Best Risk-Based Vulnerability Management Software - Page 2

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities
Show More
Show Less

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
194 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key func

    Users
    • Cyber Security Analyst
    • SOC Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    50
    Threat Detection
    37
    Integrations
    28
    Cybersecurity
    27
    Features
    27
    Cons
    Expensive
    28
    Difficult Learning
    17
    Complexity
    14
    Integration Issues
    14
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.5
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    128,238 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18,396 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key func

Users
  • Cyber Security Analyst
  • SOC Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
50
Threat Detection
37
Integrations
28
Cybersecurity
27
Features
27
Cons
Expensive
28
Difficult Learning
17
Complexity
14
Integration Issues
14
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
9.6
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.5
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
128,238 Twitter followers
LinkedIn® Page
www.linkedin.com
18,396 employees on LinkedIn®
Ownership
NYSE: PANW
(18)4.7 out of 5
7th Easiest To Use in Risk-Based Vulnerability Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HeroDevs Never-Ending Support provides secure drop-in replacements and updates for end-of-life open source libraries, protecting businesses from vulnerabilities in deprecated software. Our team delive

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 61% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HeroDevs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Integrations
    7
    Ease of Use
    6
    Security
    6
    Authentication Security
    5
    Cons
    Expensive
    4
    Dashboard Issues
    2
    Missing Features
    2
    Additional Costs
    1
    Complex Implementation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HeroDevs features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.3
    7.5
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HeroDevs
    Year Founded
    2018
    HQ Location
    Sandy, Utah
    Twitter
    @herodevs
    2,683 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    100 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HeroDevs Never-Ending Support provides secure drop-in replacements and updates for end-of-life open source libraries, protecting businesses from vulnerabilities in deprecated software. Our team delive

Users
No information available
Industries
No information available
Market Segment
  • 61% Mid-Market
  • 39% Small-Business
HeroDevs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Integrations
7
Ease of Use
6
Security
6
Authentication Security
5
Cons
Expensive
4
Dashboard Issues
2
Missing Features
2
Additional Costs
1
Complex Implementation
1
HeroDevs features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.3
7.5
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
HeroDevs
Year Founded
2018
HQ Location
Sandy, Utah
Twitter
@herodevs
2,683 Twitter followers
LinkedIn® Page
www.linkedin.com
100 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(143)4.5 out of 5
Optimized for quick response
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Vulnerability Identification
    8
    Automation
    7
    Customer Support
    7
    Security
    6
    Cons
    Inadequate Reporting
    3
    Access Control
    2
    False Positives
    2
    Limited Reporting
    2
    Missing Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.0
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,370 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    486 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Vulnerability Identification
8
Automation
7
Customer Support
7
Security
6
Cons
Inadequate Reporting
3
Access Control
2
False Positives
2
Limited Reporting
2
Missing Features
2
Pentera features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.0
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,370 Twitter followers
LinkedIn® Page
www.linkedin.com
486 employees on LinkedIn®
(14)4.9 out of 5
Optimized for quick response
8th Easiest To Use in Risk-Based Vulnerability Management software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

    Users
    No information available
    Industries
    • Consulting
    Market Segment
    • 43% Enterprise
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PlexTrac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    7
    Customer Support
    6
    Ease of Use
    6
    Reporting Efficiency
    6
    Integrations
    5
    Cons
    Missing Features
    2
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PlexTrac features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.9
    Reporting
    Average: 8.7
    6.9
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PlexTrac
    Company Website
    Year Founded
    2016
    HQ Location
    Boise, Idaho
    Twitter
    @plextrac
    1,660 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PlexTrac is the leading AI-powered platform for pentest reporting and threat exposure management, trusted by Fortune 500 companies and top security providers. Built to help cybersecurity teams continu

Users
No information available
Industries
  • Consulting
Market Segment
  • 43% Enterprise
  • 36% Small-Business
PlexTrac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
7
Customer Support
6
Ease of Use
6
Reporting Efficiency
6
Integrations
5
Cons
Missing Features
2
Complexity
1
Complex Setup
1
Difficult Learning
1
Inadequate Reporting
1
PlexTrac features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.9
Reporting
Average: 8.7
6.9
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.8
Seller Details
Seller
PlexTrac
Company Website
Year Founded
2016
HQ Location
Boise, Idaho
Twitter
@plextrac
1,660 Twitter followers
LinkedIn® Page
www.linkedin.com
86 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Community-driven hybrid Active Directory security assessment tool. Purple Knight is an identity system security assessment tool used by thousands of organizations to quickly identify vulnerabiliti

