Introducing G2.ai, the future of software buying.Try now

Best Enterprise Vulnerability Scanner Software

Lauren Worth
LW
Researched and written by Lauren Worth

Products classified in the overall Vulnerability Scanner category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Vulnerability Scanner to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2's buying advisors to find the right solutions within the Enterprise Business Vulnerability Scanner category.

In addition to qualifying for inclusion in the Vulnerability Scanner Software category, to qualify for inclusion in the Enterprise Business Vulnerability Scanner Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.

Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Vulnerability Scanner Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All

23 Listings in Enterprise Vulnerability Scanner Software Available

(746)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    114
    Features
    105
    Security
    101
    Visibility
    80
    Easy Setup
    74
    Cons
    Feature Limitations
    35
    Improvement Needed
    35
    Improvements Needed
    32
    Learning Curve
    30
    Missing Features
    29
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    18,941 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
114
Features
105
Security
101
Visibility
80
Easy Setup
74
Cons
Feature Limitations
35
Improvement Needed
35
Improvements Needed
32
Learning Curve
30
Missing Features
29
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
18,941 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(296)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    18
    Automated Scanning
    15
    Vulnerability Detection
    14
    Ease of Use
    13
    Features
    13
    Cons
    Slow Scanning
    8
    Limited Features
    6
    False Positives
    5
    Complexity
    4
    Slow Performance
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
18
Automated Scanning
15
Vulnerability Detection
14
Ease of Use
13
Features
13
Cons
Slow Scanning
8
Limited Features
6
False Positives
5
Complexity
4
Slow Performance
4
Tenable Nessus features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(121)4.5 out of 5
Optimized for quick response
View top Consulting Services for Tenable Vulnerability Management
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 55% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Scanning Efficiency
    12
    Ease of Use
    11
    Vulnerability Identification
    11
    Automated Scanning
    9
    Features
    8
    Cons
    Expensive
    6
    Pricing Issues
    6
    Complexity
    5
    Inadequate Reporting
    5
    Limited Reporting
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 8.9
    8.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 55% Enterprise
  • 33% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Scanning Efficiency
12
Ease of Use
11
Vulnerability Identification
11
Automated Scanning
9
Features
8
Cons
Expensive
6
Pricing Issues
6
Complexity
5
Inadequate Reporting
5
Limited Reporting
5
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 8.9
8.7
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
(222)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • CISO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Orca Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    51
    Features
    44
    Security
    42
    Cloud Security
    32
    Visibility
    31
    Cons
    Improvement Needed
    22
    Feature Limitations
    17
    Missing Features
    16
    Improvements Needed
    14
    Poor Reporting
    13
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,856 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    474 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • CISO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
51
Features
44
Security
42
Cloud Security
32
Visibility
31
Cons
Improvement Needed
22
Feature Limitations
17
Missing Features
16
Improvements Needed
14
Poor Reporting
13
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,856 Twitter followers
LinkedIn® Page
www.linkedin.com
474 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HackerOne Bounty significantly reduces your threat exposure by tapping into the largest global community of ethical hackers. This dynamic solution offers preemptive and continuous oversight of your di

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HackerOne Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Helpful
    12
    Collaboration
    11
    Customer Support
    11
    Security Protection
    11
    Cons
    Complexity Issues
    5
    Expensive
    5
    Time Management
    5
    Poor Customer Support
    4
    Poor Interface Design
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HackerOne Platform features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    7.5
    Detection Rate
    Average: 8.9
    6.7
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HackerOne
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @Hacker0x01
    329,186 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,213 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HackerOne Bounty significantly reduces your threat exposure by tapping into the largest global community of ethical hackers. This dynamic solution offers preemptive and continuous oversight of your di

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 41% Enterprise
HackerOne Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Helpful
12
Collaboration
11
Customer Support
11
Security Protection
11
Cons
Complexity Issues
5
Expensive
5
Time Management
5
Poor Customer Support
4
Poor Interface Design
4
HackerOne Platform features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
7.5
Detection Rate
Average: 8.9
6.7
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Seller
HackerOne
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@Hacker0x01
329,186 Twitter followers
LinkedIn® Page
www.linkedin.com
6,213 employees on LinkedIn®
(111)4.8 out of 5
Optimized for quick response
2nd Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig unique

