Compare Perimeter and Scrut Automation

Save your comparisonKeep these tools in one place and come back anytime.
Save to board
At a Glance
Perimeter
Perimeter
Star Rating
(45)4.8 out of 5
Market Segments
Enterprise (51.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Perimeter
Scrut Automation
Scrut Automation
Star Rating
(1,300)4.9 out of 5
Market Segments
Small-Business (50.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Scrut Automation
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Scrut Automation excels in user satisfaction, reflected in its higher overall G2 Score compared to Perimeter. Users appreciate its comprehensive coverage of certifications like ISO and SOC 2, which simplifies compliance efforts.
  • According to verified reviews, Perimeter is praised for its ease of use and intuitive interface, with users highlighting the platform's centralized risk intelligence that consolidates assessments and historical data, making vendor risk management straightforward.
  • Users say that Scrut Automation's implementation process is notably smooth, with many finding it easy to connect their organization’s systems. This ease of setup is a significant advantage for teams needing quick compliance solutions.
  • Reviewers mention that while both platforms offer strong support, Perimeter stands out with its high quality of support ratings. Users have noted that the platform's automation tools simplify vendor risk management, enhancing the overall user experience.
  • G2 reviewers highlight that Scrut Automation is particularly beneficial for small businesses, as it caters to their specific needs with tailored features and support, making it a go-to choice for organizations in sectors where compliance is critical.
  • According to recent user feedback, Perimeter's strengths lie in its visual tools and centralized data management, which help users track vendor posture effectively. However, it faces challenges in market presence compared to Scrut Automation, which has a significantly larger user base and review count.
Pricing
Entry-Level Pricing
Perimeter
No pricing available
Scrut Automation
No pricing available
Free Trial
Perimeter
Free Trial is available
Scrut Automation
No trial information available
Ratings
Meets Requirements
9.6
29
9.6
1,196
Ease of Use
9.3
29
9.5
1,213
Ease of Setup
8.9
20
9.5
866
Ease of Admin
9.2
19
9.6
635
Quality of Support
9.8
29
9.7
1,190
Has the product been a good partner in doing business?
9.7
19
9.7
642
Product Direction (% positive)
10.0
24
9.9
1,216
Features by Category
Not enough data
9.5
534
Security
Not enough data
9.6
507
Not enough data
9.2
383
Not enough data
9.2
422
Not enough data
9.5
426
Compliance
Not enough data
9.5
418
Not enough data
9.4
379
Not enough data
9.6
379
Administration
Not enough data
9.5
398
Not enough data
9.5
402
Not enough data
9.3
371
Not enough data
8.2
162
Asset Inventory
Not enough data
9.2
143
Not enough data
9.2
134
Not enough data
9.2
136
Not enough data
8.9
120
Not enough data
9.0
132
Generative AI
Not enough data
7.1
68
Not enough data
7.4
60
Agentic AI - IT Asset Management
Not enough data
6.7
9
Not enough data
6.7
9
Not enough data
7.8
9
Not enough data
7.0
9
Not enough data
6.9
9
Not enough data
7.0
9
Not enough data
7.0
9
Management
Not enough data
9.4
121
Not enough data
9.4
114
Not enough data
9.4
121
Not enough data
9.3
123
Vendor Security and Privacy AssessmentHide 10 FeaturesShow 10 Features
8.3
15
8.5
196
Functionality
8.8
8
9.1
175
9.2
13
9.2
171
8.6
13
9.2
180
7.5
12
9.3
176
Risk assessment
9.1
13
9.2
178
7.3
8
8.7
145
7.9
11
9.2
168
Not enough data
7.6
28
Generative AI - Vendor Security and Privacy Assessment
Not enough data
6.9
22
Not enough data
6.9
22
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
Not enough data
9.3
