2026 Best Software Awards are here!See the list

Best Vulnerability Scanner Software - Page 4

Lauren Worth
LW
Researched and written by Lauren Worth

Vulnerability scanners are tools that constantly monitor applications and networks to identify security vulnerabilities. They work by maintaining an up-to-date database of known vulnerabilities, and conduct scans to identify potential exploits. Vulnerability scanners are used by companies to test applications and networks against known vulnerabilities and to identify new vulnerabilities. The scanners typically produce analytical reports detailing the state of an application or network security and provide recommendations to remedy known issues. Some vulnerability scanners work in a similar manner to dynamic application security testing (DAST) tools, but scan tools instead of mimicking attacks or performing penetration tests.

To qualify for inclusion in the Vulnerability Scanner category, a product must:

Maintain a database of known vulnerabilities
Continuously scan applications for vulnerabilities
Produce reports analyzing known vulnerabilities and new exploits
Show More
Show Less

Featured Vulnerability Scanner Software At A Glance

Free Plan Available:
Aikido Security
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
214 Listings in Vulnerability Scanner Available
(87)4.7 out of 5
14th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

    Users
    • CEO
    • Director
    Industries
    • Marketing and Advertising
    • Information Technology and Services
    Market Segment
    • 91% Small-Business
    • 7% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Beagle Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    6
    Testing Services
    6
    Automation Testing
    4
    Features
    4
    Setup Ease
    4
    Cons
    Authentication Issues
    2
    Complex Setup
    2
    Lacking Features
    2
    Lack of Detail
    2
    Login Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Beagle Security features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    San Francisco, US
    Twitter
    @beaglesecure
    211 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Beagle Security helps you identify vulnerabilities in your web applications, APIs, GraphQL and remediate them with actionable insights before hackers harm you in any manner. With Beagle Security, you

Users
  • CEO
  • Director
Industries
  • Marketing and Advertising
  • Information Technology and Services
Market Segment
  • 91% Small-Business
  • 7% Mid-Market
Beagle Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
6
Testing Services
6
Automation Testing
4
Features
4
Setup Ease
4
Cons
Authentication Issues
2
Complex Setup
2
Lacking Features
2
Lack of Detail
2
Login Issues
2
Beagle Security features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2020
HQ Location
San Francisco, US
Twitter
@beaglesecure
211 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
(105)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Vulnerability Detection
    7
    Accuracy of Results
    5
    Security
    5
    Vulnerability Identification
    5
    Cons
    Expensive
    4
    Complexity
    3
    Complex Setup
    3
    Poor Customer Support
    3
    Slow Performance
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 9.0
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,556 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    332 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 34% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Vulnerability Detection
7
Accuracy of Results
5
Security
5
Vulnerability Identification
5
Cons
Expensive
4
Complexity
3
Complex Setup
3
Poor Customer Support
3
Slow Performance
3
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 9.0
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,556 Twitter followers
LinkedIn® Page
www.linkedin.com
332 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operat

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Small-Business
    • 37% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Probely features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.6
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 9.0
    9.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Probely
    Year Founded
    2016
    HQ Location
    Porto, PT
    Twitter
    @probely
    527 Twitter followers
    LinkedIn® Page
    pt.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Probely is a web vulnerability scanner that enables customers to easily test the security of their Web Applications & APIs. Our goal is to narrow the gap between development, security, and operat

Users
No information available
Industries
No information available
Market Segment
  • 47% Small-Business
  • 37% Mid-Market
Probely features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.6
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 9.0
9.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Probely
Year Founded
2016
HQ Location
Porto, PT
Twitter
@probely
527 Twitter followers
LinkedIn® Page
pt.linkedin.com
5 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

    Users
    • CEO
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyrisma Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    13
    Time-saving
    13
    Customer Support
    11
    Features
    11
    Vulnerability Identification
    9
    Cons
    Learning Curve
    4
    Missing Features
    4
    Not User-Friendly
    4
    Poor Navigation
    4
    API Limitations
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyrisma features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyrisma
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @Cyrisma_USA
    44 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration

Users
  • CEO
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
Cyrisma Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
13
Time-saving
13
Customer Support
11
Features
11
Vulnerability Identification
9
Cons
Learning Curve
4
Missing Features
4
Not User-Friendly
4
Poor Navigation
4
API Limitations
3
Cyrisma features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Cyrisma
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@Cyrisma_USA
44 Twitter followers
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bright Security’s dev-centric DAST platform empowers both developers and AppSec professionals with enterprise-grade security testing capabilities for web applications, APIs, and GenAI and LLM applicat

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 52% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Bright Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    5
    Ease of Use
    5
    Accuracy of Results
    4
    Customer Support
    3
    Detection
    3
    Cons
    Complex Setup
    4
    Setup Complexity
    4
    Complexity
    3
    Learning Curve
    3
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Bright Security features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    7.8
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    San Rafael
    Twitter
    @BrightAppSec
    1,526 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Bright Security’s dev-centric DAST platform empowers both developers and AppSec professionals with enterprise-grade security testing capabilities for web applications, APIs, and GenAI and LLM applicat

