Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Vulnerability Management Software - Page 4

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Risk-Based Vulnerability Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
188 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cybeats is at the forefront of cybersecurity innovation and is focused explicitly on automating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) management. Our platfo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cybeats features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYBEATS
    Year Founded
    2017
    HQ Location
    Toronto, Ontario
    Twitter
    @cybeatstech
    621 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cybeats is at the forefront of cybersecurity innovation and is focused explicitly on automating Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) management. Our platfo

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 33% Mid-Market
Cybeats features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
CYBEATS
Year Founded
2017
HQ Location
Toronto, Ontario
Twitter
@cybeatstech
621 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Armis Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Asset Management
    2
    Customer Support
    2
    Detailed Information
    2
    Cons
    Integration Issues
    2
    Additional Costs
    1
    Complex Setup
    1
    Difficult Setup
    1
    Excessive Notifications
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Armis features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Reporting
    Average: 8.7
    8.6
    Vulnerability Intelligence
    Average: 8.7
    7.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2015
    HQ Location
    San Francisco, US
    Twitter
    @ArmisSecurity
    2,771 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Armis is THE cyber exposure management and security solution designed to help organizations protect their entire attack surface and manage cyber risk exposure in real time. In an era where traditional

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 33% Small-Business
Armis Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Asset Management
2
Customer Support
2
Detailed Information
2
Cons
Integration Issues
2
Additional Costs
1
Complex Setup
1
Difficult Setup
1
Excessive Notifications
1
Armis features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.3
9.3
Reporting
Average: 8.7
8.6
Vulnerability Intelligence
Average: 8.7
7.9
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2015
HQ Location
San Francisco, US
Twitter
@ArmisSecurity
2,771 Twitter followers
LinkedIn® Page
www.linkedin.com
1,155 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Ethiack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Cybersecurity
    3
    Innovation
    3
    Automation
    2
    Real-time Monitoring
    2
    Cons
    Asset Management
    2
    Expensive
    1
    Lack of Automation
    1
    Limited Features
    1
    Missing Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ethiack features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.8
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ethiack
    Year Founded
    2022
    HQ Location
    Coimbra, Coimbra, Portugal
    LinkedIn® Page
    www.linkedin.com
    49 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ethiack - Autonomous Ethical Hacking. Our platform continuously tests your entire attack surface using a powerful combination of AI pentesting agents and human ethical hackers. While traditional pente

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 33% Small-Business
Ethiack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Cybersecurity
3
Innovation
3
Automation
2
Real-time Monitoring
2
Cons
Asset Management
2
Expensive
1
Lack of Automation
1
Limited Features
1
Missing Features
1
Ethiack features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.8
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Ethiack
Year Founded
2022
HQ Location
Coimbra, Coimbra, Portugal
LinkedIn® Page
www.linkedin.com
49 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Created from three decades of expertise in security, risk, and compliance assurance, the TruOps governance, risk, and compliance platform transforms siloed risk functions into a comprehensive Risk Ope

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 47% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • TruOps Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    10
    Ease of Use
    8
    Customizability
    7
    Customization
    6
    Integrations
    5
    Cons
    Complex Setup
    3
    Difficult Learning
    3
    Inadequate Reporting
    3
    Limited Reporting
    3
    Not Intuitive
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TruOps features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    6.0
    Reporting
    Average: 8.7
    7.7
    Vulnerability Intelligence
    Average: 8.7
    7.7
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    TruOps
    HQ Location
    Norwalk, Connecticut
    LinkedIn® Page
    www.linkedin.com
    10 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Created from three decades of expertise in security, risk, and compliance assurance, the TruOps governance, risk, and compliance platform transforms siloed risk functions into a comprehensive Risk Ope

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 47% Enterprise
TruOps Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
10
Ease of Use
8
Customizability
7
Customization
6
Integrations
5
Cons
Complex Setup
3
Difficult Learning
3
Inadequate Reporting
3
Limited Reporting
3
Not Intuitive
3
TruOps features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
6.0
Reporting
Average: 8.7
7.7
Vulnerability Intelligence
Average: 8.7
7.7
Risk-Prioritization
Average: 8.8
Seller Details
Seller
TruOps
HQ Location
Norwalk, Connecticut
LinkedIn® Page
www.linkedin.com
10 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A complete platform to automate the most challenging aspects of access governance. Pathlock does this by focusing on the areas which offer the most impact when it comes to efficiency gains and cost sa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pathlock Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accessibility
    1
    Comprehensive View
    1
    Customer Support
    1
    Device Management
    1
    Documentation
    1
    Cons
    Confusing Interface
    1
    Confusing Terminology
    1
    Documentation
    1
    Error Handling
    1
    Insufficient Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pathlock features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    6.7
    Reporting
    Average: 8.7
    4.4
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pathlock
    Company Website
    Year Founded
    2004
    HQ Location
    Dallas, US
    Twitter
    @pathlock
    309 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    577 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A complete platform to automate the most challenging aspects of access governance. Pathlock does this by focusing on the areas which offer the most impact when it comes to efficiency gains and cost sa

