional security review processes. Trusted by high growth companies and enterprise organizations like OpenAI, Asana, T-Mobile, and Zoom, SafeBase helps eliminate friction in the inbound security review process and helps build customer trust. The target audience for SafeBase includes security teams, sales professionals, and compliance officers within medium to large enterprises that require efficient management of security documentation and inquiries. The platform is particularly beneficial for organizations that frequently engage with clients who have rigorous security requirements. Use cases for SafeBase range from automating responses to security questionnaires to streamlining internal workflows, thus enabling teams to focus on more strategic initiatives rather than administrative tasks. Key features of SafeBase include: • Advanced Trust Center access and governance capabilities, which offer robust permissioning and access controls. Users can manage access through functionalities such as auto bulk invites, SCIM integration, and expiration dates, ensuring that sensitive information is shared securely and efficiently. • Automated NDA workflows further enhance the user experience by allowing buyers to securely access necessary documentation through integrated NDA signing, simplifying the process for all parties involved. • Chrome extension - enables users to provide questionnaire responses directly within their buyers&#39; Third-Party Risk Management (TPRM) portals. This integration not only saves time but also enhances the accuracy of information shared. • Advanced analytics dashboards helping organizations communicate the return on investment (ROI) of their security programs. By leveraging CRM data, these dashboards highlight key focus areas and demonstrate how security initiatives contribute to overall revenue growth. • Multi-product Trust Center profiles, allowing organizations to showcase their trust posture across various product offerings. This feature makes it easy for buyers to self-serve security documentation tailored to their specific needs. By streamlining the security review process and positioning security as a strategic driver of revenue, SafeBase enables fast-growing companies to reclaim valuable time and resources, ultimately enhancing the buying experience for their clients. In 2025, SafeBase was acquired by Drata. Together, they also offer the leading Trust Management Platform enabling organizations to: ~ Proactively build trust with customers through dynamic, real-time Trust Centers. Accelerate security questionnaire responses and close deals faster with AI-powered automation. ~ Simplify and scale compliance efforts with advanced automation and robust integrations. ~ Enhance vendor and third-party risk management with improved efficiency and continuous visibility. ~ Scale and modernize enterprise GRC programs to address evolving market needs.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 142

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.3/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.3/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [SafeBase](https://www.g2.com/sellers/safebase)
- **Company Website:** https://safebase.io/
- **Year Founded:** 2020
- **HQ Location:** San Francisco, California
- **LinkedIn® Page:** https://www.linkedin.com/company/safebase/ (57 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Account Executive
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 73% Mid-Market, 20% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Communication (4 reviews)
- Customer Success (4 reviews)
- Helpful (4 reviews)
- Integrations (4 reviews)

**Cons:**

- Missing Features (4 reviews)
- Lack of Customization (2 reviews)
- Limited Customization (2 reviews)
- Feature Complexity (1 reviews)
- Improvements Needed (1 reviews)

  ### 20. [Plerion](https://www.g2.com/products/plerion/reviews)
  Simplify cloud security. Plerion is an Aussie cyber security company. Our suite of solutions include an AI security engineer, Pleri, embedded on a code and cloud security platform. We secure everything you build and run, from code to cloud to AI. Plerion has achieved AWS Partner Security Software Competency and is IS27001 and SOC2 certified.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 25

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.8/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.7/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.7/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Plerion](https://www.g2.com/sellers/plerion)
- **Company Website:** https://plerion.com/
- **Year Founded:** 2021
- **HQ Location:** Sydney, AU
- **Twitter:** @PlerionHQ (142 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/plerion (32 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Financial Services
  - **Company Size:** 56% Mid-Market, 28% Small-Business


#### Pros & Cons

**Pros:**

- Security (11 reviews)
- Ease of Use (10 reviews)
- Customer Support (7 reviews)
- Helpful (7 reviews)
- Prioritization (6 reviews)

**Cons:**

- Improvements Needed (5 reviews)
- Improvement Needed (4 reviews)
- Missing Features (4 reviews)
- Cloud Integration (2 reviews)
- Integration Issues (2 reviews)

  ### 21. [MatosSphere](https://www.g2.com/products/matossphere/reviews)
  CloudMatos stands as a game-changing solution in the realm of cloud &amp; cybersecurity, redefining how organizations protect their cloud-native applications and digital assets. As an agentless and effortlessly deployable Cloud Native Application Protection Platform (CNAPP), CloudMatos revolutionizes the landscape by swiftly identifying and mitigating security risks across cloud environments, web, API, and networks. With integrated SAST, DAST, API security, SCA, and comprehensive Attack Surface Management, it thoroughly assesses your security posture. CloudMatos also offers APIs for seamless data integration into existing systems, setting itself apart with its unique Attack Path Engine built on a graph-based foundation. CloudMatos extends its capabilities to cover AWS, Azure, GCP, and Kubernetes, providing a unified approach to security and compliance management. Advanced graph-based algorithms enable it to proactively assess, prioritize, and neutralize risks, bolstering an organization&#39;s security posture with speed and precision. In essence, CloudMatos reimagines cloud &amp; cybersecurity by making it secure, accessible, efficient, and comprehensive, empowering organizations to navigate the dynamic world of cloud-native applications and digital assets with confidence and ease.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 23