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 52% Enterprise
  • 34% Mid-Market
Bright Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
5
Ease of Use
5
Accuracy of Results
4
Customer Support
3
Detection
3
Cons
Complex Setup
4
Setup Complexity
4
Complexity
3
Learning Curve
3
Authentication Issues
1
Bright Security features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
7.8
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2018
HQ Location
San Rafael
Twitter
@BrightAppSec
1,526 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
(20)4.8 out of 5
9th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Runecast features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 9.0
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, London
    Twitter
    @Runecast
    1,129 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Runecast is an enterprise CNAPP platform which saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. It helps you proactively reme

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 25% Mid-Market
Runecast features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 9.0
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2014
HQ Location
London, London
Twitter
@Runecast
1,129 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Contrast Security is the global leader in Application Detection and Response (ADR), empowering organizations to see and stop attacks on applications and APIs in real time. Contrast embeds patented thr

    Users
    No information available
    Industries
    • Insurance
    • Information Technology and Services
    Market Segment
    • 67% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Contrast Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    17
    Accuracy of Findings
    13
    Security
    13
    Accuracy of Results
    11
    Detection
    8
    Cons
    Lacking Features
    5
    False Positives
    3
    Inadequate Reporting
    3
    Limited Features
    3
    Performance Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Contrast Security features and usability ratings that predict user satisfaction
    9.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2014
    HQ Location
    Pleasanton, CA
    Twitter
    @contrastsec
    5,504 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Contrast Security is the global leader in Application Detection and Response (ADR), empowering organizations to see and stop attacks on applications and APIs in real time. Contrast embeds patented thr

Users
No information available
Industries
  • Insurance
  • Information Technology and Services
Market Segment
  • 67% Enterprise
  • 20% Mid-Market
Contrast Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
17
Accuracy of Findings
13
Security
13
Accuracy of Results
11
Detection
8
Cons
Lacking Features
5
False Positives
3
Inadequate Reporting
3
Limited Features
3
Performance Issues
3
Contrast Security features and usability ratings that predict user satisfaction
9.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
Year Founded
2014
HQ Location
Pleasanton, CA
Twitter
@contrastsec
5,504 Twitter followers
LinkedIn® Page
www.linkedin.com
224 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys Vulnerability Management (VM) is a cloud-based service that provides organizations with immediate, global visibility into potential vulnerabilities within their IT systems. By continuously dete

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Dashboard Usability
    1
    Features
    1
    Integrations
    1
    Vulnerability Identification
    1
    Cons
    Access Restrictions
    1
    Expensive
    1
    Poor Customer Support
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.2
    Automated Scans
    Average: 9.0
    7.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,164 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys Vulnerability Management (VM) is a cloud-based service that provides organizations with immediate, global visibility into potential vulnerabilities within their IT systems. By continuously dete

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 33% Mid-Market
Qualys VM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Dashboard Usability
1
Features
1
Integrations
1
Vulnerability Identification
1
Cons
Access Restrictions
1
Expensive
1
Poor Customer Support
1
Pricing Issues
1
Qualys VM features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.2
Automated Scans
Average: 9.0
7.6
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,164 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
(281)4.6 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify your developer experience with the world's first AI-augmented software delivery platform. Upgrade your software delivery with Harness' innovative CI/CD, Feature Flags, Infrastructure as Co

    Users
    • Software Engineer
    • DevOps Engineer
    Industries
    • Computer Software
    • Financial Services
    Market Segment
    • 41% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Harness Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    114
    Features
    75
    Feature Flags
    50
    Easy Setup
    40
    Easy Integrations
    31
    Cons
    Missing Features
    23
    Limitations
    20
    Limited Features
    20
    Learning Curve
    17
    Poor UI
    16
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Harness Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    7.9
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 9.0
    7.1
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Harness
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco
    Twitter
    @HarnessWealth
    1,433 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,611 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify your developer experience with the world's first AI-augmented software delivery platform. Upgrade your software delivery with Harness' innovative CI/CD, Feature Flags, Infrastructure as Co

Users
  • Software Engineer
  • DevOps Engineer
Industries
  • Computer Software
  • Financial Services
Market Segment
  • 41% Enterprise
  • 39% Mid-Market
Harness Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
114
Features
75
Feature Flags
50
Easy Setup
40
Easy Integrations
31
Cons
Missing Features
23
Limitations
20
Limited Features
20
Learning Curve
17
Poor UI
16
Harness Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
7.9
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 9.0
7.1
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Harness
Company Website
Year Founded
2018
HQ Location
San Francisco
Twitter
@HarnessWealth
1,433 Twitter followers
LinkedIn® Page
www.linkedin.com
1,611 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seller Details
    Expand/Collapse Seller Details
(68)4.6 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    StackHawk is reimagining AppSec for AI-driven development, where applications are built faster than traditional AppSec tools can keep up. Our AppSec Intelligence Platform combines scalable runtime tes

