Introducing G2.ai, the future of software buying.Try now

Top Free Risk-Based Vulnerability Management Software - Page 2

Check out our list of free Risk-Based Vulnerability Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Risk-Based Vulnerability Management Software to ensure you get the right product.

View Free Risk-Based Vulnerability Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
50 Risk-Based Vulnerability Management Products Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 53% Enterprise
    • 26% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Continuity Software features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    8.6
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NS
    It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
    PS
    What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @ContinuitySoft
    444 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    62 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

New ransomware groups are targeting storage and backup systems (e.g., Conti, Hive and REvil). However, storage & backup are currently the only infrastructure layers NOT COVERED by traditional vuln

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 53% Enterprise
  • 26% Small-Business
Continuity Software features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
8.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
8.6
Risk-Prioritization
Average: 8.8
NS
It helps to reducing the stress and uncertainty associated with managing complex IT environments. It also help in terms of increasing... Read review
PS
What I like best about Continuity Software is its robust ability to ensure business continuity through comprehensive monitoring and predictive... Read review
Seller Details
Year Founded
2005
HQ Location
New York, US
Twitter
@ContinuitySoft
444 Twitter followers
LinkedIn® Page
www.linkedin.com
62 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 85% Small-Business
    • 15% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HostedScan.com features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    7.5
    Vulnerability Intelligence
    Average: 8.7
    7.5
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • ER
    The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
    Jon R.
    JR
    Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Seattle, Washington
    Twitter
    @hostedscan
    59 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HostedScan provides 24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or

Users
No information available
Industries
No information available
Market Segment
  • 85% Small-Business
  • 15% Mid-Market
HostedScan.com features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
7.5
Vulnerability Intelligence
Average: 8.7
7.5
Risk-Prioritization
Average: 8.8
ER
The simplicity of their reports and the number of different scans available. Super easy-to-use panel. And, of course, their free plan option to... Read review
Jon R.
JR
Automated scans get sent to me every month and keep cyber security as a priority. With the possibility of becoming complacent and take my mind off... Read review
Seller Details
Year Founded
2019
HQ Location
Seattle, Washington
Twitter
@hostedscan
59 Twitter followers
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybeats is at the forefront of cybersecurity innovation and is focused explicitly on automating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) management. Our platfo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybeats features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Neelakanta P.
    NP
    Cybeats is one of its kind tool which discovers varies possible risks and also mitage the effect by reducing the damage on the systems. Hence... Read review
    NARENDRA PAL SINGH R.
    NR
    Endpoint management and free cloud best solution is best part Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYBEATS
    Year Founded
    2017
    HQ Location
    Toronto, Ontario
    Twitter
    @cybeatstech
    621 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybeats is at the forefront of cybersecurity innovation and is focused explicitly on automating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) management. Our platfo

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 33% Mid-Market
Cybeats features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Neelakanta P.
NP
Cybeats is one of its kind tool which discovers varies possible risks and also mitage the effect by reducing the damage on the systems. Hence... Read review
NARENDRA PAL SINGH R.
NR
Endpoint management and free cloud best solution is best part Read review
Seller Details
Seller
CYBEATS
Year Founded
2017
HQ Location
Toronto, Ontario
Twitter
@cybeatstech
621 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ethiack features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.8
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Airlines/Aviation
    UA
    Is its ability to replicate real-world attack scenarios in a controlled and efficient way, helping me uncover vulnerabilities before adversaries... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ethiack
    Year Founded
    2022
    HQ Location
    Coimbra, Coimbra, Portugal
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Ethiack features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.8
Risk-Prioritization
Average: 8.8
Verified User in Airlines/Aviation
UA
Is its ability to replicate real-world attack scenarios in a controlled and efficient way, helping me uncover vulnerabilities before adversaries... Read review
Seller Details
Seller
Ethiack
Year Founded
2022
HQ Location
Coimbra, Coimbra, Portugal
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cytix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • vikas D.
    VD
    It's realy greate to use and help to achive business requirements Read review
    Verified User in Information Technology and Services
    UI
    Reduces time and automation, supports third party apps Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cytix
    Year Founded
    2022
    HQ Location
    Manchester
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 36% Mid-Market
Cytix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.6
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.8
vikas D.
VD
It's realy greate to use and help to achive business requirements Read review
Verified User in Information Technology and Services
UI
Reduces time and automation, supports third party apps Read review
Seller Details
Seller
Cytix
Year Founded
2022
HQ Location
Manchester
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Titania Nipper features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    6.7
    Reporting
    Average: 8.7
    3.3
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Frank B.
    FB
    The software does a great job creating an effective report that dives into security flaws with a network configuration. The ability for it to... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Titania
    Year Founded
    2009
    HQ Location
    London, GB
    Twitter
    @TitaniaLtd
    2,838 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Titania Nipper features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
6.7
Reporting
Average: 8.7
3.3
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.8
Frank B.
FB
The software does a great job creating an effective report that dives into security flaws with a network configuration. The ability for it to... Read review
Seller Details
Seller
Titania
Year Founded
2009
HQ Location
London, GB
Twitter
@TitaniaLtd
2,838 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 89% Small-Business
    • 11% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Senteon System Hardening features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    0.0
    No information available
    10.0
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • TS
    Ease of use and time saved being able to align system security configurations across the environment from one portal. Read review
    Dan L.
    DL
    Senteon stands out for its robust alignment with the Windows ecosystem and its intuitive interface that simplifies the management and security of a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Senteon
    Year Founded
    2019
    HQ Location
    Marietta, US
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

