Star Rating
Languages Supported
Pricing Options

Security Risk Analysis reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Security Risk Analysis Software

    Security risk analysis software solutions are used by companies to analyze IT portfolios and address potential security issues. These tools monitor networks, applications, and infrastructure to identify vulnerabilities. They then provide users with recommendations to adopt additional security practices or solutions. Companies use these tools to ensure they have a well-rounded security plan and sufficient security technologies. These solutions may have some overlap with IT portfolio analysis software but are specifically targeted toward security operations and software.

    To qualify for inclusion in the Security Risk Analysis software category, a product must:

    Analyze a company’s security software, hardware, and operations
    Inform users of known vulnerabilities or holes in their security plan
    Provide recommendations to optimize security planning across IT systems

    Top 10 Security Risk Analysis Software

    • Nessus
    • F-Secure
    • Qualys Cloud Platform.
    • Tenable.io
    • SecurityScorecard
    • AlienVault USM (from AT&T Cybersecurity)
    • Tenable.sc
    • Azure Security Center
    • Netwrix Auditor
    • Symantec Risk Insight

    Compare Security Risk Analysis Software

    G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
    Sort By:
    Results: 135
    View Grid®
    Adv. Filters
    (161)4.4 out of 5
    Optimized for quick response
    Entry Level Price:$2,790

    Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly and easily identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations - across a variety of operating systems, devices and applications. With features such as pre-built policies and templates, customizable reporting, group

    (92)4.4 out of 5

    Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.

    (58)4.2 out of 5

    Qualys' integrated approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively. Our solutions empower various roles within the organization to meet your unique requirements. Built on top of Qualys’ Infrastructure and Core Services, the Qualys Cloud Suite incorporates the following applications, all of which are delivered via the cloud: • AssetView • Vulnerability Management • Con

    (45)4.3 out of 5

    Tenable.io is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire attack surface—including cloud, OT and container environments • Predict what matters by understanding vulnerabilities in the context of business risk, as well as the criticality of affected assets • Act on each high priority vulnerability to effectively manage risk, and measure KPIs to effectively communicate effectiv

    (27)4.5 out of 5
    Entry Level Price:$0

    SecurityScorecard is the global leader in cybersecurity ratings and the only service with over a million companies continuously rated. SecurityScorecard’s patented rating technology is used by over 1,000 organizations for self-monitoring, third-party risk management, board reporting and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their externally facing digital footprint. SecurityScorecard is the only pr

    (107)4.4 out of 5
    Optimized for quick response

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and on-premises environments. USM Anywhere includes purpose-built cloud sensors that natively monitor your Amazon Web Services (AWS) and Microsoft Azure cloud environments. On premises, lightweight virtual sensors run on Microsoft Hyper-V and VMware ESXi to monitor your virtual private cloud and physica

    (29)4.5 out of 5

    Tenable.sc is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuously assess all assets the moment they join the network -- including transient devices that aren’t regularly connected • Predict what matters by understanding vulnerabilities in the context of business risk, as well as the criticality of affected assets • Act on each high priority vulnerability to effectively manage risk, a

    (15)4.1 out of 5

    Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.

    (22)4.4 out of 5

    Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file serve

    (30)4.0 out of 5

    See all your risk, in every form, from every angle. Strengthen your security posture with automated risk assessments.

    (19)4.6 out of 5

    Cybersecurity and Compliance Made Easy... Apptega helps businesses of all sizes accelerate and automate compliance efforts, monitor program performance, and always be audit-ready—all while fortifying your cybersecurity. Choose your frameworks, including PCI, SOC 2, NIST, ISO, CIS v7, GDPR, HIPAA, CCPA and more, and manage your program with: -Automated Cybersecurity Framework Crosswalks -Real-Time Compliance Scoring -Project Management -Workflow & Task Management -Collaboration -Budgeting -P

    (20)3.6 out of 5

    Tripwire is a provider of advanced threat, security and compliance solutions to confidently detect, prevent and respond to cybersecurity threats

    Sophisticated, targeted attacks can take weeks, months or longer to discover and resolve. Incident response teams need tools that quickly uncover the full source and scope of an attack to reduce time-to-resolution, mitigate ongoing risk and further fortify the network. Like a security camera for the network, Blue Coat Security Analytics delivers full network security visibility, advanced network forensics, anomaly detection and real-time content inspection for all network activity. This effectiv

    (7)4.8 out of 5

    Change Tracker Gen7R2 solves IT Security and the problems that plague all organizations – the overwhelming noise of change control and ensuring the integrity of IT systems. Completely redesigned with both security and IT operations in mind, Change Tracker Gen7 R2 is the only solution designed to reduce change noise and the complexity of integrity monitoring and policy management all while allowing for unprecedented scalability and management that meets the most demanding enterprise environments.

