Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Vulnerability Management Software - Page 5

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Risk-Based Vulnerability Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
187 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ArmorCode is redefining security governance in the AI era as the independent control plane for software and infrastructure security. Recognized by customers and industry analysts as the leader in Appl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ArmorCode Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Management
    1
    Easy Integrations
    1
    Integrations
    1
    Visibility
    1
    Cons
    Inadequate Reporting
    1
    Limited Customization
    1
    Reporting Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ArmorCode features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ArmorCode
    Year Founded
    2020
    HQ Location
    Palo Alto, California, United States
    LinkedIn® Page
    www.linkedin.com
    209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ArmorCode is redefining security governance in the AI era as the independent control plane for software and infrastructure security. Recognized by customers and industry analysts as the leader in Appl

Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Small-Business
ArmorCode Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Management
1
Easy Integrations
1
Integrations
1
Visibility
1
Cons
Inadequate Reporting
1
Limited Customization
1
Reporting Issues
1
ArmorCode features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.8
Seller Details
Seller
ArmorCode
Year Founded
2020
HQ Location
Palo Alto, California, United States
LinkedIn® Page
www.linkedin.com
209 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bacon Unlimited is a cross-platform endpoint management and vulnerability remediation platform designed to help IT teams manage vulnerabilities and system updates. Built for organizations that are tir

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bacon Unlimited Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Endpoint Management
    3
    Security
    3
    Cross-Platform Compatibility
    2
    Centralized Management
    1
    Customer Support
    1
    Cons
    Difficult Learning Curve
    1
    Difficulty in Use
    1
    Learning Curve
    1
    Missing Features
    1
    Poor Reporting
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bacon Unlimited features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Wilmington, US
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bacon Unlimited is a cross-platform endpoint management and vulnerability remediation platform designed to help IT teams manage vulnerabilities and system updates. Built for organizations that are tir

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
Bacon Unlimited Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Endpoint Management
3
Security
3
Cross-Platform Compatibility
2
Centralized Management
1
Customer Support
1
Cons
Difficult Learning Curve
1
Difficulty in Use
1
Learning Curve
1
Missing Features
1
Poor Reporting
1
Bacon Unlimited features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2019
HQ Location
Wilmington, US
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DeCYFIR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Threat Detection
    12
    Threat Intelligence
    10
    Cybersecurity
    9
    Features
    7
    Security
    7
    Cons
    Not User-Friendly
    4
    Complexity
    3
    Learning Curve
    3
    Limited Customization
    3
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DeCYFIR features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYFIRMA
    Year Founded
    2017
    HQ Location
    Singapore, SG
    Twitter
    @cyfirma
    984 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    122 employees on LinkedIn®
    Phone
    marketing@cyfirma.com
Product Description
How are these determined?Information
This description is provided by the seller.

DeCYFIR by CYFIRMA is an External Threat Landscape Management(ETLM) platform designed to give organizations a proactive and predictive approach to cybersecurity. Unlike traditional tools that focus on

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 35% Mid-Market
DeCYFIR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Threat Detection
12
Threat Intelligence
10
Cybersecurity
9
Features
7
Security
7
Cons
Not User-Friendly
4
Complexity
3
Learning Curve
3
Limited Customization
3
Complex Setup
2
DeCYFIR features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
CYFIRMA
Year Founded
2017
HQ Location
Singapore, SG
Twitter
@cyfirma
984 Twitter followers
LinkedIn® Page
www.linkedin.com
122 employees on LinkedIn®
Phone
marketing@cyfirma.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Escape is the only DAST that works with your modern stack and tests business logic instead of missing headers Escape helps teams secure modern applications: • Document all your APIs in minutes a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Escape Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Scanning Technology
    3
    Security
    3
    Customer Support
    2
    Cybersecurity
    2
    Cons
    Complexity
    1
    Complex Setup
    1
    Difficult Learning
    1
    Difficult Learning Curve
    1
    Difficult Upgrades
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Escape features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Escape
    Year Founded
    2020
    HQ Location
    Paris, France
    Twitter
    @escapetechHQ
    345 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Escape is the only DAST that works with your modern stack and tests business logic instead of missing headers Escape helps teams secure modern applications: • Document all your APIs in minutes a

Users
No information available
Industries
No information available
Market Segment
  • 56% Small-Business
  • 33% Mid-Market
Escape Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Scanning Technology
3
Security
3
Customer Support
2
Cybersecurity
2
Cons
Complexity
1
Complex Setup
1
Difficult Learning
1
Difficult Learning Curve
1
Difficult Upgrades
1
Escape features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Escape
Year Founded
2020
HQ Location
Paris, France
Twitter
@escapetechHQ
345 Twitter followers
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hadrian features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hadrian
    Year Founded
    2021
    HQ Location
    Amsterdam, NL
    LinkedIn® Page
    www.linkedin.com
    110 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Hadrian is an agentless SaaS product that continuously maps exposed assets, discovers risks, and prioritizes remediation so that security teams can harden their external attack surfaces. Using passive

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Mid-Market
Hadrian features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Hadrian
Year Founded
2021
HQ Location
Amsterdam, NL
LinkedIn® Page
www.linkedin.com
110 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RedHunt Labs ASM Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    2
    Visibility
    2
    Vulnerability Identification
    2
    Actionable Intelligence
    1
    Alert Notifications
    1
    Cons
    Dashboard Issues
    1
    Inefficient Alert System
    1
    Integration Issues
    1
    Lack of Detail
    1
    Poor Usability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    London, GB
    Twitter
    @RedHuntLabs
    3,644 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RedHunt Labs is a 360º Attack Surface Management platform that stands out by offering an unparalleled and all-encompassing solution. Our platform goes beyond traditional host and subdomain discovery,

