Introducing G2.ai, the future of software buying.Try now

Best Vulnerability Scanner Software - Page 3

Lauren Worth
LW
Researched and written by Lauren Worth

Vulnerability scanners are tools that constantly monitor applications and networks to identify security vulnerabilities. They work by maintaining an up-to-date database of known vulnerabilities, and conduct scans to identify potential exploits. Vulnerability scanners are used by companies to test applications and networks against known vulnerabilities and to identify new vulnerabilities. The scanners typically produce analytical reports detailing the state of an application or network security and provide recommendations to remedy known issues. Some vulnerability scanners work in a similar manner to dynamic application security testing (DAST) tools, but scan tools instead of mimicking attacks or performing penetration tests.

To qualify for inclusion in the Vulnerability Scanner category, a product must:

Maintain a database of known vulnerabilities
Continuously scan applications for vulnerabilities
Produce reports analyzing known vulnerabilities and new exploits
Show More
Show Less

Featured Vulnerability Scanner Software At A Glance

Free Plan Available:
Intruder
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Vulnerability Scanner Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
212 Listings in Vulnerability Scanner Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pynt is an innovative API Security Testing platform exposing verified API threats through simulated attacks. Hundreds of companies rely on Pynt to continuously monitor, classify and attack poorly s

    Users
    No information available
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 57% Small-Business
    • 23% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pynt - API Security Testing Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    25
    Vulnerability Detection
    25
    Easy Integrations
    23
    Ease of Use
    20
    API Management
    19
    Cons
    Complex Setup
    12
    Setup Complexity
    7
    Limited Features
    5
    Poor Interface Design
    4
    UX Improvement
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pynt - API Security Testing features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pynt
    Year Founded
    2022
    HQ Location
    Tel Aviv, IL
    Twitter
    @pynt_io
    367 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pynt is an innovative API Security Testing platform exposing verified API threats through simulated attacks. Hundreds of companies rely on Pynt to continuously monitor, classify and attack poorly s

Users
No information available
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 57% Small-Business
  • 23% Enterprise
Pynt - API Security Testing Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
25
Vulnerability Detection
25
Easy Integrations
23
Ease of Use
20
API Management
19
Cons
Complex Setup
12
Setup Complexity
7
Limited Features
5
Poor Interface Design
4
UX Improvement
4
Pynt - API Security Testing features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Pynt
Year Founded
2022
HQ Location
Tel Aviv, IL
Twitter
@pynt_io
367 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • APPCHECK Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Customer Support
    15
    Vulnerability Detection
    14
    Automated Scanning
    11
    Scanning Technology
    10
    Cons
    UX Improvement
    6
    Poor Interface Design
    4
    Lacking Features
    3
    Poor Reporting
    3
    Scanning Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • APPCHECK features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    APPCHECK
    Company Website
    Year Founded
    2014
    HQ Location
    Leeds, GB
    Twitter
    @AppcheckNG
    656 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    105 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AppCheck is a Dynamic Application Security Testing (DAST) and network vulnerability testing solution, developed and supported by experienced penetration testers. We approach security testing as a

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
APPCHECK Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Customer Support
15
Vulnerability Detection
14
Automated Scanning
11
Scanning Technology
10
Cons
UX Improvement
6
Poor Interface Design
4
Lacking Features
3
Poor Reporting
3
Scanning Issues
3
APPCHECK features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
APPCHECK
Company Website
Year Founded
2014
HQ Location
Leeds, GB
Twitter
@AppcheckNG
656 Twitter followers
LinkedIn® Page
www.linkedin.com
105 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(68)4.6 out of 5
Optimized for quick response
12th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Invicti (formerly Netsparker)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invicti (formerly Netsparker) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Scanning Technology
    7
    Features
    6
    Reporting Quality
    6
    Vulnerability Detection
    6
    Cons
    Poor Customer Support
    3
    Slow Performance
    3
    Slow Scanning
    3
    API Issues
    2
    Complex Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 26% Mid-Market
Invicti (formerly Netsparker) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Scanning Technology
7
Features
6
Reporting Quality
6
Vulnerability Detection
6
Cons
Poor Customer Support
3
Slow Performance
3
Slow Scanning
3
API Issues
2
Complex Setup
2
Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,560 Twitter followers
LinkedIn® Page
www.linkedin.com
292 employees on LinkedIn®
(22)4.9 out of 5
14th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Feroot AI Platform for Compliance, Security, and Risk Management of websites and web apps. It brings AI to compliance and security processes – replaces manual work, errors and overhead costs with c

