Introducing G2.ai, the future of software buying.Try now

Compare Aikido Security and Detectify

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Aikido Security
Aikido Security
Star Rating
(104)4.6 out of 5
Market Segments
Small-Business (76.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 5 pricing plans
Detectify
Detectify
Star Rating
(51)4.5 out of 5
Market Segments
Small-Business (47.9% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Contact Us
Browse all 2 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Detectify excels in its Automated Scans feature, achieving a score of 8.9, which reviewers say provides comprehensive coverage and timely detection of vulnerabilities. In contrast, Aikido Security, while still strong, scored slightly lower at 8.8, indicating a more consistent but less robust scanning capability.
  • Reviewers mention that Aikido Security shines in Ease of Use, with a score of 9.5 compared to Detectify's 9.0. Users appreciate Aikido's intuitive interface, which they say simplifies the onboarding process and daily operations.
  • G2 users highlight the superior Quality of Support from both products, but Aikido Security edges out with a score of 9.6 versus Detectify's 9.4. Reviewers say that Aikido's support team is particularly responsive and knowledgeable, making it easier to resolve issues quickly.
  • Users on G2 report that Detectify's False Positives rate is a concern, scoring 6.3, which some reviewers say can lead to unnecessary alerts and wasted time. Aikido Security, however, has a better score of 7.8, indicating a more reliable detection system that minimizes false alarms.
  • Reviewers mention that Aikido Security's Product Direction is highly rated at 10.0, suggesting a strong commitment to innovation and user feedback. In contrast, Detectify's score of 7.7 indicates room for improvement in aligning product development with user needs.
  • Users say that Detectify's Security Auditing feature is robust, scoring 9.1, which reviewers appreciate for its thoroughness in identifying security gaps. Aikido Security, while also effective, scored slightly lower at 8.2, indicating that Detectify may offer a more comprehensive auditing experience.
Pricing
Entry-Level Pricing
Aikido Security
Free (forever)
Free
Browse all 5 pricing plans
Detectify
Full EASM solution
Contact Us
Browse all 2 pricing plans
Free Trial
Aikido Security
Free Trial is available
Detectify
Free Trial is available
Ratings
Meets Requirements
9.0
101
8.7
34
Ease of Use
9.4
102
9.0
35
Ease of Setup
9.5
94
9.2
25
Ease of Admin
9.4
63
8.7
26
Quality of Support
9.4
84
9.4
31
Has the product been a good partner in doing business?
9.4
57
9.7
24
Product Direction (% positive)
9.4
101
7.7
31
Features by Category
Not enough data
8.3
19
Administration
Not enough data
7.5
10
Not enough data
8.8
17
Not enough data
9.2
14
Risk Analysis
Not enough data
8.1
7
Not enough data
8.0
14
Not enough data
8.2
11
Threat Protection
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Not enough data
8.9
10
Administration
Not enough data
8.0
5
Not enough data
Not enough data
Not enough data
8.8
7
Analysis
Not enough data
7.8
6
Not enough data
9.2
8
Not enough data
9.3
9
Testing
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
9.7
6
Not enough data
9.5
7
Static Application Security Testing (SAST)Hide 14 FeaturesShow 14 Features
8.3
57
Not enough data
Administration
8.6
56
Not enough data
Feature Not Available
Not enough data
Analysis
8.7
54
Not enough data
8.9
54
Not enough data
9.0
54
Not enough data
8.9
53
Not enough data
Testing
7.3
42
Not enough data
7.0
41
Not enough data
8.1
43
Not enough data
8.4
44
Not enough data
8.2
42
Not enough data
Feature Not Available
Not enough data
7.6
46
Not enough data
Agentic AI - Static Application Security Testing (SAST)
8.3
24
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.5
22
7.7
11
Administration
Feature Not Available
7.6
7
Feature Not Available
6.7
5
Analysis
9.2
21
7.3
10
9.1
21
6.5
8
9.4
21
Feature Not Available
9.4
21
9.2
10
9.5
20
Not enough data
Testing
6.8
17
Feature Not Available
Feature Not Available
9.0
5
8.5
18
Feature Not Available
8.0
18
9.0
10
Feature Not Available
7.9
11
6.5
18
5.8
11
8.4
37
Not enough data
Administration
8.8
36
Not enough data
8.1
34
Not enough data
9.0
34
Not enough data
8.3
32
Not enough data
Monitoring
8.6
35
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Protection
Feature Not Available
Not enough data
8.4
33
Not enough data
Feature Not Available
Not enough data
7.6
31