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
RedHunt Labs ASM Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
2
Visibility
2
Vulnerability Identification
2
Actionable Intelligence
1
Alert Notifications
1
Cons
Dashboard Issues
1
Inefficient Alert System
1
Integration Issues
1
Lack of Detail
1
Poor Usability
1
RedHunt Labs ASM Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2019
HQ Location
London, GB
Twitter
@RedHuntLabs
3,644 Twitter followers
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 89% Small-Business
    • 11% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Senteon System Hardening Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance Management
    2
    Policy Management
    2
    Security
    2
    Simple
    2
    Automation
    1
    Cons
    Complexity
    1
    Difficult Learning
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Senteon System Hardening features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    0.0
    No information available
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Senteon
    Year Founded
    2019
    HQ Location
    Marietta, US
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Senteon is a game-changer in the cybersecurity landscape, designed specifically to meet the needs of enterprises and MSPs/MSSPs. Our platform takes the complexity out of hardening workstations, server

Users
No information available
Industries
No information available
Market Segment
  • 89% Small-Business
  • 11% Mid-Market
Senteon System Hardening Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance Management
2
Policy Management
2
Security
2
Simple
2
Automation
1
Cons
Complexity
1
Difficult Learning
1
Learning Curve
1
Senteon System Hardening features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
0.0
No information available
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Senteon
Year Founded
2019
HQ Location
Marietta, US
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 18% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Splunk Intelligence Management features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.2
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    721,900 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,148 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Splunk Intelligence Management helps security professionals analyze notable events and leverage intelligence to quickly understand threat context and prioritize and accelerate triage. With Splunk Inte

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 18% Mid-Market
Splunk Intelligence Management features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.2
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
721,900 Twitter followers
LinkedIn® Page
www.linkedin.com
95,148 employees on LinkedIn®
Ownership
NASDAQ:CSCO
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threadfix features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @denimgroup
    1,383 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ThreadFix 3.0 provides a comprehensive view of your risk from applications and their supporting infrastructure. Skip the spreadsheets and PDFs forever.

Users
No information available
Industries
No information available
Market Segment
  • 33% Small-Business
  • 33% Enterprise
Threadfix features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
HQ Location
N/A
Twitter
@denimgroup
1,383 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tromzo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Customization
    1
    Dashboard Design
    1
    Easy Integrations
    1
    Integration Capabilities
    1
    Cons
    Complex UI
    1
    Limited Features
    1
    Poor UI Design
    1
    Slow Loading
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tromzo features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    7.5
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    6.7
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tromzo
    Year Founded
    2021
    HQ Location
    Mountain View, US
    Twitter
    @TromzoSecurity
    128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tromzo accelerates risk remediation from code to cloud. As modern development teams are deploying code and infrastructure rapidly across many pipelines, security teams are facing significant gaps in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Tromzo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Customization
1
Dashboard Design
1
Easy Integrations
1
Integration Capabilities
1
Cons
Complex UI
1
Limited Features
1
Poor UI Design
1
Slow Loading
1
Slow Performance
1
Tromzo features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
7.5
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
6.7
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Tromzo
Year Founded
2021
HQ Location
Mountain View, US
Twitter
@TromzoSecurity
128 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Balbix Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Dashboard Design
    1
    Dashboard Usability
    1
    Cons
    Risk Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Balbix features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Balbix
    Year Founded
    2015
    HQ Location
    San Jose California ,United States
    LinkedIn® Page
    www.linkedin.com
    124 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premi

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Balbix Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Dashboard Design
1
Dashboard Usability
1
Cons
Risk Management
1
Balbix features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Balbix
Year Founded
2015
HQ Location
San Jose California ,United States
LinkedIn® Page
www.linkedin.com
124 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BMC Helix Automation Console Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Simple
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Automation Console features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BMC Helix
    Year Founded
    2025
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    909 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BMC Helix Automation Console Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Simple
1
Cons
This product has not yet received any negative sentiments.
BMC Helix Automation Console features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BMC Helix
Year Founded
2025
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
909 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Small-Business
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyCognito Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Vulnerability Identification
    3
    Cybersecurity
    2
    Features
    2
    Monitoring
    2
    Cons
    Authentication Issues
    1
    Excessive Notifications
    1
    Expensive
    1
    False Positives
    1
    Inadequate Remediation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyCognito features and usability ratings that predict user satisfaction
    8.3
    Has the product been a good partner in doing business?
    Average: 9.3
    7.5
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CyCognito
    Year Founded
    2017
    HQ Location
    Palo Alto, California, United States
    Twitter
    @CyCognito
    10,454 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    137 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCo

Users
No information available
Industries
No information available
Market Segment
  • 80% Small-Business
  • 20% Enterprise
CyCognito Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Vulnerability Identification
3
Cybersecurity
2
Features
2
Monitoring
2
Cons
Authentication Issues
1
Excessive Notifications
1
Expensive
1
False Positives
1
Inadequate Remediation
1
CyCognito features and usability ratings that predict user satisfaction
8.3
Has the product been a good partner in doing business?
Average: 9.3
7.5
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
CyCognito
Year Founded
2017
HQ Location
Palo Alto, California, United States
Twitter
@CyCognito
10,454 Twitter followers
LinkedIn® Page
www.linkedin.com
137 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Acworth, US
    Twitter
    @fortifydata
    91 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FortifyData is an integrated cyber risk management platform that enables customers to identify and manage risk exposure across their entire attack surface. FortifyData gives organizations a 360-degree

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Small-Business
FortifyData Continuous Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
Acworth, US
Twitter
@fortifydata
91 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • H2Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    H2Cyber
    Year Founded
    2009
    HQ Location
    Prosper, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and m

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
H2Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
H2Cyber
Year Founded
2009
HQ Location
Prosper, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®