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Small-Business
    • 45% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Semperis Purple Knight Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    4
    Ease of Use
    4
    Data Discovery
    3
    Detailed Explanation
    3
    Implementation Ease
    2
    Cons
    Information Management
    2
    Lack of Automation
    2
    Difficult Learning
    1
    Difficult Setup
    1
    Inadequate Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semperis Purple Knight features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Reporting
    Average: 8.7
    8.2
    Vulnerability Intelligence
    Average: 8.7
    8.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semperis
    Company Website
    Year Founded
    2015
    HQ Location
    Hoboken, New Jersey
    Twitter
    @SemperisTech
    10,095 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    620 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Community-driven hybrid Active Directory security assessment tool. Purple Knight is an identity system security assessment tool used by thousands of organizations to quickly identify vulnerabiliti

Users
No information available
Industries
No information available
Market Segment
  • 45% Small-Business
  • 45% Mid-Market
Semperis Purple Knight Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
4
Ease of Use
4
Data Discovery
3
Detailed Explanation
3
Implementation Ease
2
Cons
Information Management
2
Lack of Automation
2
Difficult Learning
1
Difficult Setup
1
Inadequate Reporting
1
Semperis Purple Knight features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
8.7
Reporting
Average: 8.7
8.2
Vulnerability Intelligence
Average: 8.7
8.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Semperis
Company Website
Year Founded
2015
HQ Location
Hoboken, New Jersey
Twitter
@SemperisTech
10,095 Twitter followers
LinkedIn® Page
www.linkedin.com
620 employees on LinkedIn®
(102)4.5 out of 5
Optimized for quick response
10th Easiest To Use in Risk-Based Vulnerability Management software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZeroFox is the solution used to illuminate threat actor intent, mitigate threats and exposures, remove threats from the internet, and preemptively safeguard your reputation. ZeroFox uniquely fuses the

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 43% Enterprise
    • 27% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • ZeroFox is a digital risk protection platform that monitors and remediates threats across social media, websites, and other external digital channels.
    • Users like ZeroFox's ability to proactively identify and mitigate threats, its user-friendly interface, and its efficient takedown services for fraudulent sites and accounts.
    • Users experienced issues with the platform producing a large number of alerts, some of which are false positives, and the takedown processes can sometimes be slow and require a significant amount of evidence.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ZeroFox Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Protection
    32
    Threat Detection
    28
    Alert Notifications
    23
    Alerts
    22
    Cons
    Inefficient Alerts
    24
    False Alarms
    16
    Slow Performance
    14
    False Positives
    12
    Inefficient Alert System
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZeroFox features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.7
    8.6
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZeroFox
    Company Website
    Year Founded
    2013
    HQ Location
    Baltimore, MD
    Twitter
    @ZeroFOX
    5,198 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZeroFox is the solution used to illuminate threat actor intent, mitigate threats and exposures, remove threats from the internet, and preemptively safeguard your reputation. ZeroFox uniquely fuses the

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 43% Enterprise
  • 27% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • ZeroFox is a digital risk protection platform that monitors and remediates threats across social media, websites, and other external digital channels.
  • Users like ZeroFox's ability to proactively identify and mitigate threats, its user-friendly interface, and its efficient takedown services for fraudulent sites and accounts.
  • Users experienced issues with the platform producing a large number of alerts, some of which are false positives, and the takedown processes can sometimes be slow and require a significant amount of evidence.
ZeroFox Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Protection
32
Threat Detection
28
Alert Notifications
23
Alerts
22
Cons
Inefficient Alerts
24
False Alarms
16
Slow Performance
14
False Positives
12
Inefficient Alert System
11
ZeroFox features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.7
8.6
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.8
Seller Details
Seller
ZeroFox
Company Website
Year Founded
2013
HQ Location
Baltimore, MD
Twitter
@ZeroFOX
5,198 Twitter followers
LinkedIn® Page
www.linkedin.com
888 employees on LinkedIn®
(25)4.9 out of 5
4th Easiest To Use in Risk-Based Vulnerability Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreatMon is an AI-powered cyber risk intelligence platform designed to assist organizations in detecting, analyzing, and responding to external cyber threats that may impact their digital assets, bra

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 40% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatMon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    10
    Threat Detection
    10
    Ease of Use
    7
    Detailed Analysis
    6
    Threat Intelligence
    6
    Cons
    Excessive Notifications
    4
    Information Overload
    4
    Limited Features
    4
    Inefficient Alerts
    3
    Inefficient Alert System
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatMon features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    9.8
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.5
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ThreatMon
    Company Website
    Year Founded
    2018
    HQ Location
    Sterling VA
    Twitter
    @MonThreat
    15,845 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreatMon is an AI-powered cyber risk intelligence platform designed to assist organizations in detecting, analyzing, and responding to external cyber threats that may impact their digital assets, bra