Not enough data
8.0
62
7.9
22
Performance
8.7
60
8.5
16
Feature Not Available
8.5
19
7.7
58
6.3
19
8.9
59
8.9
20
Network
7.9
57
8.0
11
7.9
54
8.3
12
7.9
55
8.3
10
Application
7.2
52
Feature Not Available
8.8
56
6.5
9
7.9
50
8.2
14
Agentic AI - Vulnerability Scanner
7.8
24
Not enough data
7.6
24
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
9.0
22
Not enough data
Functionality - Software Composition Analysis
9.0
21
Not enough data
9.0
21
Not enough data
9.0
21
Not enough data
Effectiveness - Software Composition Analysis
9.0
21
Not enough data
9.0
21
Not enough data
9.1
21
Not enough data
8.8
13
Not enough data
Documentation
9.6
9
Not enough data
9.6
9
Not enough data
8.3
9
Not enough data
Security
7.9
12
Not enough data
8.9
11
Not enough data
8.3
10
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.2
23
Not enough data
Configuration
6.8
19
Not enough data
7.8
20
Not enough data
7.7
19
Not enough data
Feature Not Available
Not enough data
8.3
20
Not enough data
Visibility
8.6
23
Not enough data
7.9
20
Not enough data
Vulnerability Management
Feature Not Available
Not enough data
8.8
21
Not enough data
8.8
21
Not enough data
9.1
22
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
9.5
6
Asset Management
Not enough data
10.0
5
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring
Not enough data
Feature Not Available
Not enough data
9.0
5
Not enough data
Not enough data
Not enough data
10.0
6
Risk Management
Not enough data
9.3
5
Not enough data
9.3
5
Not enough data
Feature Not Available
Not enough data
Not enough data
Generative AI
Not enough data
Not enough data
Software Supply Chain Security ToolsHide 7 FeaturesShow 7 Features
8.3
15
Not enough data
Security
Feature Not Available
Not enough data
9.0
14
Not enough data
Feature Not Available
Not enough data
8.9
15
Not enough data
Tracking
7.9
12
Not enough data
7.3
11
Not enough data
8.5
13
Not enough data
Application Security Posture Management (ASPM)Hide 11 FeaturesShow 11 Features
8.4
20
Not enough data
Risk management - Application Security Posture Management (ASPM)
9.0
20
Not enough data
8.5
19
Not enough data
8.9
19
Not enough data
8.3
18
Not enough data
Integration and efficiency - Application Security Posture Management (ASPM)
9.1
18
Not enough data
8.9
18
Not enough data
Reporting and Analytics - Application Security Posture Management (ASPM)
8.3
19
Not enough data
8.5
19
Not enough data
7.7
19
Not enough data
Agentic AI - Application Security Posture Management (ASPM)
7.5
6
Not enough data
7.5
6
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Generative AI - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Monitoring and Integration - Exposure Management Platforms
Not enough data
Not enough data
Not enough data
Not enough data
AI AppSec AssistantsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Performance - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integration - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Reviews
Reviewers' Company Size
Aikido Security
Aikido Security
Small-Business(50 or fewer emp.)
76.5%
Mid-Market(51-1000 emp.)
21.6%
Enterprise(> 1000 emp.)
2.0%
Detectify
Detectify
Small-Business(50 or fewer emp.)
47.9%
Mid-Market(51-1000 emp.)
35.4%
Enterprise(> 1000 emp.)
16.7%
Reviewers' Industry
Aikido Security
Aikido Security
Computer Software
37.3%
Information Technology and Services
17.6%
Hospital & Health Care
6.9%
Computer & Network Security
5.9%
Retail
3.9%
Other
28.4%
Detectify
Detectify
Information Technology and Services
20.8%
Computer Software
14.6%
Computer & Network Security
6.3%
Retail
4.2%
Higher Education
4.2%
Other
50.0%
Alternatives
Aikido Security
Aikido Security Alternatives
Snyk
Snyk
Add Snyk
SonarQube
SonarQube
Add SonarQube
Wiz
Wiz
Add Wiz
GitLab
GitLab
Add GitLab
Detectify
Detectify Alternatives
Intruder
Intruder
Add Intruder
Acunetix by Invicti
Acunetix by Invicti
Add Acunetix by Invicti
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
Pentest-Tools.com
Pentest-Tools.com
Add Pentest-Tools.com
Discussions
Aikido Security
Aikido Security Discussions
Monty the Mongoose crying
Aikido Security has no discussions with answers
Detectify
Detectify Discussions
Do we have a solution to exclude or tag the findings that have been already reviewed?
1 Comment
Official Response from Detectify
Hi Francesco, Thanks for your question. In the deep scan results you can tag findings as "fixed". There you can also filter by the "new" tag. To be able...Read more
Monty the Mongoose crying
Detectify has no more discussions with answers