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 25% Mid-Market
Pathlock Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accessibility
1
Comprehensive View
1
Customer Support
1
Device Management
1
Documentation
1
Cons
Confusing Interface
1
Confusing Terminology
1
Documentation
1
Error Handling
1
Insufficient Information
1
Pathlock features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
6.7
Reporting
Average: 8.7
4.4
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Pathlock
Company Website
Year Founded
2004
HQ Location
Dallas, US
Twitter
@pathlock
309 Twitter followers
LinkedIn® Page
www.linkedin.com
577 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intellige

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ThreatConnect TI Ops Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    5
    Threat Detection
    5
    Ease of Use
    4
    Automation
    3
    Implementation Ease
    3
    Cons
    UX Improvement
    2
    Additional Costs
    1
    API Limitations
    1
    Difficult Learning Curve
    1
    Difficult Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ThreatConnect TI Ops features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    6.7
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Arlington, US
    Twitter
    @ThreatConnect
    14,266 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    162 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TI Ops is the threat intelligence platform built for operations, not just centralization. It ingests hundreds of internal and external sources, enriches them with AI, and aligns them to your intellige

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Enterprise
  • 43% Mid-Market
ThreatConnect TI Ops Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
5
Threat Detection
5
Ease of Use
4
Automation
3
Implementation Ease
3
Cons
UX Improvement
2
Additional Costs
1
API Limitations
1
Difficult Learning Curve
1
Difficult Setup
1
ThreatConnect TI Ops features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
6.7
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2011
HQ Location
Arlington, US
Twitter
@ThreatConnect
14,266 Twitter followers
LinkedIn® Page
www.linkedin.com
162 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recently recognized by Crain's as one of Chicago's Most Innovative Companies 2025, UncommonX is an Exposure Management solution designed to help customers achieve comprehensive, real-time visibility a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • UncommonX Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    4
    Customer Support
    4
    Support Availability
    4
    Team Quality
    4
    Cybersecurity
    3
    Cons
    Communication Issues
    1
    Reporting Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UncommonX features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    9.0
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.7
    9.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    UncommonX
    Company Website
    Year Founded
    2012
    HQ Location
    Chicago, US
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recently recognized by Crain's as one of Chicago's Most Innovative Companies 2025, UncommonX is an Exposure Management solution designed to help customers achieve comprehensive, real-time visibility a

Users
No information available
Industries
No information available
Market Segment
  • 63% Mid-Market
  • 25% Enterprise
UncommonX Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
4
Customer Support
4
Support Availability
4
Team Quality
4
Cybersecurity
3
Cons
Communication Issues
1
Reporting Issues
1
Slow Performance
1
UncommonX features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
9.0
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.7
9.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
UncommonX
Company Website
Year Founded
2012
HQ Location
Chicago, US
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
Entry Level Price:$128.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    8iSoft YODA, the ultimate AI-powered vulnerability remediation platform for tech professionals. YODA provides a comprehensive solution to the challenges of vulnerability management, significantly redu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • 8iSoft YODA features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.3
    Reporting
    Average: 8.7
    9.7
    Vulnerability Intelligence
    Average: 8.7
    9.7
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    8iSoft
    Year Founded
    2020
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    9 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

8iSoft YODA, the ultimate AI-powered vulnerability remediation platform for tech professionals. YODA provides a comprehensive solution to the challenges of vulnerability management, significantly redu

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
8iSoft YODA features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.3
Reporting
Average: 8.7
9.7
Vulnerability Intelligence
Average: 8.7
9.7
Risk-Prioritization
Average: 8.8
Seller Details
Seller
8iSoft
Year Founded
2020
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
9 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cytix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Automated Testing
    2
    Clear Interface
    2
    Visibility
    2
    Customer Support
    1
    Cons
    Confusing Interface
    1
    Difficult Learning
    1
    Expensive
    1
    False Positives
    1
    Limited Customization
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cytix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cytix
    Year Founded
    2022
    HQ Location
    Manchester
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cytix continuously tests for vulnerability so that no issues go undetected and all results are validated, enriched and contextualised".Integration into your technologies and identifying changes that a

Users
No information available
Industries
No information available
Market Segment
  • 55% Small-Business
  • 36% Mid-Market
Cytix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Automated Testing
2
Clear Interface
2
Visibility
2
Customer Support
1
Cons
Confusing Interface
1
Difficult Learning
1
Expensive
1
False Positives
1
Limited Customization
1
Cytix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.6
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Cytix
Year Founded
2022
HQ Location
Manchester
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Titania Nipper Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    This product has not yet received any positive sentiments.
    Cons
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Titania Nipper features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    6.7
    Reporting
    Average: 8.7
    3.3
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Titania
    Year Founded
    2009
    HQ Location
    London, GB
    Twitter
    @TitaniaLtd
    2,838 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Analyzing configurations with the precision and know-how of a pentester, Nipper is a must have on-demand solution for configuration management, compliance and control. Network risk owners use Nippe