    Users
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 46% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sysdig Secure Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    37
    Vulnerability Detection
    37
    Threat Detection
    31
    Detection Efficiency
    30
    Visibility
    27
    Cons
    Feature Limitations
    13
    Missing Features
    10
    Complexity
    9
    Learning Curve
    8
    Difficult Learning
    7
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sysdig Secure features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    9.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sysdig
    Company Website
    Year Founded
    2013
    HQ Location
    San Francisco, California
    Twitter
    @Sysdig
    10,214 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    660 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sysdig Secure is the real-time cloud-native application protection platform (CNAPP) trusted by organizations of all sizes around the world.. Built by the creators of Falco and Wireshark, Sysdig unique

Users
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 46% Enterprise
  • 40% Mid-Market
Sysdig Secure Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
37
Vulnerability Detection
37
Threat Detection
31
Detection Efficiency
30
Visibility
27
Cons
Feature Limitations
13
Missing Features
10
Complexity
9
Learning Curve
8
Difficult Learning
7
Sysdig Secure features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.5
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
9.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Sysdig
Company Website
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,214 Twitter followers
LinkedIn® Page
www.linkedin.com
660 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Engineer
    • Cyber Security Associate
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Hybrid Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    11
    Security Protection
    7
    Compliance
    6
    Comprehensive Security
    6
    Cloud Integration
    5
    Cons
    Complexity
    7
    Complex Setup
    5
    Feature Complexity
    4
    Learning Curve
    4
    Difficult Learning
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Engineer
  • Cyber Security Associate
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
11
Security Protection
7
Compliance
6
Comprehensive Security
6
Cloud Integration
5
Cons
Complexity
7
Complex Setup
5
Feature Complexity
4
Learning Curve
4
Difficult Learning
3
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.5
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,953 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

    Users
    No information available
    Industries
    • Computer & Network Security
    • Financial Services
    Market Segment
    • 60% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Security Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Discovery
    2
    Features
    2
    Vulnerability Identification
    2
    Asset Management
    1
    Automated Scanning
    1
    Cons
    Complexity
    1
    Complex Queries
    1
    Complex Setup
    1
    Difficult Setup
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Security Center features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

Users
No information available
Industries
  • Computer & Network Security
  • Financial Services
Market Segment
  • 60% Enterprise
  • 23% Mid-Market
Tenable Security Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Discovery
2
Features
2
Vulnerability Identification
2
Asset Management
1
Automated Scanning
1
Cons
Complexity
1
Complex Queries
1
Complex Setup
1
Difficult Setup
1
False Positives
1
Tenable Security Center features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.9
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightVM (Nexpose) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    4
    Asset Management
    3
    Automation
    3
    Automated Scanning
    2
    Detection
    2
    Cons
    Complexity
    2
    Resource Limitations
    2
    Resource Management
    2
    Time-Consumption
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,047 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,071 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 32% Mid-Market
InsightVM (Nexpose) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
4
Asset Management
3
Automation
3
Automated Scanning
2
Detection
2
Cons
Complexity
2
Resource Limitations
2
Resource Management
2
Time-Consumption
2
Alert Issues
1
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,047 Twitter followers
LinkedIn® Page
www.linkedin.com
3,071 employees on LinkedIn®
Ownership
NASDAQ:RPD
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Red Hat® Ansible® Automation Platform is Red Hat's primary enterprise automation product offering., it includes all of the tooling needed for building, deploying, and managing end-to-end automation at

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 49% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Red Hat Ansible Automation Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    59
    Automation Efficiency
    48
    Ease of Use
    43
    Easy Integrations
    38
    Task Automation
    36
    Cons
    Complexity
    16
    Learning Curve
    16
    Learning Difficulty
    16
    Automation Issues
    12
    Complex Setup
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Red Hat Ansible Automation Platform features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Red Hat
    Company Website
    Year Founded
    1993
    HQ Location
    Raleigh, NC
    Twitter
    @RedHat
    297,275 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19,575 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Red Hat® Ansible® Automation Platform is Red Hat's primary enterprise automation product offering., it includes all of the tooling needed for building, deploying, and managing end-to-end automation at