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Feroot Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    9
    Ease of Use
    5
    Helpful
    5
    Security
    5
    Compliance Support
    4
    Cons
    Complexity
    2
    Dependency on Support
    1
    Difficult Learning
    1
    Difficult Setup
    1
    Expertise Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Feroot Security features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 8.9
    8.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2017
    HQ Location
    Toronto, Ontario, Canada
    LinkedIn® Page
    www.linkedin.com
    35 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Feroot AI Platform for Compliance, Security, and Risk Management of websites and web apps. It brings AI to compliance and security processes – replaces manual work, errors and overhead costs with c

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 32% Mid-Market
Feroot Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
9
Ease of Use
5
Helpful
5
Security
5
Compliance Support
4
Cons
Complexity
2
Dependency on Support
1
Difficult Learning
1
Difficult Setup
1
Expertise Required
1
Feroot Security features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 8.9
8.9
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2017
HQ Location
Toronto, Ontario, Canada
LinkedIn® Page
www.linkedin.com
35 employees on LinkedIn®
(54)4.6 out of 5
View top Consulting Services for Semgrep
Save to My Lists
Entry Level Price:Starting at $40.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Semgrep is a modern static analysis (SAST), software composition analysis (SCA), and secrets detection platform designed for both developers and security teams. It combines fast, deterministic analysi

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Semgrep Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    14
    Vulnerability Detection
    13
    Scanning Efficiency
    12
    Security
    12
    Cons
    Not User-Friendly
    7
    Limited Features
    6
    Difficult Learning
    5
    Lack of Guidance
    5
    Learning Curve
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Semgrep features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Semgrep
    Company Website
    Year Founded
    2017
    HQ Location
    San Francisco, US
    Twitter
    @semgrep
    4,129 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Semgrep is a modern static analysis (SAST), software composition analysis (SCA), and secrets detection platform designed for both developers and security teams. It combines fast, deterministic analysi

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Enterprise
  • 41% Mid-Market
Semgrep Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
14
Vulnerability Detection
13
Scanning Efficiency
12
Security
12
Cons
Not User-Friendly
7
Limited Features
6
Difficult Learning
5
Lack of Guidance
5
Learning Curve
5
Semgrep features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
8.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Semgrep
Company Website
Year Founded
2017
HQ Location
San Francisco, US
Twitter
@semgrep
4,129 Twitter followers
LinkedIn® Page
www.linkedin.com
224 employees on LinkedIn®
(22)4.1 out of 5
View top Consulting Services for Google Cloud Security Scanner
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically scan your App Engine apps for common vulnerabilities

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 41% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Google Cloud Security Scanner features and usability ratings that predict user satisfaction
    7.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.4
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    7.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    31,524,859 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    325,307 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically scan your App Engine apps for common vulnerabilities

Users
No information available
Industries
  • Computer Software
Market Segment
  • 41% Mid-Market
  • 36% Small-Business
Google Cloud Security Scanner features and usability ratings that predict user satisfaction
7.5
Has the product been a good partner in doing business?
Average: 9.2
7.4
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
7.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
31,524,859 Twitter followers
LinkedIn® Page
www.linkedin.com
325,307 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    8
    Vulnerability Detection
    8
    Vulnerability Identification
    6
    Customer Support
    4
    Detection
    4
    Cons
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Integration Issues
    1
    Lack of Integration
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ResilientX Security Platform features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    9.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    33 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
8
Vulnerability Detection
8
Vulnerability Identification
6
Customer Support
4
Detection
4
Cons
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Integration Issues
1
Lack of Integration
1
ResilientX Security Platform features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
9.8
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
33 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