Users
No information available
Industries
No information available
Market Segment
  • 60% Enterprise
  • 40% Mid-Market
Titania Nipper Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
This product has not yet received any positive sentiments.
Cons
Licensing Issues
1
Titania Nipper features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
6.7
Reporting
Average: 8.7
3.3
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Titania
Year Founded
2009
HQ Location
London, GB
Twitter
@TitaniaLtd
2,838 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
(7)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endor Labs helps you build and ship secure software fast, whether it's written by humans and AI. While conventional code scanning tools drown teams in false positives, Endor Labs zeroes in on real ris

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Endor Labs Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    4
    Customer Support
    3
    Ease of Use
    3
    Vulnerability Detection
    3
    Accuracy of Findings
    2
    Cons
    UX Improvement
    2
    Difficult Setup
    1
    Integration Issues
    1
    Missing Features
    1
    Scanning Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Endor Labs features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    6.7
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2021
    HQ Location
    Palo Alto, California, United States
    Twitter
    @EndorLabs
    423 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    160 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endor Labs helps you build and ship secure software fast, whether it's written by humans and AI. While conventional code scanning tools drown teams in false positives, Endor Labs zeroes in on real ris

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 29% Enterprise
Endor Labs Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
4
Customer Support
3
Ease of Use
3
Vulnerability Detection
3
Accuracy of Findings
2
Cons
UX Improvement
2
Difficult Setup
1
Integration Issues
1
Missing Features
1
Scanning Issues
1
Endor Labs features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
6.7
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Company Website
Year Founded
2021
HQ Location
Palo Alto, California, United States
Twitter
@EndorLabs
423 Twitter followers
LinkedIn® Page
www.linkedin.com
160 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 53% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Forescout Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Internet Security
    3
    IP Addressing
    3
    Monitoring
    3
    Customization
    2
    Cons
    Complex Implementation
    2
    Dependency Issues
    2
    Integration Issues
    2
    Performance Issues
    2
    Poor Customer Support
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Platform features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,262 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,175 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It con

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 53% Enterprise
  • 33% Mid-Market
Forescout Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Internet Security
3
IP Addressing
3
Monitoring
3
Customization
2
Cons
Complex Implementation
2
Dependency Issues
2
Integration Issues
2
Performance Issues
2
Poor Customer Support
2
Forescout Platform features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,262 Twitter followers
LinkedIn® Page
www.linkedin.com
1,175 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qomplx features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QOMPLX
    Year Founded
    2015
    HQ Location
    Tysons, Virginia
    Twitter
    @QOMPLX
    582 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QOMPLX is a leading provider of identity-focused cybersecurity software solutions. Our technology continually monitors user activity across all points of access, including cloud and on-premise systems

Users
No information available
Industries
No information available
Market Segment
  • 55% Mid-Market
  • 27% Enterprise
Qomplx features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.8
Seller Details
Seller
QOMPLX
Year Founded
2015
HQ Location
Tysons, Virginia
Twitter
@QOMPLX
582 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Small-Business
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Reposify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    User Interface
    1
    Cons
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Reposify features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Reposify
    Year Founded
    2011
    HQ Location
    Remote, Oregon, United States
    Twitter
    @reposify
    LinkedIn® Page
    www.linkedin.com
    10,347 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Reposify is an External Attack Surface Management platform that delivers autonomous, 24/7 discovery of exposed internet assets and shadow IT risks so they can be eliminated before attackers exploit th

Users
No information available
Industries
No information available
Market Segment
  • 50% Small-Business
  • 25% Enterprise
Reposify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
User Interface
1
Cons
Expensive
1
Reposify features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Reposify
Year Founded
2011
HQ Location
Remote, Oregon, United States
Twitter
@reposify
LinkedIn® Page
www.linkedin.com
10,347 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Security leaders leverage Rivial's Data Security platform to accurately measure risk, automate compliance and easily manage their security program. Rivial leverages Monte Carlo analysis, Cyber Risk Q

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 90% Mid-Market
    • 10% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Rivial Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Helpful
    5
    Communication
    3
    Customer Support
    3
    Expertise
    3
    Team Helpfulness
    3
    Cons
    Learning Curve
    3
    Difficult Learning
    2
    Learning Difficulty
    2
    Audit Issues
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Rivial Data Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2010
    HQ Location
    West Lafayette, Indiana
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Security leaders leverage Rivial's Data Security platform to accurately measure risk, automate compliance and easily manage their security program. Rivial leverages Monte Carlo analysis, Cyber Risk Q

Users
No information available
Industries
  • Financial Services
Market Segment
  • 90% Mid-Market
  • 10% Small-Business
Rivial Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Helpful
5
Communication
3
Customer Support
3
Expertise
3
Team Helpfulness
3
Cons
Learning Curve
3
Difficult Learning
2
Learning Difficulty
2
Audit Issues
1
Complexity
1
Rivial Data Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2010
HQ Location
West Lafayette, Indiana
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®