Users
No information available
Industries
No information available
Market Segment
  • 89% Small-Business
  • 11% Mid-Market
Senteon System Hardening features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
0.0
No information available
10.0
Risk-Prioritization
Average: 8.8
TS
Ease of use and time saved being able to align system security configurations across the environment from one portal. Read review
Dan L.
DL
Senteon stands out for its robust alignment with the Windows ecosystem and its intuitive interface that simplifies the management and security of a... Read review
Seller Details
Seller
Senteon
Year Founded
2019
HQ Location
Marietta, US
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul W.
    RW
    Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
    Alan Salvador A.
    AA
    Data is mostly relevant, also dashboards can be granular or how we need them Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Rahul W.
RW
Balbix is our security shield , its easy to use provides detailed security analytics for our system. Read review
Alan Salvador A.
AA
Data is mostly relevant, also dashboards can be granular or how we need them Read review
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • H2Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Stanislav G.
    SG
    A fast and straightforward way to start building a compliance program around NIST. Self-service management and a price that is hard to beat. This... Read review
    Jonathan M.
    JM
    I love how the questionnaire guides you through different aspects of cybersecurity, and you have access to a comprehensive report in 24 hours. I... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    H2Cyber
    Year Founded
    2009
    HQ Location
    Prosper, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
H2Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Stanislav G.
SG
A fast and straightforward way to start building a compliance program around NIST. Self-service management and a price that is hard to beat. This... Read review
Jonathan M.
JM
I love how the questionnaire guides you through different aspects of cybersecurity, and you have access to a comprehensive report in 24 hours. I... Read review
Seller Details
Seller
H2Cyber
Year Founded
2009
HQ Location
Prosper, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy... Read review
    MG
    Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.8
Verified User in Information Technology and Services
CI
The platform provides a broad set of functionalities, this not only includes vulnerability scanning but also user awareness (phishing) and policy... Read review
MG
Holm VMP is good for auth scanning and Phishing simulation and awareness exercise with multiple templates Read review
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Discovery features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mayur S.
    MS
    Our security team does not need to build scripts or in-house tools to have 360 degrees of asset management, especially monitoring the dark web,... Read review
    Oleksandr M.
    OM
    Continuamente monitoreando la superficie de ataque. Repetidamente informado sobre cosas críticas para la empresa, que podrían llevar a grandes... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    Geneva, CH
    Twitter
    @immuniweb
    8,534 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ImmuniWeb Discovery features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Mayur S.
MS
Our security team does not need to build scripts or in-house tools to have 360 degrees of asset management, especially monitoring the dark web,... Read review
Oleksandr M.
OM
Continuamente monitoreando la superficie de ataque. Repetidamente informado sobre cosas críticas para la empresa, que podrían llevar a grandes... Read review
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
Geneva, CH
Twitter
@immuniweb
8,534 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Phoenix Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    UI
    Simple UI level of customization Effortless User Experience with Simple UI Phoenix Security's platform offers a straightforward, intuitive user... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    London, GB
    Twitter
    @sec_phoenix
    267 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Phoenix Security is a Contextual ASPM focused on product security. It combines risk-based Vulnerability Management, Application Security Posture Management, and Cloud into a risk and remediation-first

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Phoenix Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Verified User in Information Technology and Services
UI
Simple UI level of customization Effortless User Experience with Simple UI Phoenix Security's platform offers a straightforward, intuitive user... Read review
Seller Details
Year Founded
2021
HQ Location
London, GB
Twitter
@sec_phoenix
267 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Prelude helps security and IT teams continuously validate that their security controls are fully deployed, optimally configured, and working as intended. Through read-only, API integrations to your ex

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Prelude Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    AF
    We deployed Prelude Detect in our environment in roughly 5 minutes (Via API) and within 10 minutes of deploying it and running tests, we were... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    N/A
    Twitter
    @preludeorg
    1,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Prelude helps security and IT teams continuously validate that their security controls are fully deployed, optimally configured, and working as intended. Through read-only, API integrations to your ex

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Prelude Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Verified User in Financial Services
AF
We deployed Prelude Detect in our environment in roughly 5 minutes (Via API) and within 10 minutes of deploying it and running tests, we were... Read review
Seller Details
Year Founded
2020
HQ Location
N/A
Twitter
@preludeorg
1,560 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RankedRight features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Andy L.
    AL
    I'm really impressed with RankedRight - the platform and the team. They've taken onboard what I need and what I'm looking for, and the challenges... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RankedRight is the triage tool that automatically ranks vulnerabilities - new and existing - based on the rules set by its user, factoring in what is critical to the business, and delegating it to the

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
RankedRight features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Andy L.
AL
I'm really impressed with RankedRight - the platform and the team. They've taken onboard what I need and what I'm looking for, and the challenges... Read review
Seller Details
Year Founded
2020
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Rescana is a cybersecurity company focused on Third-Party Risk Management (TPRM) and External Attack Surface Management (EASM). It was founded in 2016 and has evolved into a platform that uses AI-powe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rescana features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Omry M.
    OM
    Great workflows for managing security risks for third parties, multple integragions. User friendly UI+UX Discover organizations assent whitin... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rescana
    Year Founded
    2017
    HQ Location
    Tel Aviv, IL
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Rescana is a cybersecurity company focused on Third-Party Risk Management (TPRM) and External Attack Surface Management (EASM). It was founded in 2016 and has evolved into a platform that uses AI-powe

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Rescana features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Omry M.
OM
Great workflows for managing security risks for third parties, multple integragions. User friendly UI+UX Discover organizations assent whitin... Read review
Seller Details
Seller
Rescana
Year Founded
2017
HQ Location
Tel Aviv, IL
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®