Introducing G2.ai, the future of software buying.Try now

Top Free Vulnerability Scanner Software

Check out our list of free Vulnerability Scanner Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Vulnerability Scanner Software to ensure you get the right product.

View Free Vulnerability Scanner Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
72 Vulnerability Scanner Products Available
(746)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    18,941 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
18,941 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(296)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
    PS
    The format of the report with vulnerabilities and it's associated CVE with a detailed explanation is really commendable. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
PS
The format of the report with vulnerabilities and it's associated CVE with a detailed explanation is really commendable. Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(222)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • CISO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 37% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,856 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    474 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • CISO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 37% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,856 Twitter followers
LinkedIn® Page
www.linkedin.com
474 employees on LinkedIn®
(197)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at $149.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    9.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RE
    Intruder delivers a great balance between strong vulnerability scanning capabilities and a clean, intuitive user experience. The setup was... Read review
    Yiannis B.
    YB
    Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
9.4
Configuration Monitoring
Average: 8.4
RE
Intruder delivers a great balance between strong vulnerability scanning capabilities and a clean, intuitive user experience. The setup was... Read review
Yiannis B.
YB
Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
978 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
(161)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$199.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management capabilities. Our comprehensive cybersecurity solutions blend automation and manual experti

    Users
    • CTO
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 66% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Astra Pentest features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    8.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Thomas S.
    TS
    was easy to get a Pen Test set up. Was inexpensive to get pen tests done. Read review
    Clinton S.
    CS
    As a security specialist, I've used a handful of pen-testing software, but I stayed with Astra a few years back. Why are they better? They offer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    New Delhi, IN
    Twitter
    @getastra
    693 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    113 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management capabilities. Our comprehensive cybersecurity solutions blend automation and manual experti

Users
  • CTO
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 66% Small-Business
  • 30% Mid-Market
Astra Pentest features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
8.7
Configuration Monitoring
Average: 8.4
Thomas S.
TS
was easy to get a Pen Test set up. Was inexpensive to get pen tests done. Read review
Clinton S.
CS
As a security specialist, I've used a handful of pen-testing software, but I stayed with Astra a few years back. Why are they better? They offer... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
New Delhi, IN
Twitter
@getastra
693 Twitter followers
LinkedIn® Page
www.linkedin.com
113 employees on LinkedIn®
(110)4.9 out of 5
7th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.8
    Detection Rate
    Average: 8.9
    9.8
    Automated Scans
    Average: 8.9
    9.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,749 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.8
Detection Rate
Average: 8.9
9.8
Automated Scans
Average: 8.9
9.9
Configuration Monitoring
Average: 8.4
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,749 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
(105)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    Price comparing other commercial scanners Read review
    MM
    Quick and easy configuration, installation and scanning. High performance, low false positive number, API integration with our ticketing and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 34% Mid-Market
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Verified User in Information Technology and Services
AI
Price comparing other commercial scanners Read review
MM
Quick and easy configuration, installation and scanning. High performance, low false positive number, API integration with our ticketing and... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,557 Twitter followers
LinkedIn® Page
www.linkedin.com
292 employees on LinkedIn®
(100)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

    Users
    • CTO
    • Founder
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 76% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.4
    Detection Rate
    Average: 8.9
    8.9
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Dylan E.
    DE
    In the 9 months we have been using Aikido, we have been very impressed with the offering. They have a significant number of tools available (SAST,... Read review
    Wes M.
    WM
    The ease of setup and the overall UX have an astoundingly low barrier to entry, but as an experienced SRE/infra engineer, I can still find my way... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    3,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

Users
  • CTO
  • Founder
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 76% Small-Business
  • 21% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.4
Detection Rate
Average: 8.9
8.9
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Dylan E.
DE
In the 9 months we have been using Aikido, we have been very impressed with the offering. They have a significant number of tools available (SAST,... Read review
Wes M.
WM
The ease of setup and the overall UX have an astoundingly low barrier to entry, but as an experienced SRE/infra engineer, I can still find my way... Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
3,880 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

    Users
    • Director
    • CEO
    Industries
    • Marketing and Advertising
    • Information Technology and Services
    Market Segment
    • 91% Small-Business
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Beagle Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NT
    Automatically prioritizes high-risk vulnerabilities Scheduled recurring scans Scan multiple environments at the same time API specific scan... Read review
    JB
    The simplicity of the solution. It's very easy to navigate, the portal works well and grouping of projects really helps track customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Francisco, US
    Twitter
    @beaglesecure
    209 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

Users
  • Director
  • CEO
Industries
  • Marketing and Advertising
  • Information Technology and Services
Market Segment
  • 91% Small-Business
  • 7% Mid-Market
Beagle Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
NT
Automatically prioritizes high-risk vulnerabilities Scheduled recurring scans Scan multiple environments at the same time API specific scan... Read review
JB
The simplicity of the solution. It's very easy to navigate, the portal works well and grouping of projects really helps track customer... Read review
Seller Details
Year Founded
2020
HQ Location
San Francisco, US
Twitter
@beaglesecure
209 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.5
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
    Lemmuel A.
    LA
    I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    111,953 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.5
Configuration Monitoring
Average: 8.4
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Lemmuel A.
LA
I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
111,953 Twitter followers
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    UI
    It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
    Michael E.
    ME
    InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,047 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,071 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 32% Mid-Market
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
Verified User in Insurance
UI
It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
Michael E.
ME
InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,047 Twitter followers
LinkedIn® Page
www.linkedin.com
3,071 employees on LinkedIn®
Ownership
NASDAQ:RPD
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyrisma features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mark V.
    MV
    We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
    Verified User in Information Services
    UI
    It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyrisma
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @Cyrisma_USA
    43 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
Cyrisma features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Mark V.
MV
We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
Verified User in Information Services
UI
It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
Seller Details
Seller
Cyrisma
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@Cyrisma_USA
43 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
(71)4.3 out of 5
11th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra VM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Cristian P.
    CP
    AVDS, in my opinion, is one of the best in-depth inspection for security weaknesses tool because substantially reduce the cost of, and in some... Read review
    JG
    Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,562 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra Vulnerability Management (Fortra VM™), a Digital Defense product (under the Fortra umbrella), offering the industry’s most comprehensive, accurate, and user-friendly SaaS vulnerability manageme

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Fortra VM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.2
Configuration Monitoring
Average: 8.4
Cristian P.
CP
AVDS, in my opinion, is one of the best in-depth inspection for security weaknesses tool because substantially reduce the cost of, and in some... Read review
JG
Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,562 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
(67)4.6 out of 5
14th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$59.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Indusface WAS (Web Application Scanner) provides comprehensive managed dynamic application security testing (DAST) solution. It is a zero-touch, non-intrusive cloud-based solution that provides daily

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Indusface WAS features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • amrutha v.
    AV
    I am really happy to be connected with indusface, It has the best security complaince in place. The team is very well versed in their offerings and... Read review
    George Alex O.
    GO
    The easy-to-use interface of the platform Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Indusface
    Year Founded
    2012
    HQ Location
    Vadodara
    Twitter
    @Indusface
    3,499 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    169 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Indusface WAS (Web Application Scanner) provides comprehensive managed dynamic application security testing (DAST) solution. It is a zero-touch, non-intrusive cloud-based solution that provides daily

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 37% Mid-Market
Indusface WAS features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
amrutha v.
AV
I am really happy to be connected with indusface, It has the best security complaince in place. The team is very well versed in their offerings and... Read review
George Alex O.
GO
The easy-to-use interface of the platform Read review
Seller Details
Seller
Indusface
Year Founded
2012
HQ Location
Vadodara
Twitter
@Indusface
3,499 Twitter followers
LinkedIn® Page
www.linkedin.com
169 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • APPCHECK features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Medical Devices
    AM
    Value for money is the main key for me personally, we were spending more money on external companies doing scans once or twice a year. We now do... Read review
    Mark W.
    MW
    AppCheck is an excellent tool to provide full visibility into our estate and embed security into the CI/CD pipeline. Traditional pen testing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    APPCHECK
    Company Website
    Year Founded
    2014
    HQ Location
    Leeds, GB
    Twitter
    @AppcheckNG
    657 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    105 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
APPCHECK features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Verified User in Medical Devices
AM
Value for money is the main key for me personally, we were spending more money on external companies doing scans once or twice a year. We now do... Read review
Mark W.
MW
AppCheck is an excellent tool to provide full visibility into our estate and embed security into the CI/CD pipeline. Traditional pen testing... Read review
Seller Details
Seller
APPCHECK
Company Website
Year Founded
2014
HQ Location
Leeds, GB
Twitter
@AppcheckNG
657 Twitter followers
LinkedIn® Page
www.linkedin.com
105 employees on LinkedIn®