    Users
    No information available
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Aqua Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    20
    Ease of Use
    18
    Features
    12
    Detection
    10
    Vulnerability Identification
    10
    Cons
    Missing Features
    10
    Lack of Features
    6
    Limited Features
    6
    Improvement Needed
    5
    Difficult Navigation
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aqua Security features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    7.7
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    6.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Burlington, US
    Twitter
    @AquaSecTeam
    7,628 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    548 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and run

Users
No information available
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 56% Enterprise
  • 39% Mid-Market
Aqua Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
20
Ease of Use
18
Features
12
Detection
10
Vulnerability Identification
10
Cons
Missing Features
10
Lack of Features
6
Limited Features
6
Improvement Needed
5
Difficult Navigation
4
Aqua Security features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
7.7
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
6.8
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2015
HQ Location
Burlington, US
Twitter
@AquaSecTeam
7,628 Twitter followers
LinkedIn® Page
www.linkedin.com
548 employees on LinkedIn®
(125)4.5 out of 5
View top Consulting Services for Snyk
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    3
    Integrations
    3
    Integration Support
    3
    Version Control
    3
    Git Integration
    2
    Cons
    Complex Configuration
    2
    Alert Overload
    1
    Bugs
    1
    Command Line Difficulty
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    20,093 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 37% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
3
Integrations
3
Integration Support
3
Version Control
3
Git Integration
2
Cons
Complex Configuration
2
Alert Overload
1
Bugs
1
Command Line Difficulty
1
Complexity
1
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
20,093 Twitter followers
LinkedIn® Page
www.linkedin.com
1,221 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

    Users
    • CEO
    • Director
    Industries
    • Marketing and Advertising
    • Information Technology and Services
    Market Segment
    • 91% Small-Business
    • 7% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Beagle Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Testing Services
    6
    Automation Testing
    4
    Features
    4
    Setup Ease
    4
    Cons
    Authentication Issues
    2
    Complex Setup
    2
    Lacking Features
    2
    Lack of Detail
    2
    Login Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Beagle Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Francisco, US
    Twitter
    @beaglesecure
    208 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

Users
  • CEO
  • Director
Industries
  • Marketing and Advertising
  • Information Technology and Services
Market Segment
  • 91% Small-Business
  • 7% Mid-Market
Beagle Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Testing Services
6
Automation Testing
4
Features
4
Setup Ease
4
Cons
Authentication Issues
2
Complex Setup
2
Lacking Features
2
Lack of Detail
2
Login Issues
2
Beagle Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2020
HQ Location
San Francisco, US
Twitter
@beaglesecure
208 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Probely features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Probely
    Year Founded
    2016
    HQ Location
    Porto, PT
    Twitter
    @probely
    529 Twitter followers
    LinkedIn® Page
    pt.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operat

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 37% Mid-Market
Probely features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.6
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Probely
Year Founded
2016
HQ Location
Porto, PT
Twitter
@probely
529 Twitter followers
LinkedIn® Page
pt.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyrisma Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Time-saving
    13
    Customer Support
    11
    Features
    11
    Vulnerability Identification
    9
    Cons
    Learning Curve
    4
    Missing Features
    4
    Not User-Friendly
    4
    Poor Navigation
    4
    API Limitations
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyrisma features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyrisma
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @Cyrisma_USA
    43 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
Cyrisma Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Time-saving
13
Customer Support
11
Features
11
Vulnerability Identification
9
Cons
Learning Curve
4
Missing Features
4
Not User-Friendly
4
Poor Navigation
4
API Limitations
3
Cyrisma features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Cyrisma
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@Cyrisma_USA
43 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
(105)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Vulnerability Detection
    7
    Accuracy of Results
    5
    Security
    5
    Vulnerability Identification
    5
    Cons
    Expensive
    4
    Complexity
    3
    Complex Setup
    3
    Poor Customer Support
    3
    Slow Performance
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,560 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 34% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Vulnerability Detection
7
Accuracy of Results
5
Security
5
Vulnerability Identification
5
Cons
Expensive
4
Complexity
3
Complex Setup
3
Poor Customer Support
3
Slow Performance
3
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,560 Twitter followers
LinkedIn® Page
www.linkedin.com
292 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seller Details
    Expand/Collapse Seller Details
(20)4.8 out of 5
9th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,132 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,132 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®