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.6/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.6/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [CloudMatos](https://www.g2.com/sellers/cloudmatos)
- **Year Founded:** 2022
- **HQ Location:** N/A
- **Twitter:** @RestoLabs (5 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cloudmatos/mycompany/?viewAsMember=true (12 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Cloud Security Engineer
  - **Top Industries:** Computer Software
  - **Company Size:** 48% Small-Business, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (9 reviews)
- Automation (8 reviews)
- Cloud Security (7 reviews)
- Ease of Use (7 reviews)
- Cloud Management (6 reviews)

**Cons:**

- Integration Issues (7 reviews)
- Improvement Needed (5 reviews)
- Missing Features (4 reviews)
- Access Control (3 reviews)
- Ineffective Alerts (3 reviews)

  ### 22. [FortiCNAPP](https://www.g2.com/products/forticnapp/reviews)
  FortiCNAPP (formerly Lacework) is an AI-powered Cloud-Native Application Protection Platform that delivers unified security across your multi-cloud and hybrid environments. Built to protect the entire application lifecycle—from development to runtime—it combines posture management, workload protection, identity security, and threat detection into one integrated platform. By leveraging machine learning and behavioral analytics, FortiCNAPP helps security teams detect unknown threats, reduce noise, and accelerate response. Integrated with the Fortinet Security Fabric, it provides full-stack visibility across cloud, network, and endpoint environments—empowering teams to operate with confidence, reduce complexity, and scale securely.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 383

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.7/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.9/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Fortinet](https://www.g2.com/sellers/fortinet)
- **Company Website:** https://www.fortinet.com
- **Year Founded:** 2000
- **HQ Location:** Sunnyvale, CA
- **Twitter:** @Fortinet (151,247 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/6460/ (16,112 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer, Security Analyst
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 62% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Security (8 reviews)
- Vulnerability Detection (7 reviews)
- Alert Management (6 reviews)
- Cloud Security (6 reviews)
- Ease of Use (6 reviews)

**Cons:**

- Difficult Setup (5 reviews)
- Poor Documentation (5 reviews)
- Complex Setup (4 reviews)
- Setup Difficulty (4 reviews)
- Complex Configuration (3 reviews)

  ### 23. [Tenable Cloud Security](https://www.g2.com/products/tenable-tenable-cloud-security/reviews)
  Tenable Cloud Security is an actionable cloud security platform that exposes and closes priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities. Organizations use its intuitive UI to unify siloed tools to secure the full cloud stack, achieving end-to-end visibility, prioritization and remediation across infrastructure, workloads, identities, data and AI services. Users can access the extensive knowledgebase of Tenable Research, reducing the risk of breaches with advanced prioritization that understands resource, identity and risk relationships. Tenable uses this context to pinpoint toxic combinations of risk most likely to be exploited. Take action, even if you only have 5 minutes, with guided remediations and code snippets that significantly reduce MTTR. With one click, report on compliance with industry benchmarks and regulatory requirements, e.g. SOC 2, GDPR &amp; HIPAA. TCS is part of Tenable’s AI-powered exposure management platform, Tenable One.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 37

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.6/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 9.2/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.3/10 (Category avg: 8.7/10)
- **Threat Hunting:** 9.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,575 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,357 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 57% Mid-Market, 38% Enterprise


#### Pros & Cons

**Pros:**

- Compliance (6 reviews)
- Detailed Analysis (6 reviews)
- Ease of Use (5 reviews)
- Features (5 reviews)
- Integrations (5 reviews)

**Cons:**

- Complex Setup (4 reviews)
- Expensive (4 reviews)
- Feature Limitations (4 reviews)
- Difficult Setup (3 reviews)
- Implementation Difficulty (3 reviews)

  ### 24. [Aqua Security](https://www.g2.com/products/aqua-security/reviews)
  Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and runtime protection for security teams, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is the industry’s most comprehensive Cloud Native Application Protection Platform (CNAPP). Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 57