    (7)4.6 out of 5

    Provides automated security testing and security scan of web applications to identify vulnerabilities, scans your network and devices and suggest to you recommendations on how they can be fixed, and provides a source code analysis to identify and resolve security weaknesses and vulnerabilities

    (4)4.6 out of 5
    Optimized for quick response

    Brinqa empowers customers to own their cyber risk with a unique, knowledge-driven approach to cybersecurity challenges. Brinqa Cyber Risk Graph - the knowledge graph for cybersecurity - connects all relevant security and business data, establishes a common risk language, and powers cybersecurity insights and outcomes. Brinqa Cyber Risk Services apply this knowledge to uniquely inform risk management strategies, standardize security data management and analysis, improve communication between team

    Cloud Security Command Center helps security teams gather data, identify threats, and act on them before they result in business damage or loss. It offers deep insight into application and data risk so that you can quickly mitigate threats to your cloud resources and evaluate overall health.

    (4)4.1 out of 5

    Qualys PCI is a PCI compliance software that makes it easy for users to secure their network and meet the PCI DSS requirements. Allows them to scan all systems and web applications, and automate compliance status reporting.

    (7)4.1 out of 5

    SanerNow is a SaaS platform for endpoint security and management — a platform that hosts numerous tools to cover various endpoint security and management requirements. SanerNow addresses the following business cases: - Vulnerability Management - Patch Management - Compliance Management - Asset Management - Endpoint Management - Application and Device Control - Software Deployment - Endpoint Threat Detection and Response

    (3)5.0 out of 5

    Expanse provides a comprehensive, continuously-updated view of all Internet-connected assets that belong to an organization. IT operations and security teams use this insight to reduce risk posed by unknown or unmonitored assets–on their network and in the cloud–and to minimize their global attack surface.

    Recorded Future delivers the world’s most technically advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. With proactive and predictive intelligence for security operations and response, threat analysis, third-party risk, vulnerability management, brand protection, and geopolitical risk, Recorded Future amplifies the impact of deployed security solutions. Recorded Future provides elite, context-rich, actionable intelligence in real time that’s int

    (2)4.5 out of 5

    beSECURE (formerly AVDS) is a complete network scanning solution available in a broad product line. beSECURE was designed for continent spanning networks with tens of thousands of IPs, but that same, powerful scanning engine is available in an entry level version for small networks run by a single administrator. It is also available as a hosted solution for the scanning of one to one thousand external IPs or web sites.

    Frontline Vulnerability Manager™ (Frontline VM™) by Digital Defense provides vulnerability scanning and management that is centralized, powerful, and user friendly. Reports deliver accurate, actionable results that include prioritization features such as security rating and peer comparisons. Delivered via SaaS platform, Frontline VM is lightweight, flexible, and easy to integrate. Learn more at https://www.digitaldefense.com/platform/frontline-vm/

    FortifyData offers a clear and accurate analysis of cyber risks through a risk scoring platform. Using statistical analysis and continuous monitoring of a company’s network and application layer, dark web search discoveries, IP reputation, and breach history records, companies can now understand their current cyber risk posture using our easy to understand scoring model ranging from 300 to 900.

    Gathering targeted and actionable intelligence, Argos pools both technological and human resources to generate real-time incidents of targeted attacks, data leakage and stolen credentials compromising your organization.

    BeyondTrust Retina CS is the only vulnerability management solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-driven architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud, virtual, and IoT infrastructure. - Discover network, web, mobile, cloud, virtual, and IoT infrastructure - Profile asset co

    (1)4.0 out of 5

    The BitSight Security Ratings Platform gathers terabytes of data on security outcomes from sensors deployed across the globe. From our data, we see indicators of compromise, infected machines, improper configuration, poor security hygiene and potentially harmful user behaviors. BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence and then map it to a company's known networks, creating an overall rating of that organization’s security performance.

    (1)2.5 out of 5

    Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies

    (3)4.7 out of 5

    Certa is a no-code SaaS solution with tailorable workflows. Our platform addresses the full lifecycle of direct and indirect suppliers from onboarding, risk assessment, contracting, to ongoing monitoring enabling faster onboarding, lesser efforts, and errors.

    Controlcase’s compliance as a service (CaaS) is a robust proprietary solution that provides tools and services to deliver compliance accuracy, efficiencies and timely management that strengthens your data security throughout the year.

    Select Grid® View
    Select Company Size
    G2 Grid® for Security Risk Analysis
    Filter Grid®
    Filter Grid®
    Select Grid® View
    Select Company Size
    Check out the G2 Grid® for the top Security Risk Analysis Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
    Leaders
    High Performers
    Contenders
    Niche
    Qualys Cloud Platform.
    Tripwire
    F-Secure
    Netwrix Auditor
    AlienVault USM (from AT&T Cybersecurity)
    Tenable.io
    Nessus
    Azure Security Center
    SecurityScorecard
    Symantec Risk Insight
    Apptega
    Tenable.sc
    Market Presence
    Satisfaction
    Published: