Introducing G2.ai, the future of software buying.Try now

Top Free Vulnerability Scanner Software

Check out our list of free Vulnerability Scanner Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Vulnerability Scanner Software to ensure you get the right product.

View Free Vulnerability Scanner Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
73 Vulnerability Scanner Products Available
(755)4.7 out of 5
Optimized for quick response
1st Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    20,380 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,109 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 39% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
20,380 Twitter followers
LinkedIn® Page
www.linkedin.com
3,109 employees on LinkedIn®
(299)4.5 out of 5
Optimized for quick response
10th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
    PS
    The format of the report with vulnerabilities and it's associated CVE with a detailed explanation is really commendable. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,429 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,357 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
PS
The format of the report with vulnerabilities and it's associated CVE with a detailed explanation is really commendable. Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,429 Twitter followers
LinkedIn® Page
www.linkedin.com
2,357 employees on LinkedIn®
Ownership
NASDAQ: TENB
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(202)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at $149.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    9.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Yiannis B.
    YB
    Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
    Andy M.
    AM
    My company was looking for a good service to enhance our managed platform offer to clients. While we were using some automated scanning before,... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    84 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
9.4
Configuration Monitoring
Average: 8.4
Yiannis B.
YB
Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
Andy M.
AM
My company was looking for a good service to enhance our managed platform offer to clients. While we were using some automated scanning before,... Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
978 Twitter followers
LinkedIn® Page
www.linkedin.com
84 employees on LinkedIn®
(224)4.6 out of 5
Optimized for quick response
5th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

    Users
    • Security Engineer
    • CISO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 51% Mid-Market
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Orca Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • VP
    1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
    Verified User in Telecommunications
    ET
    I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Portland, Oregon
    Twitter
    @orcasec
    4,833 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    480 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Orca Cloud Security Platform identifies, prioritizes, and remediates risks and compliance issues in workloads, configurations, and identities across your cloud estate spanning AWS, Azure, Google C

Users
  • Security Engineer
  • CISO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 51% Mid-Market
  • 38% Enterprise
Orca Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
VP
1] The best thing which i liked about Orca Security is that it provides Meta Data scanning which helps to find all the Misconfigurations,... Read review
Verified User in Telecommunications
ET
I like how quickly Orca can integrate into our Cloud infrastructure and begin to identify issues we need to address. Once you see the issues from a... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Portland, Oregon
Twitter
@orcasec
4,833 Twitter followers
LinkedIn® Page
www.linkedin.com
480 employees on LinkedIn®
(166)4.6 out of 5
Optimized for quick response
6th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$199.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management capabilities. Our comprehensive cybersecurity solutions blend automation and manual experti

    Users
    • CTO
    • CEO
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 65% Small-Business
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Astra Pentest features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.8
    Automated Scans
    Average: 8.9
    8.7
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Thomas S.
    TS
    was easy to get a Pen Test set up. Was inexpensive to get pen tests done. Read review
    Clinton S.
    CS
    As a security specialist, I've used a handful of pen-testing software, but I stayed with Astra a few years back. Why are they better? They offer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    New Delhi, IN
    Twitter
    @getastra
    693 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Astra is a leading penetration testing company that provides PTaaS and continuous threat exposure management capabilities. Our comprehensive cybersecurity solutions blend automation and manual experti

Users
  • CTO
  • CEO
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 65% Small-Business
  • 30% Mid-Market
Astra Pentest features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.8
Automated Scans
Average: 8.9
8.7
Configuration Monitoring
Average: 8.4
Thomas S.
TS
was easy to get a Pen Test set up. Was inexpensive to get pen tests done. Read review
Clinton S.
CS
As a security specialist, I've used a handful of pen-testing software, but I stayed with Astra a few years back. Why are they better? They offer... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
New Delhi, IN
Twitter
@getastra
693 Twitter followers
LinkedIn® Page
www.linkedin.com
120 employees on LinkedIn®
(137)4.6 out of 5
Optimized for quick response
3rd Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

    Users
    • CTO
    • Founder
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 71% Small-Business
    • 17% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aikido Security features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    8.9
    Automated Scans
    Average: 8.9
    8.0
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Angel I.
    AI
    I appreciate that Aikido Security offers a single plane of glass with everything in one queue, which is very important to me. It's simple to use... Read review
    Verified User in Computer Software
    UC
    Regular scans of our codebase flag potential issues early. It has a reasonable free tier that could be useful for most people, and it also produces... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2022
    HQ Location
    Ghent, Belgium
    Twitter
    @AikidoSecurity
    4,225 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    175 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aikido Security is the developer-first security platform that unifies code, cloud, protection, and attack testing in one suite of best-in-class products. Built by developers for developers, Aikido hel

Users
  • CTO
  • Founder
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 71% Small-Business
  • 17% Mid-Market
Aikido Security features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
8.9
Automated Scans
Average: 8.9
8.0
Configuration Monitoring
Average: 8.4
Angel I.
AI
I appreciate that Aikido Security offers a single plane of glass with everything in one queue, which is very important to me. It's simple to use... Read review
Verified User in Computer Software
UC
Regular scans of our codebase flag potential issues early. It has a reasonable free tier that could be useful for most people, and it also produces... Read review
Seller Details
Company Website
Year Founded
2022
HQ Location
Ghent, Belgium
Twitter
@AikidoSecurity
4,225 Twitter followers
LinkedIn® Page
www.linkedin.com
175 employees on LinkedIn®
(112)4.9 out of 5
9th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.8
    Detection Rate
    Average: 8.9
    9.8
    Automated Scans
    Average: 8.9
    9.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    57,097 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,146 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.2
9.8
Detection Rate
Average: 8.9
9.8
Automated Scans
Average: 8.9
9.9
Configuration Monitoring
Average: 8.4
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
57,097 Twitter followers
LinkedIn® Page
www.linkedin.com
3,146 employees on LinkedIn®
(105)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    AI
    Price comparing other commercial scanners Read review
    MM
    Quick and easy configuration, installation and scanning. High performance, low false positive number, API integration with our ticketing and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,561 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    332 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 34% Mid-Market
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Verified User in Information Technology and Services
AI
Price comparing other commercial scanners Read review
MM
Quick and easy configuration, installation and scanning. High performance, low false positive number, API integration with our ticketing and... Read review
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,561 Twitter followers
LinkedIn® Page
www.linkedin.com
332 employees on LinkedIn®
(87)4.7 out of 5
13th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

    Users
    • CEO
    • Director
    Industries
    • Marketing and Advertising
    • Information Technology and Services
    Market Segment
    • 91% Small-Business
    • 7% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Beagle Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • NT
    Automatically prioritizes high-risk vulnerabilities Scheduled recurring scans Scan multiple environments at the same time API specific scan... Read review
    JB
    The simplicity of the solution. It's very easy to navigate, the portal works well and grouping of projects really helps track customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Francisco, US
    Twitter
    @beaglesecure
    211 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

Users
  • CEO
  • Director
Industries
  • Marketing and Advertising
  • Information Technology and Services
Market Segment
  • 91% Small-Business
  • 7% Mid-Market
Beagle Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
NT
Automatically prioritizes high-risk vulnerabilities Scheduled recurring scans Scan multiple environments at the same time API specific scan... Read review
JB
The simplicity of the solution. It's very easy to navigate, the portal works well and grouping of projects really helps track customer... Read review
Seller Details
Year Founded
2020
HQ Location
San Francisco, US
Twitter
@beaglesecure
211 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

    Users
    • Cyber Security Associate
    • Cyber Security Engineer
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Hybrid Cloud Security features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.5
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Sumit K.
    SK
    Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
    Lemmuel A.
    LA
    I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    LinkedIn® Page
    www.linkedin.com
    7,862 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
    Total Revenue (USD mm)
    $1,515
Product Description
How are these determined?Information
This description is provided by the seller.

In today's complex digital landscape, securing your cloud environment is paramount. The management and security of your hybrid and multi-cloud setup pose increasing challenges. Trend's Cloud Security

Users
  • Cyber Security Associate
  • Cyber Security Engineer
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Enterprise
Hybrid Cloud Security features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.5
Configuration Monitoring
Average: 8.4
Sumit K.
SK
Trend Micro Cloud One (which includes Deep Security) offers a unified security solution that can manage and protect workloads across physical,... Read review
Lemmuel A.
LA
I like trend micro hybrid cloud security when they can protect you on a modern threats even you are using hybrid setup Read review
Seller Details
Year Founded
1988
HQ Location
Tokyo
LinkedIn® Page
www.linkedin.com
7,862 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Total Revenue (USD mm)
$1,515
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Insurance
    UI
    It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
    Michael E.
    ME
    InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,561 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,249 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 32% Mid-Market
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
Verified User in Insurance
UI
It is a very reliable software, they let you know immediately when something changes. It is easy to navigate and use the software. I especially... Read review
Michael E.
ME
InsightVM gives our team the ability to rapidly scan our entire environment without creating a ton of noise in our SIEM tool while still providing... Read review
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,561 Twitter followers
LinkedIn® Page
www.linkedin.com
3,249 employees on LinkedIn®
Ownership
NASDAQ:RPD
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyrisma features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Mark V.
    MV
    We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
    Verified User in Information Services
    UI
    It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyrisma
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @Cyrisma_USA
    42 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
Cyrisma features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Mark V.
MV
We were able to deploy Cyrisma in no time to a bunch of client machines and get usable reports in about 24 hours. From there we had a great game... Read review
Verified User in Information Services
UI
It is more cost effective than larger scanners such as Nessus, but gives you more options for repeated scans and remediation. Read review
Seller Details
Seller
Cyrisma
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@Cyrisma_USA
42 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
(71)4.3 out of 5
7th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra VM is a proactive, risk-based vulnerability management solution that helps organizations identify, assess, and prioritize security weaknesses across their infrastructure. Beyond basic scanning,

    Users
    No information available
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 45% Mid-Market
    • 35% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra VM features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.2
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Cristian P.
    CP
    AVDS, in my opinion, is one of the best in-depth inspection for security weaknesses tool because substantially reduce the cost of, and in some... Read review
    JG
    Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,576 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,694 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra VM is a proactive, risk-based vulnerability management solution that helps organizations identify, assess, and prioritize security weaknesses across their infrastructure. Beyond basic scanning,

Users
No information available
Industries
  • Financial Services
  • Banking
Market Segment
  • 45% Mid-Market
  • 35% Small-Business
Fortra VM features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.2
Configuration Monitoring
Average: 8.4
Cristian P.
CP
AVDS, in my opinion, is one of the best in-depth inspection for security weaknesses tool because substantially reduce the cost of, and in some... Read review
JG
Automated quarterly scanning with a decent user portal and a fountain of information. Reports dictate how to remdiate and improve your "grade". ... Read review
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,576 Twitter followers
LinkedIn® Page
www.linkedin.com
1,694 employees on LinkedIn®
(67)4.6 out of 5
14th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:$59.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Indusface WAS (Web Application Scanner) provides comprehensive managed dynamic application security testing (DAST) solution. It is a zero-touch, non-intrusive cloud-based solution that provides daily

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 52% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Indusface WAS features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • amrutha v.
    AV
    I am really happy to be connected with indusface, It has the best security complaince in place. The team is very well versed in their offerings and... Read review
    George Alex O.
    GO
    The easy-to-use interface of the platform Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Indusface
    Year Founded
    2012
    HQ Location
    Vadodara
    Twitter
    @Indusface
    3,494 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    174 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Indusface WAS (Web Application Scanner) provides comprehensive managed dynamic application security testing (DAST) solution. It is a zero-touch, non-intrusive cloud-based solution that provides daily

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 52% Small-Business
  • 37% Mid-Market
Indusface WAS features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
amrutha v.
AV
I am really happy to be connected with indusface, It has the best security complaince in place. The team is very well versed in their offerings and... Read review
George Alex O.
GO
The easy-to-use interface of the platform Read review
Seller Details
Seller
Indusface
Year Founded
2012
HQ Location
Vadodara
Twitter
@Indusface
3,494 Twitter followers
LinkedIn® Page
www.linkedin.com
174 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Mend.io is the leading application security solution, helping organizations reduce application risk efficiently. Built for modern, AI-driven, and traditional development environments alike, Mend.io pr

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mend.io features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Vivek Kumar S.
    VS
    Interface and flow of the application.Also the simplicity Read review
    Meer T.
    MT
    The best thing is the security and easy to use. The mend bot offers couple of qualities to protect your projects against several security protocols... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mend
    Company Website
    Year Founded
    2011
    HQ Location
    Boston, Massachusetts
    Twitter
    @Mend_io
    11,342 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    275 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Mend.io is the leading application security solution, helping organizations reduce application risk efficiently. Built for modern, AI-driven, and traditional development environments alike, Mend.io pr

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Mend.io features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Vivek Kumar S.
VS
Interface and flow of the application.Also the simplicity Read review
Meer T.
MT
The best thing is the security and easy to use. The mend bot offers couple of qualities to protect your projects against several security protocols... Read review
Seller Details
Seller
Mend
Company Website
Year Founded
2011
HQ Location
Boston, Massachusetts
Twitter
@Mend_io
11,342 Twitter followers
LinkedIn® Page
www.linkedin.com
275 employees on LinkedIn®