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 7.7/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 9.2/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.2/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Aqua Security Software Ltd](https://www.g2.com/sellers/aqua-security-software-ltd)
- **Year Founded:** 2015
- **HQ Location:** Burlington, US
- **Twitter:** @AquaSecTeam (7,678 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/aquasecteam/ (499 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Financial Services
  - **Company Size:** 56% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (19 reviews)
- Ease of Use (18 reviews)
- Features (12 reviews)
- Detection (10 reviews)
- Vulnerability Identification (9 reviews)

**Cons:**

- Missing Features (9 reviews)
- Lack of Features (6 reviews)
- Limited Features (6 reviews)
- Difficult Navigation (4 reviews)
- Improvement Needed (4 reviews)

  ### 25. [Calico](https://www.g2.com/products/calico-2025-10-31/reviews)
  The Calico platform, built on the most trusted open-source technologies in Kubernetes — Calico Open Source, Istio, Envoy, and eBPF — provides a single management plane for secure networking and observability for AI workloads. It can be deployed as Calico Cloud, a fully-managed SaaS platform, or Calico Enterprise, a self-managed platform. Calico works with popular managed Kubernetes services such as AKS, EKS, and GKE, as well as self-managed Kubernetes distributions including Red Hat OpenShift, SUSE/Rancher, VMware Tanzu, and Mirantis. Calico is the only platform with a pluggable data plane architecture enabling support for multiple data planes, including eBPF, nftables, standard Linux, VPP, and Windows. Calico secures 1 million+ clusters daily, and is used by leading companies, including NVIDIA, RBC, Bloomberg, Chipotle, GoDaddy, and Upwork.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 42

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Configuration Monitoring:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Scanning:** 8.6/10 (Category avg: 8.7/10)
- **Threat Hunting:** 8.0/10 (Category avg: 8.6/10)


**Seller Details:**

- **Seller:** [Tigera](https://www.g2.com/sellers/tigera)
- **Company Website:** https://www.tigera.io
- **Year Founded:** 2016
- **HQ Location:** San Jose, CA
- **Twitter:** @tigeraio (1,959 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/10614868 (129 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 36% Enterprise, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (19 reviews)
- Security (15 reviews)
- Customer Support (14 reviews)
- Features (11 reviews)
- Policy Management (11 reviews)

**Cons:**

- Complex Setup (7 reviews)
- Complexity (6 reviews)
- Difficult Configuration (6 reviews)
- Difficult Learning (6 reviews)
- Difficult Setup (6 reviews)



## Parent Category

[Cloud Security Software](https://www.g2.com/categories/cloud-security)



## Related Categories

- [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)
- [Cloud Workload Protection Platforms](https://www.g2.com/categories/cloud-workload-protection-platforms)
- [Container Security Tools](https://www.g2.com/categories/container-security-tools)
- [Cloud Compliance Software](https://www.g2.com/categories/cloud-compliance)
- [Cloud Security Monitoring and Analytics Software](https://www.g2.com/categories/cloud-security-monitoring-and-analytics)
- [Cloud-Native Application Protection Platform (CNAPP)](https://www.g2.com/categories/cloud-native-application-protection-platform-cnapp)
- [Cloud Detection and Response (CDR) Software](https://www.g2.com/categories/cloud-detection-and-response-cdr)




---
## Frequently Asked Questions

### How can CSPM improve compliance with industry regulations?

CSPM enhances compliance with industry regulations by automating security assessments and providing continuous monitoring of cloud environments. Users report that features like automated compliance checks and real-time alerts help identify and remediate compliance gaps efficiently. Additionally, CSPM tools facilitate adherence to standards such as GDPR and HIPAA by ensuring that security policies are consistently applied across cloud resources. Products like Prisma Cloud, CloudHealth, and Check Point CloudGuard are noted for their robust compliance reporting capabilities, which streamline audits and reduce the risk of non-compliance.



### How do CSPM solutions address security vulnerabilities in real-time?

CSPM solutions address security vulnerabilities in real-time by continuously monitoring cloud environments for misconfigurations and compliance violations. They provide automated alerts and remediation suggestions, enabling organizations to respond swiftly to potential threats. Products like Prisma Cloud, CloudHealth, and Sumo Logic are noted for their real-time monitoring capabilities, with users highlighting features such as automated compliance checks and integration with CI/CD pipelines, which enhance proactive security management and reduce the window of exposure to vulnerabilities.



### How do CSPM solutions handle multi-cloud environments?

CSPM solutions effectively manage multi-cloud environments by providing centralized visibility and compliance across various cloud platforms. Users frequently highlight features such as automated risk assessments, policy enforcement, and integration capabilities with major cloud providers like AWS, Azure, and Google Cloud. For instance, products like Prisma Cloud and CloudHealth are noted for their robust multi-cloud support, enabling users to monitor configurations and security postures seamlessly across different environments. Additionally, many solutions offer customizable dashboards and reporting tools that enhance visibility and streamline compliance management across diverse cloud infrastructures.