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 46% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • StackHawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    10
    Customer Support
    9
    Ease of Use
    9
    Integrations
    7
    Scanning Efficiency
    5
    Cons
    Setup Complexity
    5
    Complex Setup
    4
    High Learning Curve
    3
    Lacking Features
    3
    Limited Scope
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • StackHawk features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    5.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    StackHawk
    Company Website
    Year Founded
    2019
    HQ Location
    Denver, CO
    Twitter
    @StackHawk
    1,138 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    46 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

StackHawk is reimagining AppSec for AI-driven development, where applications are built faster than traditional AppSec tools can keep up. Our AppSec Intelligence Platform combines scalable runtime tes

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 46% Small-Business
  • 35% Mid-Market
StackHawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
10
Customer Support
9
Ease of Use
9
Integrations
7
Scanning Efficiency
5
Cons
Setup Complexity
5
Complex Setup
4
High Learning Curve
3
Lacking Features
3
Limited Scope
3
StackHawk features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
5.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
StackHawk
Company Website
Year Founded
2019
HQ Location
Denver, CO
Twitter
@StackHawk
1,138 Twitter followers
LinkedIn® Page
www.linkedin.com
46 employees on LinkedIn®
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ARMO Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    24
    Ease of Use
    23
    Features
    20
    Comprehensive Security
    15
    Vulnerability Detection
    15
    Cons
    Learning Curve
    11
    Integration Issues
    10
    Difficult Learning
    8
    Complex Setup
    6
    Difficult Setup
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ARMO Platform features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    8.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ARMO
    Year Founded
    2019
    HQ Location
    Tel Aviv, IL
    Twitter
    @armosec
    3,114 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    88 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ARMO Platform is the only runtime-driven, open-source first, cloud security platform. It is the only security platform that continuously minimizes cloud attack surface based on runtime insights, while

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
ARMO Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
24
Ease of Use
23
Features
20
Comprehensive Security
15
Vulnerability Detection
15
Cons
Learning Curve
11
Integration Issues
10
Difficult Learning
8
Complex Setup
6
Difficult Setup
6
ARMO Platform features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
8.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
ARMO
Year Founded
2019
HQ Location
Tel Aviv, IL
Twitter
@armosec
3,114 Twitter followers
LinkedIn® Page
www.linkedin.com
88 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fast, Flexible Code Security! Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Secu

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 44% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiuwan Code Security & Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy
    2
    Accuracy of Findings
    2
    Customer Support
    2
    Ease of Use
    2
    Automation Testing
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 9.0
    6.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,364 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fast, Flexible Code Security! Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Secu

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 44% Enterprise
  • 34% Mid-Market
Kiuwan Code Security & Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy
2
Accuracy of Findings
2
Customer Support
2
Ease of Use
2
Automation Testing
1
Cons
This product has not yet received any negative sentiments.
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 9.0
6.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,364 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 65% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Defendify All-In-One Cybersecurity Solution Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Cybersecurity
    6
    Easy Setup
    5
    Insights
    5
    Monitoring
    5
    Cons
    Inadequate Reporting
    4
    Poor Reporting
    4
    Lack of Information
    2
    Limited Customization
    2
    Limited Features
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.4
    Automated Scans
    Average: 9.0
    8.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Defendify
    Year Founded
    2017
    HQ Location
    Portland, Maine
    Twitter
    @defendify
    306 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    40 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 65% Small-Business
  • 35% Mid-Market
Defendify All-In-One Cybersecurity Solution Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Cybersecurity
6
Easy Setup
5
Insights
5
Monitoring
5
Cons
Inadequate Reporting
4
Poor Reporting
4
Lack of Information
2
Limited Customization
2
Limited Features
2
Defendify All-In-One Cybersecurity Solution features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.4
Automated Scans
Average: 9.0
8.9
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Defendify
Year Founded
2017
HQ Location
Portland, Maine
Twitter
@defendify
306 Twitter followers
LinkedIn® Page
www.linkedin.com
40 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Evolve Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Actionable Intelligence
    2
    Communication
    2
    Ease of Use
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evolve Security features and usability ratings that predict user satisfaction
    9.8
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    8.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chicago, Illinois
    Twitter
    @theevolvesec
    794 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    70 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 20% Small-Business
Evolve Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Actionable Intelligence
2
Communication
2
Ease of Use
2
Vulnerability Detection
2
Vulnerability Identification
2
Cons
This product has not yet received any negative sentiments.
Evolve Security features and usability ratings that predict user satisfaction
9.8
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
8.6
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
794 Twitter followers
LinkedIn® Page
www.linkedin.com
70 employees on LinkedIn®