Introducing G2.ai, the future of software buying.Try now

Compare Perimeter and Scrut Automation

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
Perimeter
Perimeter
Star Rating
(43)4.8 out of 5
Market Segments
Enterprise (51.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Perimeter
Scrut Automation
Scrut Automation
Star Rating
(1,292)4.9 out of 5
Market Segments
Small-Business (50.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Scrut Automation
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that ProcessBolt excels in its Audit Management features, particularly with its Templates & Forms scoring 9.8, which allows for easy customization and efficiency in audit processes. In contrast, Scrut Automation also offers strong audit capabilities but users mention that its Checklists feature, while effective, does not provide the same level of customization.
  • Reviewers mention that ProcessBolt's Ease of Setup is rated at 8.9, which some users find slightly challenging compared to Scrut Automation's impressive score of 9.7. Users on G2 appreciate Scrut's straightforward onboarding process, making it more accessible for teams with limited technical expertise.
  • G2 users highlight that both products have strong Quality of Support, each scoring 9.8. However, users report that ProcessBolt's support team is particularly responsive and helpful during critical issues, while Scrut Automation's support is noted for its comprehensive documentation and resources.
  • Users say that ProcessBolt shines in Data Security with a score of 9.7, particularly praising its Data Loss Prevention features. In comparison, Scrut Automation also performs well but users mention that its security features could benefit from more robust anomaly detection capabilities.
  • Reviewers mention that Scrut Automation's Generative AI features, particularly in AI Text Summarization, are rated higher than ProcessBolt's, with scores of 7.9 versus 7.0. Users appreciate the efficiency it brings to content management, making it a standout feature for teams focused on documentation.
  • Users on G2 report that ProcessBolt's Asset Management capabilities, especially in Asset Discovery, are rated at 9.1, which is competitive but not as comprehensive as Scrut Automation's offerings. Users mention that Scrut's Shadow IT Detection feature is particularly effective in identifying unauthorized applications, enhancing overall security posture.
Pricing
Entry-Level Pricing
Perimeter
No pricing available
Scrut Automation
No pricing available
Free Trial
Perimeter
Free Trial is available
Scrut Automation
No trial information available
Ratings
Meets Requirements
9.6
27
9.6
1,189
Ease of Use
9.3
27
9.5
1,205
Ease of Setup
8.9
18
9.5
858
Ease of Admin
9.2
18
9.6
631
Quality of Support
9.8
27
9.7
1,184
Has the product been a good partner in doing business?
9.7
18
9.7
638
Product Direction (% positive)
10.0
22
9.9
1,208
Features by Category
Not enough data
9.5
531
Security
Not enough data
9.6
504
Not enough data
9.2
381
Not enough data
9.2
421
Not enough data
9.5
425
Compliance
Not enough data
9.5
416
Not enough data
9.4
378
Not enough data
9.6
378
Administration
Not enough data
9.5
397
Not enough data
9.5
401
Not enough data
9.4
368
Not enough data
8.2
162
Asset Inventory
Not enough data
9.2
143
Not enough data
9.2
134
Not enough data
9.2
136
Not enough data
8.9
120
Not enough data
9.0
132
Generative AI
Not enough data
7.1
68
Not enough data
7.4
60
Agentic AI - IT Asset Management
Not enough data
6.7
9
Not enough data
6.7
9
Not enough data
7.8
9
Not enough data
7.0
9
Not enough data
6.9
9
Not enough data
7.0
9
Not enough data
7.0
9
Management
Not enough data
9.4
121
Not enough data
9.4
114
Not enough data
9.4
121
Not enough data
9.3
123
Enterprise Risk Management (ERM)Hide 36 FeaturesShow 36 Features
Not enough data
9.0
48
Audit Management
Not enough data
9.3
45
Not enough data
9.5
43
Not enough data
9.5
44
Not enough data
9.6
43
Not enough data
9.5
42
Regulatory Change Management
Not enough data
9.1
37
Not enough data
9.3
35
Not enough data
9.0
35
Not enough data
9.0
36
Not enough data
9.3
39
Not enough data
8.6
37
Risk Management
Not enough data
9.4
37
Not enough data
9.5
38
Not enough data
9.2
35
Not enough data
9.2
33
Third Party & Supplier Risk Management
Not enough data
9.2
34
Not enough data
9.0
33
Not enough data
8.8
32
Not enough data
8.6
31
Business Continuity Management
Not enough data
9.1
33
Not enough data
9.2
31
Not enough data
9.1
31
Ethics and Compliance Learning