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 49% Enterprise
  • 35% Mid-Market
Red Hat Ansible Automation Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
59
Automation Efficiency
48
Ease of Use
43
Easy Integrations
38
Task Automation
36
Cons
Complexity
16
Learning Curve
16
Learning Difficulty
16
Automation Issues
12
Complex Setup
12
Red Hat Ansible Automation Platform features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.9
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Red Hat
Company Website
Year Founded
1993
HQ Location
Raleigh, NC
Twitter
@RedHat
297,275 Twitter followers
LinkedIn® Page
www.linkedin.com
19,575 employees on LinkedIn®
(192)4.7 out of 5
Optimized for quick response
View top Consulting Services for SentinelOne Singularity
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 45% Mid-Market
    • 36% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    15
    Threat Detection
    13
    Security
    11
    Easy Management
    9
    Cons
    Compatibility Issues
    4
    Lack of Clarity
    4
    Missing Features
    4
    Agent Issues
    3
    Alert Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    7.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SentinelOne (NYSE:S) is pioneering autonomous cybersecurity to prevent, detect, and respond to cyber attacks faster and with higher accuracy than ever before. The Singularity Platform protects and emp

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 45% Mid-Market
  • 36% Enterprise
SentinelOne Singularity Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
15
Threat Detection
13
Security
11
Easy Management
9
Cons
Compatibility Issues
4
Lack of Clarity
4
Missing Features
4
Agent Issues
3
Alert Issues
3
SentinelOne Singularity features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
9.5
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
7.6
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,749 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
(143)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    45
    Ease of Use
    43
    Security
    43
    Automation
    33
    Vulnerability Detection
    31
    Cons
    Expensive
    13
    Limited Scope
    11
    Technical Issues
    11
    Inadequate Reporting
    10
    Lack of Detail
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    7.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,400 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    428 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
45
Ease of Use
43
Security
43
Automation
33
Vulnerability Detection
31
Cons
Expensive
13
Limited Scope
11
Technical Issues
11
Inadequate Reporting
10
Lack of Detail
9
Pentera features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
7.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,400 Twitter followers
LinkedIn® Page
www.linkedin.com
428 employees on LinkedIn®
(110)4.9 out of 5
7th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    26
    Vulnerability Detection
    19
    Ease of Use
    18
    Cloud Management
    16
    Comprehensive Security
    15
    Cons
    Learning Curve
    2
    Poor Interface Design
    2
    Poor UI
    2
    UI Complexity
    2
    UX Improvement
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.8
    Detection Rate
    Average: 8.9
    9.8
    Automated Scans
    Average: 8.9
    9.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
26
Vulnerability Detection
19
Ease of Use
18
Cloud Management
16
Comprehensive Security
15
Cons
Learning Curve
2
Poor Interface Design
2
Poor UI
2
UI Complexity
2
UX Improvement
2
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.8
Detection Rate
Average: 8.9
9.8
Automated Scans
Average: 8.9
9.9
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,749 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
(124)4.8 out of 5
View top Consulting Services for Burp Suite
Save to My Lists
Entry Level Price:$475.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Burp Suite is a complete ecosystem for web application and API security testing, combining two products: Burp Suite DAST - a best-of-breed, precision DAST solution that automates runtime testing, and

    Users
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Burp Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    User Interface
    7
    Testing Services
    6
    Features
    5
    Easy Integrations
    4
    Cons
    Slow Performance
    4
    Expensive
    3
    Poor Interface Design
    2
    Bugs
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Burp Suite features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Knutsford, GB
    Twitter
    @Burp_Suite
    133,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    262 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Burp Suite is a complete ecosystem for web application and API security testing, combining two products: Burp Suite DAST - a best-of-breed, precision DAST solution that automates runtime testing, and

Users
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 31% Small-Business
Burp Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
User Interface
7
Testing Services
6
Features
5
Easy Integrations
4
Cons
Slow Performance
4
Expensive
3
Poor Interface Design
2
Bugs
1
False Positives
1
Burp Suite features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2008
HQ Location
Knutsford, GB
Twitter
@Burp_Suite
133,379 Twitter followers
LinkedIn® Page
www.linkedin.com
262 employees on LinkedIn®
(123)4.5 out of 5
View top Consulting Services for Snyk
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    3
    Integrations
    3
    Integration Support
    3
    Version Control
    3
    Git Integration
    2
    Cons
    Complex Configuration
    2
    Alert Overload
    1
    Bugs
    1
    Command Line Difficulty
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    20,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 37% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
3
Integrations
3
Integration Support
3
Version Control
3
Git Integration
2
Cons
Complex Configuration
2
Alert Overload
1
Bugs
1
Command Line Difficulty
1
Complexity
1
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
20,097 Twitter followers
LinkedIn® Page
www.linkedin.com
1,221 employees on LinkedIn®