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 40% Mid-Market
  • 36% Enterprise
ThreatMon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
10
Threat Detection
10
Ease of Use
7
Detailed Analysis
6
Threat Intelligence
6
Cons
Excessive Notifications
4
Information Overload
4
Limited Features
4
Inefficient Alerts
3
Inefficient Alert System
3
ThreatMon features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
9.8
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.5
Risk-Prioritization
Average: 8.8
Seller Details
Seller
ThreatMon
Company Website
Year Founded
2018
HQ Location
Sterling VA
Twitter
@MonThreat
15,845 Twitter followers
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
(60)4.4 out of 5
Optimized for quick response
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and manage

    Users
    No information available
    Industries
    • Information Technology and Services
    • Hospital & Health Care
    Market Segment
    • 73% Enterprise
    • 13% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SAFE Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    24
    Customer Support
    13
    Features
    11
    Integrations
    11
    Ease of Use
    10
    Cons
    Missing Features
    10
    Information Management
    3
    Integration Issues
    3
    Limited Customization
    3
    Confusing Interface
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAFE features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    7.4
    Reporting
    Average: 8.7
    8.1
    Vulnerability Intelligence
    Average: 8.7
    8.8
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Palo Alto, US
    Twitter
    @safecrq
    3,266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,208 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and manage

Users
No information available
Industries
  • Information Technology and Services
  • Hospital & Health Care
Market Segment
  • 73% Enterprise
  • 13% Mid-Market
SAFE Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
24
Customer Support
13
Features
11
Integrations
11
Ease of Use
10
Cons
Missing Features
10
Information Management
3
Integration Issues
3
Limited Customization
3
Confusing Interface
2
SAFE features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
7.4
Reporting
Average: 8.7
8.1
Vulnerability Intelligence
Average: 8.7
8.8
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2012
HQ Location
Palo Alto, US
Twitter
@safecrq
3,266 Twitter followers
LinkedIn® Page
www.linkedin.com
1,208 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Award-winning Risk-Based Vulnerability Management. Nipper solutions analyze network device configurations in the way Advances Persistent Threat (APT) groups do, to identify misconfigurations that

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 52% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Titania Nipper Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Reporting Quality
    6
    Scanning Efficiency
    4
    Vulnerability Detection
    4
    Clear Interface
    3
    Cons
    Licensing Issues
    3
    False Positives
    2
    Lack of Cloud Support
    2
    Limited Compatibility
    2
    Limited Scope
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Titania Nipper features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Reporting
    Average: 8.7
    2.5
    Vulnerability Intelligence
    Average: 8.7
    7.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Titania
    Company Website
    Year Founded
    2009
    HQ Location
    London, GB
    Twitter
    @TitaniaLtd
    2,831 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Award-winning Risk-Based Vulnerability Management. Nipper solutions analyze network device configurations in the way Advances Persistent Threat (APT) groups do, to identify misconfigurations that

Users
No information available
Industries
No information available
Market Segment
  • 52% Enterprise
  • 19% Mid-Market
Titania Nipper Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Reporting Quality
6
Scanning Efficiency
4
Vulnerability Detection
4
Clear Interface
3
Cons
Licensing Issues
3
False Positives
2
Lack of Cloud Support
2
Limited Compatibility
2
Limited Scope
2
Titania Nipper features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.3
9.3
Reporting
Average: 8.7
2.5
Vulnerability Intelligence
Average: 8.7
7.9
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Titania
Company Website
Year Founded
2009
HQ Location
London, GB
Twitter
@TitaniaLtd
2,831 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
(78)4.4 out of 5
14th Easiest To Use in Risk-Based Vulnerability Management software
Entry Level Price:$22 /asset*
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightVM (Nexpose) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    4
    Vulnerability Identification
    4
    Asset Management
    3
    Features
    3
    Prioritization
    3
    Cons
    Complexity
    3
    Performance Issues
    2
    Resource Limitations
    2
    Resource Management
    2
    Time-Consuming
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.4
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,769 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,249 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 32% Mid-Market
InsightVM (Nexpose) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
4
Vulnerability Identification
4
Asset Management
3
Features
3
Prioritization
3
Cons
Complexity
3
Performance Issues
2
Resource Limitations
2
Resource Management
2
Time-Consuming
2
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.4
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,769 Twitter followers
LinkedIn® Page
www.linkedin.com
3,249 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecOps Solution is a next-gen, agentless patch and vulnerability management platform that helps organizations fix vulnerabilities fast — without agents, manual effort, or complex setups. We automat

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 69% Small-Business
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecOps Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Patch Management
    6
    Customer Support
    5
    Reporting
    5
    Detailed Explanation
    4
    Reporting Efficiency
    4
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecOps Solution features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Mountain View, California, USA
    Twitter
    @secopsolution
    37 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecOps Solution is a next-gen, agentless patch and vulnerability management platform that helps organizations fix vulnerabilities fast — without agents, manual effort, or complex setups. We automat

