Compare Aikido Security and Scrut Automation

At a Glance
Aikido Security
Aikido Security
Star Rating
(140)4.6 out of 5
Market Segments
Small-Business (79.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Free
Free Trial is available
Browse all 12 pricing plans
Scrut Automation
Scrut Automation
Star Rating
(1,299)4.9 out of 5
Market Segments
Small-Business (50.1% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Scrut Automation
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Scrut Automation excels in streamlining compliance tasks, with users highlighting its AI tool that automatically fills out cybersecurity questionnaires, saving significant time and effort for teams.
  • Users say Aikido Security offers great value, especially in its free tier, providing meaningful features that integrate well into daily engineering workflows, which is a standout for teams looking for cost-effective solutions.
  • Reviewers mention that Scrut Automation has a higher overall satisfaction rating, with many praising its ability to help monitor compliance adherence and security training, making it a reliable partner for businesses focused on security.
  • According to verified reviews, Aikido Security is noted for its ease of setup, allowing users to quickly add projects and gain insights into codebase issues, which is particularly beneficial for teams needing rapid deployment.
  • G2 reviewers highlight that Scrut Automation's quality of support is notably high, with users appreciating the responsive assistance they receive, which enhances their overall experience with the product.
  • Users report that while Aikido Security provides a user-friendly dashboard for managing issues, it may not match the comprehensive monitoring capabilities of Scrut Automation, which offers advanced features like configuration monitoring and vulnerability scanning.
Pricing
Entry-Level Pricing
Aikido Security
Free (forever)
Free
Browse all 12 pricing plans
Scrut Automation
No pricing available
Free Trial
Aikido Security
Free Trial is available
Scrut Automation
No trial information available
Ratings
Meets Requirements
8.9
124
9.6
1,195
Ease of Use
9.4
125
9.5
1,212
Ease of Setup
9.5
117
9.5
865
Ease of Admin
9.4
71
9.6
634
Quality of Support
9.4
99
9.7
1,189
Has the product been a good partner in doing business?
9.4
65
9.7
641
Product Direction (% positive)
9.4
123
9.9
1,215
Features by Category
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Testing
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Static Application Security Testing (SAST)Hide 14 FeaturesShow 14 Features
8.3
78
Not enough data
Administration
8.6
64
Not enough data
Feature Not Available
Not enough data
Analysis
8.8
62
Not enough data
9.0
57
Not enough data
9.1
64
Not enough data
8.9
63
Not enough data
Testing
7.3
42
Not enough data
7.0
42
Not enough data
8.1
43
Not enough data
8.5
47
Not enough data
8.2
43
Not enough data
Feature Not Available
Not enough data
8.0
52
Not enough data
Agentic AI - Static Application Security Testing (SAST)
8.3
27
Not enough data
Dynamic Application Security Testing (DAST)Hide 13 FeaturesShow 13 Features
8.5
24
Not enough data
Administration
Not enough data
Not enough data
Feature Not Available
Not enough data
Analysis
9.2
22
Not enough data
9.2
22
Not enough data
9.4
22
Not enough data
9.4
23
Not enough data
9.5
21
Not enough data
Testing
6.9
18
Not enough data
Feature Not Available
Not enough data
8.6
19
Not enough data
8.1
19
Not enough data
Feature Not Available
Not enough data
6.7
19
Not enough data
8.5
37
Not enough data
Administration
8.8
36
Not enough data
8.1
34
Not enough data
9.0
34
Not enough data
8.3
32
Not enough data
Monitoring
8.6
35
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Protection
Feature Not Available
Not enough data
8.4
33
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
9.5
533
Security
Not enough data
9.6
506
Not enough data
9.2
382
Not enough data
9.2
422
Not enough data
9.5
425
Compliance
Not enough data
9.5
417
Not enough data
9.4
378
Not enough data
9.6
378
Administration
Not enough data
9.5
397
Not enough data
9.5
401
Not enough data
9.3
370
8.1
66
Not enough data
Performance
8.8
62
Not enough data
Feature Not Available
Not enough data
7.8
59
Not enough data
8.9
61
Not enough data
Network
8.0
58
Not enough data
8.0
55
Not enough data
8.1
56
Not enough data
Application
7.2
52
Not enough data
8.9
57
Not enough data
8.0
50
Not enough data
Agentic AI - Vulnerability Scanner
7.7
23
Not enough data
7.6
24
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
9.0
23
Not enough data
Functionality - Software Composition Analysis
9.0
21
Not enough data
9.0
21
Not enough data
9.0
21
Not enough data
Effectiveness - Software Composition Analysis
8.8
22
Not enough data
9.0
21
Not enough data
9.1
21
Not enough data
Not enough data
8.2
162
Asset Inventory
Not enough data
9.2
143
Not enough data
9.2
134
Not enough data
9.2
136
Not enough data
8.9
120
Not enough data
9.0
132