### How do CSPM tools differ in terms of user experience?

CSPM tools differ significantly in user experience, with some platforms like Prisma Cloud and CloudHealth receiving high marks for intuitive interfaces and ease of navigation, while others, such as Dome9 and Sumo Logic, are noted for their robust feature sets but can be more complex to use. User feedback highlights that Prisma Cloud excels in providing a streamlined onboarding process, whereas Dome9 is often praised for its comprehensive security features despite a steeper learning curve. Overall, user satisfaction ratings reflect these differences, with Prisma Cloud achieving a higher ease-of-use score compared to its competitors.



### How do CSPM tools integrate with existing cloud services?

CSPM tools integrate with existing cloud services by utilizing APIs to monitor configurations and compliance across various platforms. Users report that tools like Prisma Cloud and CloudHealth provide seamless integration with AWS, Azure, and Google Cloud, enabling real-time visibility and automated remediation. Additionally, solutions such as Check Point CloudGuard and Sumo Logic are noted for their ability to enhance security posture through continuous monitoring and alerts, ensuring compliance with industry standards. Overall, effective integration is a key feature that enhances the functionality of CSPM tools.



### How do I evaluate the scalability of a CSPM solution?

To evaluate the scalability of a CSPM solution, consider user feedback on performance under increased workloads, integration capabilities with existing systems, and the ability to manage multiple cloud environments. Products like Prisma Cloud and Check Point CloudGuard are noted for their robust scalability features, with users highlighting seamless scaling during peak usage. Additionally, solutions such as Sumo Logic and CloudHealth are recognized for their adaptability to growing infrastructures, ensuring effective management as organizations expand their cloud resources.



### What are common use cases for implementing CSPM?

Common use cases for implementing Cloud Security Posture Management (CSPM) include continuous compliance monitoring, risk assessment, and threat detection across cloud environments. Users frequently highlight the importance of automating security checks to ensure adherence to regulatory standards and best practices. Additionally, CSPM tools are utilized for identifying misconfigurations and vulnerabilities in cloud resources, enhancing overall security posture. Organizations also leverage CSPM for incident response planning and improving visibility into their cloud security landscape.



### What are the key features to look for in a CSPM solution?

Key features to look for in a Cloud Security Posture Management (CSPM) solution include automated compliance checks, real-time threat detection, risk assessment capabilities, integration with existing security tools, and comprehensive reporting features. Users emphasize the importance of user-friendly dashboards for visibility and ease of use, as well as support for multi-cloud environments to ensure consistent security across platforms. Additionally, effective remediation guidance and continuous monitoring are critical for maintaining security posture.



### What are the most important metrics to measure CSPM effectiveness?

Key metrics to measure CSPM effectiveness include the number of security incidents detected, compliance score against industry standards, time to remediate vulnerabilities, and the percentage of misconfigurations resolved. User feedback highlights that effective CSPM tools significantly reduce the time to detect and respond to threats, with many users noting improvements in compliance adherence and overall cloud security posture. Additionally, tracking the reduction in false positives can indicate the accuracy of the CSPM solution.



### What are the typical deployment timelines for CSPM solutions?

Deployment timelines for Cloud Security Posture Management (CSPM) solutions typically range from a few weeks to several months, depending on the complexity of the environment and the specific solution. For instance, users report that solutions like Prisma Cloud and CloudHealth can be deployed within 1-3 months, while others like Sumo Logic may take longer due to integration requirements. Overall, most users indicate that initial setup and configuration are manageable within this timeframe, allowing for quicker realization of security benefits.



### What is the average pricing model for CSPM solutions?

The average pricing model for Cloud Security Posture Management (CSPM) solutions typically ranges from $1,000 to $5,000 per month, depending on the features and scale of deployment. Most vendors offer tiered pricing based on the number of cloud accounts monitored, with some solutions providing custom pricing for larger enterprises. For example, products like Prisma Cloud, CloudHealth, and Check Point CloudGuard are known to follow this pricing structure, reflecting the competitive landscape in the CSPM market.



### What level of support is typically offered by CSPM vendors?

CSPM vendors typically offer a range of support options, including 24/7 customer support, dedicated account managers, and extensive documentation. For instance, vendors like Palo Alto Networks and Check Point Software Technologies are noted for their responsive support teams and comprehensive onboarding processes. Additionally, many users highlight the availability of community forums and knowledge bases, which enhance user experience and troubleshooting. Overall, the level of support can vary, but many vendors prioritize customer assistance to ensure effective use of their solutions.