196
Configuration
Not enough data
8.9
139
Not enough data
9.3
149
Not enough data
9.5
145
Not enough data
9.3
152
Not enough data
9.3
129
Visibility
Not enough data
9.2
153
Not enough data
9.3
127
Vulnerability Management
Not enough data
9.2
136
Not enough data
9.3
148
Not enough data
9.3
141
Not enough data
9.3
148
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
9.3
69
Asset Management
Not enough data
9.1
41
Not enough data
8.9
38
Not enough data
9.5
42
Monitoring
Not enough data
9.5
40
Not enough data
9.5
40
Not enough data
9.5
40
Not enough data
9.5
39
Risk Management
Not enough data
9.6
62
Not enough data
9.4
58
Not enough data
9.4
58
Not enough data
9.4
55
Generative AI
Not enough data
7.5
27
Third Party & Supplier Risk ManagementHide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Risk Assessment
9.0
5
Not enough data
Not enough data
Not enough data
Risk Control
Not enough data
Not enough data
Not enough data
Not enough data
7.7
5
Not enough data
Monitoring
Not enough data
Not enough data
7.7
5
Not enough data
Not enough data
Not enough data
Reporting
7.8
6
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Third Party & Supplier Risk Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.1
65
Generative AI
Not enough data
7.0
62
Monitoring - IT Risk Management
Not enough data
7.3
23
Agentic AI - IT Risk Management
Not enough data
6.9
16
Not enough data
7.4
16
Not enough data
8.9
217
Generative AI
Not enough data
7.6
174
Not enough data
7.4
166
Workflows - Audit Management
Not enough data
9.1
132
Not enough data
9.0
127
Not enough data
9.0
121
Not enough data
9.0
128
Not enough data
8.9
122
Documentation - Audit Management
Not enough data
9.3
135
Not enough data
9.3
130
Reporting & Analytics - Audit Management
Not enough data
9.4
132
Not enough data
9.4
131
Not enough data
9.4
133
Not enough data
7.4
90
Generative AI
Not enough data
6.8
87
Not enough data
6.8
85
Platform AI Features - Policy Management
Not enough data
7.7
37
Not enough data
8.2
38
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
7.9
95
Generative AI - Security Compliance
Not enough data
7.9
88
Not enough data
7.9
90
Categories
Categories
Shared Categories
Perimeter
Perimeter
Scrut Automation
Scrut Automation
Perimeter and Scrut Automation are categorized as Vendor Security and Privacy Assessment
Reviews
Reviewers' Company Size
Perimeter
Perimeter
Small-Business(50 or fewer emp.)
14.0%
Mid-Market(51-1000 emp.)
34.9%
Enterprise(> 1000 emp.)
51.2%
Scrut Automation
Scrut Automation
Small-Business(50 or fewer emp.)
50.2%
Mid-Market(51-1000 emp.)
47.7%
Enterprise(> 1000 emp.)
2.2%
Reviewers' Industry
Perimeter
Perimeter
Hospital & Health Care
23.3%
Information Technology and Services
11.6%
Computer Software
7.0%
Retail
4.7%
Management Consulting
4.7%
Other
48.8%
Scrut Automation
Scrut Automation
Computer Software
38.3%
Information Technology and Services
23.0%
Financial Services
11.6%
Hospital & Health Care
2.5%
Insurance
2.2%
Other
22.5%
Alternatives
Perimeter
Perimeter Alternatives
Secureframe
Secureframe
Add Secureframe
Loopio
Loopio
Add Loopio
Responsive, formerly RFPIO
Responsive, formerly RFPIO
Add Responsive, formerly RFPIO
Vanta
Vanta
Add Vanta
Scrut Automation
Scrut Automation Alternatives
Vanta
Vanta
Add Vanta
Sprinto
Sprinto
Add Sprinto
Secureframe
Secureframe
Add Secureframe
Drata
Drata
Add Drata
Discussions
Perimeter
Perimeter Discussions
What is ProcessBolt used for?
1 Comment
Official Response from Perimeter
ProcessBolt is used to assess and continuously monitor your third party vendors, easily, inexpensively, and comprehensively.Read more
Monty the Mongoose crying
Perimeter has no more discussions with answers
Scrut Automation
Scrut Automation Discussions
Monty the Mongoose crying
Scrut Automation has no discussions with answers