Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Vulnerability Management Software - Page 6

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Risk-Based Vulnerability Management Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
188 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hacknoid Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Alerts
    1
    Customization Control
    1
    Risk Management
    1
    Scanning Efficiency
    1
    Scanning Technology
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hacknoid features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hacknoid
    Year Founded
    2013
    HQ Location
    Montevideo, UY
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Hacknoid Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Alerts
1
Customization Control
1
Risk Management
1
Scanning Efficiency
1
Scanning Technology
1
Cons
This product has not yet received any negative sentiments.
Hacknoid features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Hacknoid
Year Founded
2013
HQ Location
Montevideo, UY
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Holm Security VMP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Aware
    1
    Awareness Increase
    1
    Innovation
    1
    Scanning Efficiency
    1
    Cons
    False Positives
    1
    Scanning Issues
    1
    Technical Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Holm Security VMP features and usability ratings that predict user satisfaction
    5.0
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    5.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Alvik, SE
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damag

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Holm Security VMP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Aware
1
Awareness Increase
1
Innovation
1
Scanning Efficiency
1
Cons
False Positives
1
Scanning Issues
1
Technical Issues
1
Holm Security VMP features and usability ratings that predict user satisfaction
5.0
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
5.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
Alvik, SE
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ImmuniWeb Discovery Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Monitoring
    2
    Monitoring Efficiency
    2
    Alert Notifications
    1
    Dark Web Monitoring
    1
    Detection
    1
    Cons
    Integration Issues
    1
    Lack of Integration
    1
    Limited Flexibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ImmuniWeb Discovery features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ImmuniWeb
    Year Founded
    2019
    HQ Location
    Geneva, CH
    Twitter
    @immuniweb
    8,534 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    37 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Attack surface management and Dark Web Monitoring. ImmuniWeb® Discovery leverages OSINT and our award-winning AI technology to illuminate attack surface and Dark Web exposure of a company. The non-in

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ImmuniWeb Discovery Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Monitoring
2
Monitoring Efficiency
2
Alert Notifications
1
Dark Web Monitoring
1
Detection
1
Cons
Integration Issues
1
Lack of Integration
1
Limited Flexibility
1
ImmuniWeb Discovery features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
ImmuniWeb
Year Founded
2019
HQ Location
Geneva, CH
Twitter
@immuniweb
8,534 Twitter followers
LinkedIn® Page
www.linkedin.com
37 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vul

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for RBVM features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,766 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,984 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vul

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
Ivanti Neurons for RBVM features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,766 Twitter followers
LinkedIn® Page
www.linkedin.com
2,984 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NetSPI PTaaS solves the challenges of traditional pentesting, using a powerful combination of people, processes, and technology to deliver contextualized outcomes in real time on a single platform. Mo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 36% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetSPI PTaaS (Penetration Testing as a Service) features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetSPI
    Company Website
    Year Founded
    2001
    HQ Location
    Minneapolis, MN
    Twitter
    @NetSPI
    4,038 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    605 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

NetSPI PTaaS solves the challenges of traditional pentesting, using a powerful combination of people, processes, and technology to deliver contextualized outcomes in real time on a single platform. Mo

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 36% Mid-Market
NetSPI PTaaS (Penetration Testing as a Service) features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
NetSPI
Company Website
Year Founded
2001
HQ Location
Minneapolis, MN
Twitter
@NetSPI
4,038 Twitter followers
LinkedIn® Page
www.linkedin.com
605 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Gain objective insight into your third-party security performance and IT landscape

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskRecon features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    RiskRecon
    Year Founded
    2013
    HQ Location
    Salt Lake City, US
    Twitter
    @riskrecon
    658 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Gain objective insight into your third-party security performance and IT landscape

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
RiskRecon features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.8
Seller Details
Seller
RiskRecon
Year Founded
2013
HQ Location
Salt Lake City, US
Twitter
@riskrecon
658 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Identity Exposure features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    9.2
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Identity Exposure (formerly Tenable.ad) is a fast, agentless Active Directory security solution that allows you to see everything in your complex Active Directory and Entra ID environments, pr

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Tenable Identity Exposure features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
9.2
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tripwire IP360 features and usability ratings that predict user satisfaction
    6.7
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,562 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Tripwire IP360 features and usability ratings that predict user satisfaction
6.7
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,562 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • TrueSight Vulnerability Management for Third-Party Applications features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BMC Helix
    Year Founded
    2025
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    909 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
TrueSight Vulnerability Management for Third-Party Applications features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BMC Helix
Year Founded
2025
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
909 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Upwind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Customer Support
    2
    Detection Efficiency
    2
    Implementation Ease
    2
    Cons
    Alert Overload
    1
    Compliance Issues
    1
    Data Management
    1
    Data Overload
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Upwind features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Upwind
    Company Website
    Year Founded
    2022
    HQ Location
    San Francisco, California, United States
    LinkedIn® Page
    www.linkedin.com
    217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 29% Enterprise
Upwind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Customer Support
2
Detection Efficiency
2
Implementation Ease
2
Cons
Alert Overload
1
Compliance Issues
1
Data Management
1
Data Overload
1
False Positives
1
Upwind features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Seller
Upwind
Company Website
Year Founded
2022
HQ Location
San Francisco, California, United States
LinkedIn® Page
www.linkedin.com
217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: compre

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Visore Security Management Platform features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Rockville, US
    LinkedIn® Page
    linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: compre

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Visore Security Management Platform features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2021
HQ Location
Rockville, US
LinkedIn® Page
linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AttackTree features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Isograph
    HQ Location
    Warrington, GB
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
AttackTree features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Isograph
HQ Location
Warrington, GB
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We pro

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Autobahn Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Reporting
    Average: 8.7
    6.7
    Vulnerability Intelligence
    Average: 8.7
    6.7
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Singapore, SG
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We pro

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Autobahn Security features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Reporting
Average: 8.7
6.7
Vulnerability Intelligence
Average: 8.7
6.7
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2019
HQ Location
Singapore, SG
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today’s threat landscape, understanding your cyber risk exposure - across vendors, systems, and the extended supply chain - is critical. At Black Kite, our mission is to equip business and security

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Black Kite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Easy Implementation
    1
    Helpful
    1
    Implementation Ease
    1
    Innovation
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Black Kite features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    10.0
    Reporting
    Average: 8.7
    10.0
    Vulnerability Intelligence
    Average: 8.7
    10.0
    Risk-Prioritization
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Boston, Massachusetts
    Twitter
    @BlackKiteTech
    1,524 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    127 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

In today’s threat landscape, understanding your cyber risk exposure - across vendors, systems, and the extended supply chain - is critical. At Black Kite, our mission is to equip business and security

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Black Kite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Easy Implementation
1
Helpful
1
Implementation Ease
1
Innovation
1
Cons
This product has not yet received any negative sentiments.
Black Kite features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
10.0
Reporting
Average: 8.7
10.0
Vulnerability Intelligence
Average: 8.7
10.0
Risk-Prioritization
Average: 8.8
Seller Details
Year Founded
2016
HQ Location
Boston, Massachusetts
Twitter
@BlackKiteTech
1,524 Twitter followers
LinkedIn® Page
www.linkedin.com
127 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BMC Helix Remediate features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BMC Helix
    Year Founded
    2025
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    909 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
BMC Helix Remediate features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
BMC Helix
Year Founded
2025
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
909 employees on LinkedIn®