Generative AI
Not enough data
7.1
68
Not enough data
7.4
60
Agentic AI - IT Asset Management
Not enough data
6.7
9
Not enough data
6.7
9
Not enough data
7.8
9
Not enough data
7.0
9
Not enough data
6.9
9
Not enough data
7.0
9
Not enough data
7.0
9
Management
Not enough data
9.4
121
Not enough data
9.4
114
Not enough data
9.4
121
Not enough data
9.3
123
Vendor Security and Privacy AssessmentHide 10 FeaturesShow 10 Features
Not enough data
8.5
195
Functionality
Not enough data
9.1
174
Not enough data
9.2
171
Not enough data
9.2
179
Not enough data
9.3
175
Risk assessment
Not enough data
9.2
177
Not enough data
8.7
144
Not enough data
9.2
167
Not enough data
7.6
28
Generative AI - Vendor Security and Privacy Assessment
Not enough data
6.9
22
Not enough data
6.9
22
8.9
15
Not enough data
Documentation
9.7
10
Not enough data
9.7
11
Not enough data
8.5
10
Not enough data
Security
8.2
14
Not enough data
8.9
11
Not enough data
8.5
11
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.4
23
9.3
195
Configuration
Feature Not Available
8.9
139
7.8
20
9.3
148
7.7
19
9.5
144
Feature Not Available
9.3
151
8.3
20
9.3
128
Visibility
8.6
23
9.2
152
7.9
20
9.3
126
Vulnerability Management
Feature Not Available
9.2
135
8.8
21
9.3
147
8.8
21
9.3
140
9.1
22
9.3
147
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
9.3
69
Asset Management
Not enough data
9.1
41
Not enough data
8.9
38
Not enough data
9.5
42
Monitoring
Not enough data
9.5
40
Not enough data
9.5
40
Not enough data
9.5
40
Not enough data
9.5
39
Risk Management
Not enough data
9.6
62
Not enough data
9.4
58
Not enough data
9.4
58
Not enough data
9.4
55
Generative AI
Not enough data
7.5
27
Software Supply Chain Security ToolsHide 7 FeaturesShow 7 Features
8.3
15
Not enough data
Security
Feature Not Available
Not enough data
9.0
14
Not enough data
Feature Not Available
Not enough data
8.9
15
Not enough data
Tracking
7.9
12
Not enough data
7.3
11
Not enough data
8.5
13
Not enough data
Not enough data
7.1
65
Generative AI
Not enough data
7.0
62
Monitoring - IT Risk Management
Not enough data
7.3
23
Agentic AI - IT Risk Management
Not enough data
6.9
16
Not enough data
7.4
16
Not enough data
8.9
217
Generative AI
Not enough data
7.6
174
Not enough data
7.4
166
Workflows - Audit Management
Not enough data
9.1
132
Not enough data
9.0
127
Not enough data
9.0
121
Not enough data
9.0
128
Not enough data
8.9
122
Documentation - Audit Management
Not enough data
9.3
135
Not enough data
9.3
130
Reporting & Analytics - Audit Management
Not enough data
9.4
132
Not enough data
9.4
131
Not enough data
9.4
133
Not enough data
7.4
90
Generative AI
Not enough data
6.8
87
Not enough data
6.8
85
Platform AI Features - Policy Management
Not enough data
7.7
37
Not enough data
8.2
38
Application Security Posture Management (ASPM)Hide 11 FeaturesShow 11 Features
8.4
21
Not enough data
Risk management - Application Security Posture Management (ASPM)
9.0
21
Not enough data
8.5
19
Not enough data
8.9
19
Not enough data
8.4
19
Not enough data
Integration and efficiency - Application Security Posture Management (ASPM)
9.1
19
Not enough data
8.9
18
Not enough data
Reporting and Analytics - Application Security Posture Management (ASPM)
8.3
19
Not enough data
8.5
19
Not enough data
7.7
19
Not enough data
Agentic AI - Application Security Posture Management (ASPM)
7.5
6
Not enough data
7.5
6
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
AI AppSec AssistantsHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Performance - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integration - AI AppSec Assistants
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.9
95
Generative AI - Security Compliance
Not enough data
7.9
88
Not enough data
7.9
90
Reviews
Reviewers' Company Size
Aikido Security
Aikido Security
Small-Business(50 or fewer emp.)
79.2%
Mid-Market(51-1000 emp.)
19.2%
Enterprise(> 1000 emp.)
1.6%
Scrut Automation
Scrut Automation
Small-Business(50 or fewer emp.)
50.1%
Mid-Market(51-1000 emp.)
47.7%
Enterprise(> 1000 emp.)
2.2%
Reviewers' Industry
Aikido Security
Aikido Security
Computer Software
37.6%
Information Technology and Services
16.0%
Computer & Network Security
7.2%
Hospital & Health Care
5.6%
Financial Services
4.0%
Other
29.6%
Scrut Automation
Scrut Automation
Computer Software
38.3%
Information Technology and Services
23.0%
Financial Services
11.6%
Hospital & Health Care
2.5%
Insurance
2.2%
Other
22.5%
Alternatives
Aikido Security
Aikido Security Alternatives
Snyk
Snyk
Add Snyk
SonarQube
SonarQube
Add SonarQube
GitLab
GitLab
Add GitLab
Wiz
Wiz
Add Wiz
Scrut Automation
Scrut Automation Alternatives
Vanta
Vanta
Add Vanta
Sprinto
Sprinto
Add Sprinto
Secureframe
Secureframe
Add Secureframe
Drata
Drata
Add Drata
Discussions
Aikido Security
Aikido Security Discussions
Monty the Mongoose crying
Aikido Security has no discussions with answers
Scrut Automation
Scrut Automation Discussions
Monty the Mongoose crying
Scrut Automation has no discussions with answers