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 69% Small-Business
  • 25% Mid-Market
SecOps Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Patch Management
6
Customer Support
5
Reporting
5
Detailed Explanation
4
Reporting Efficiency
4
Cons
This product has not yet received any negative sentiments.
SecOps Solution features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
9.6
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2021
HQ Location
Mountain View, California, USA
Twitter
@secopsolution
37 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    What Is Edgescan? Edgescan is a cybersecurity company that helps organizations proactively identify, validate, and prioritize vulnerabilities across their applications, API’s and digital landscape.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 32% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    25
    Vulnerability Detection
    24
    Customer Support
    19
    Vulnerability Identification
    19
    Features
    18
    Cons
    Complex UI
    5
    Limited Customization
    5
    Poor Interface Design
    5
    Slow Performance
    5
    UX Improvement
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.4
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2017
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,273 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    89 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

What Is Edgescan? Edgescan is a cybersecurity company that helps organizations proactively identify, validate, and prioritize vulnerabilities across their applications, API’s and digital landscape.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 32% Enterprise
  • 32% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
25
Vulnerability Detection
24
Customer Support
19
Vulnerability Identification
19
Features
18
Cons
Complex UI
5
Limited Customization
5
Poor Interface Design
5
Slow Performance
5
UX Improvement
5
Edgescan features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.7
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.4
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Edgescan
Company Website
Year Founded
2017
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,273 Twitter followers
LinkedIn® Page
www.linkedin.com
89 employees on LinkedIn®
(33)4.8 out of 5
12th Easiest To Use in Risk-Based Vulnerability Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureFlag is a Developer Risk Management Platform that combines automated threat modeling with hands-on secure coding training to help organizations reduce application risk across the software develo

    Users
    No information available
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureFlag features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    London, United Kingdom
    LinkedIn® Page
    www.linkedin.com
    58 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecureFlag is a Developer Risk Management Platform that combines automated threat modeling with hands-on secure coding training to help organizations reduce application risk across the software develo

Users
No information available
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 27% Enterprise
SecureFlag features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
HQ Location
London, United Kingdom
LinkedIn® Page
www.linkedin.com
58 employees on LinkedIn®
(97)4.5 out of 5
13th Easiest To Use in Risk-Based Vulnerability Management software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot® is a sophisticated AI-powered automated penetration testing solution designed to assist organizations in evaluating their cybersecurity posture and controls. By simulating real-world attacks

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Small-Business
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    16
    Ease of Use
    15
    Pentesting Efficiency
    12
    Vulnerability Identification
    12
    Efficiency
    9
    Cons
    Complexity
    4
    Complex Setup
    4
    Missing Features
    4
    Poor Customer Support
    3
    Poor Documentation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RidgeBot features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Reporting
    Average: 8.7
    9.0
    Vulnerability Intelligence
    Average: 8.7
    9.1
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,289 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot® is a sophisticated AI-powered automated penetration testing solution designed to assist organizations in evaluating their cybersecurity posture and controls. By simulating real-world attacks

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Small-Business
  • 44% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
16
Ease of Use
15
Pentesting Efficiency
12
Vulnerability Identification
12
Efficiency
9
Cons
Complexity
4
Complex Setup
4
Missing Features
4
Poor Customer Support
3
Poor Documentation
3
RidgeBot features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.7
Reporting
Average: 8.7
9.0
Vulnerability Intelligence
Average: 8.7
9.1
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,289 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(621)4.4 out of 5
Optimized for quick response
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Complete DevOps solution. CloudBees empowers your software delivery teams to transform your business. CloudBees solution brings together development, operations, IT, security, and business teams t

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CloudBees Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    5
    Reliability
    5
    Customization
    4
    Ease of Use
    4
    Integrations
    4
    Cons
    Complex Interface
    2
    Complexity
    2
    Complex Setup
    2
    Complex User Interface
    2
    Configuration Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudBees features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    8.8
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudBees
    Company Website
    Year Founded
    2010
    HQ Location
    San Jose, CA
    Twitter
    @CloudBees
    39,315 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    518 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Complete DevOps solution. CloudBees empowers your software delivery teams to transform your business. CloudBees solution brings together development, operations, IT, security, and business teams t

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Enterprise
  • 41% Mid-Market
CloudBees Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
5
Reliability
5
Customization
4
Ease of Use
4
Integrations
4
Cons
Complex Interface
2
Complexity
2
Complex Setup
2
Complex User Interface
2
Configuration Issues
2
CloudBees features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.3
9.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
8.8
Risk-Prioritization
Average: 8.8
Seller Details
Seller
CloudBees
Company Website
Year Founded
2010
HQ Location
San Jose, CA
Twitter
@CloudBees
39,315 Twitter followers
LinkedIn® Page
www.linkedin.com
518 employees on LinkedIn®