Not enough data
9.3
30
Not enough data
9.1
27
Not enough data
8.9
28
Not enough data
9.3
27
Generative AI
Not enough data
5.4
19
Not enough data
5.8
19
Platform
Not enough data
9.0
31
Not enough data
9.4
32
Not enough data
8.2
29
Not enough data
9.3
34
Services
Not enough data
9.3
32
Not enough data
9.1
32
Not enough data
9.5
30
Not enough data
9.0
29
Vendor Security and Privacy AssessmentHide 10 FeaturesShow 10 Features
8.3
13
8.6
195
Functionality
8.8
8
9.1
173
9.1
11
9.2
170
8.8
12
9.2
178
7.5
12
9.3
174
Risk assessment
9.0
12
9.3
176
7.3
8
8.7
144
7.9
11
9.2
167
Not enough data
7.6
28
Generative AI - Vendor Security and Privacy Assessment
Not enough data
6.9
22
Not enough data
6.9
22
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
9.3
195
Configuration
Not enough data
8.9
139
Not enough data
9.3
148
Not enough data
9.5
144
Not enough data
9.3
151
Not enough data
9.3
128
Visibility
Not enough data
9.2
152
Not enough data
9.3
126
Vulnerability Management
Not enough data
9.2
135
Not enough data
9.3
147
Not enough data
9.3
140
Not enough data
9.3
147
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
9.3
69
Asset Management
Not enough data
9.1
41
Not enough data
8.9
38
Not enough data
9.5
42
Monitoring
Not enough data
9.5
40
Not enough data
9.5
40
Not enough data
9.5
40
Not enough data
9.5
39
Risk Management
Not enough data
9.6
62
Not enough data
9.4
58
Not enough data
9.4
58
Not enough data
9.4
55
Generative AI
Not enough data
7.5
27
Third Party & Supplier Risk ManagementHide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Risk Assessment
9.0
5
Not enough data
Not enough data
Not enough data
Risk Control
Not enough data
Not enough data
Not enough data
Not enough data
7.7
5
Not enough data
Monitoring
Not enough data
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
Reporting
8.3
5
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Third Party & Supplier Risk Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.1
65
Generative AI
Not enough data
7.0
62
Monitoring - IT Risk Management
Not enough data
7.3
23
Agentic AI - IT Risk Management
Not enough data
6.9
16
Not enough data
7.4
16
Not enough data
8.9
216
Generative AI
Not enough data
7.6
174
Not enough data
7.4
166
Workflows - Audit Management
Not enough data
9.1
132
Not enough data
9.0
127
Not enough data
9.0
120
Not enough data
9.0
127
Not enough data
8.9
122
Documentation - Audit Management
Not enough data
9.3
135
Not enough data
9.3
130
Reporting & Analytics - Audit Management
Not enough data
9.4
132
Not enough data
9.4
131
Not enough data
9.4
133
Not enough data
7.4
90
Generative AI
Not enough data
6.8
87
Not enough data
6.8
85
Platform AI Features - Policy Management
Not enough data
7.7
37
Not enough data
8.2
38
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.9
91
Generative AI - Security Compliance
Not enough data
7.9
87
Not enough data
7.9
87
Categories
Categories
Shared Categories
Perimeter
Perimeter
Scrut Automation
Scrut Automation
Perimeter and Scrut Automation are categorized as Vendor Security and Privacy Assessment
Reviews
Reviewers' Company Size
Perimeter
Perimeter
Small-Business(50 or fewer emp.)
14.6%
Mid-Market(51-1000 emp.)
34.1%
Enterprise(> 1000 emp.)
51.2%
Scrut Automation
Scrut Automation
Small-Business(50 or fewer emp.)
50.2%
Mid-Market(51-1000 emp.)
47.6%
Enterprise(> 1000 emp.)
2.2%
Reviewers' Industry
Perimeter
Perimeter
Hospital & Health Care
22.0%
Information Technology and Services
12.2%
Computer Software
7.3%
Retail
4.9%
Management Consulting
4.9%
Other
48.8%
Scrut Automation
Scrut Automation
Computer Software
38.3%
Information Technology and Services
23.1%
Financial Services
11.7%
Hospital & Health Care
2.5%
Insurance
2.1%
Other
22.4%
Alternatives
Perimeter
Perimeter Alternatives
Loopio
Loopio
Add Loopio
Secureframe
Secureframe
Add Secureframe
Responsive, formerly RFPIO
Responsive, formerly RFPIO
Add Responsive, formerly RFPIO
Vanta
Vanta
Add Vanta
Scrut Automation
Scrut Automation Alternatives
Sprinto
Sprinto
Add Sprinto
Vanta
Vanta
Add Vanta
Secureframe
Secureframe
Add Secureframe
Drata
Drata
Add Drata
Discussions
Perimeter
Perimeter Discussions
What is ProcessBolt used for?
1 Comment
Official Response from Perimeter
ProcessBolt is used to assess and continuously monitor your third party vendors, easily, inexpensively, and comprehensively.Read more
Monty the Mongoose crying
Perimeter has no more discussions with answers
Scrut Automation
Scrut Automation Discussions
Monty the Mongoose crying
Scrut Automation has no discussions with answers