Compare Wiz and Zenmap

At a Glance
Wiz
Wiz
Star Rating
(772)4.7 out of 5
Market Segments
Enterprise (54.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Wiz
Zenmap
Zenmap
Star Rating
(28)4.5 out of 5
Market Segments
Mid-Market (44.0% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Learn more about Zenmap
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Wiz significantly outperforms Zenmap in overall user satisfaction, with a G2 Score of 97.36 compared to Zenmap's 32.74. This indicates that users find Wiz to be a more reliable and effective solution for their needs.
  • Users say that Zenmap is particularly beneficial for penetration testers and ethical hackers, highlighting its intuitive graphical interface that exposes all command-line functionality. This makes it easy to use across various platforms, including Windows, Linux, and macOS.
  • Reviewers mention that Wiz excels in providing exceptional visibility across cloud environments, allowing users to quickly identify misconfigurations and vulnerabilities. Its agentless architecture is praised for enabling rapid deployment without the need for extensive setup.
  • According to verified reviews, Zenmap users appreciate its ease of implementation and the wealth of information it provides through various plugins. However, the lack of recent reviews suggests that it may not be keeping pace with evolving user needs compared to Wiz.
  • G2 reviewers highlight that Wiz offers comprehensive, actionable insights, making it easier for organizations to manage vulnerabilities and compliance gaps. This capability is particularly valuable for enterprises looking to streamline their security processes.
  • Users note that while Zenmap has a solid reputation for its functionality, it struggles with support quality, receiving lower ratings in this area compared to Wiz, which boasts a higher quality of support and user satisfaction overall.
Pricing
Entry-Level Pricing
Wiz
No pricing available
Zenmap
No pricing available
Free Trial
Wiz
Free Trial is available
Zenmap
No trial information available
Ratings
Meets Requirements
9.1
638
9.1
23
Ease of Use
8.8
642
8.8
23
Ease of Setup
9.1
502
8.9
11
Ease of Admin
9.0
487
8.7
10
Quality of Support
9.2
608
8.1
14
Has the product been a good partner in doing business?
9.4
476
7.9
7
Product Direction (% positive)
9.8
597
9.5
23
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.8
128
Not enough data
Management
8.7
119
Not enough data
8.4
107
Not enough data
9.3
120
Not enough data
Operations
8.9
107
Not enough data
8.6
110
Not enough data
9.0
112
Not enough data
Security Controls
8.6
76
Not enough data
Feature Not Available
Not enough data
9.1
107
Not enough data
Feature Not Available
Not enough data
8.4
209
Not enough data
Administration
9.0
194
Not enough data
8.2
183
Not enough data
9.1
198
Not enough data
8.9
191
Not enough data
Monitoring
8.4
169
Not enough data
7.9
162
Not enough data
8.6
180
Not enough data
Protection
8.5
174
Not enough data
8.0
169
Not enough data
Feature Not Available
Not enough data
7.7
163
Not enough data
8.6
292
Not enough data
Security
9.0
275
Not enough data
8.3
224
Not enough data
Feature Not Available
Not enough data
8.9
250
Not enough data
Compliance
8.7
245
Not enough data
8.4
231
Not enough data
8.3
230
Not enough data
Administration
8.5
259
Not enough data
8.6
233
Not enough data
8.3
248
Not enough data
8.2
299
8.1
19
Performance
8.4
281
7.3
13
8.8
276
8.8
16
|
Verified
7.4
275
6.9
15
|
Verified
9.0
280
8.3
12
Network
8.6
258
8.6
14
8.5
254
9.0
16
8.8
274
7.3
13
Application
Feature Not Available
8.3
14
|
Verified
Feature Not Available
8.7
9
|
Verified
Feature Not Available
Feature Not Available
Agentic AI - Vulnerability Scanner
7.4
29
Not enough data
7.3
30
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
9.1
67
Not enough data
Functionality - Software Composition Analysis
8.8
54
Not enough data
9.3
60
Not enough data
9.2
56
Not enough data
Effectiveness - Software Composition Analysis
8.7
59
Not enough data
9.2
58
Not enough data
9.2
60
Not enough data
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
8.2
249
Not enough data
Activity Monitoring
Feature Not Available
Not enough data
Feature Not Available
Not enough data
7.5
183
Not enough data
8.0
196
Not enough data
Security
8.6
204
Not enough data
8.9
216
Not enough data
8.4
221
Not enough data
Administration
8.4
201
Not enough data
8.7
213
Not enough data
9.1
213
Not enough data
Agentic AI - Cloud Security Monitoring and Analytics
7.5
20
Not enough data
7.4
21
Not enough data
7.5
19
Not enough data
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
8.9
33
Not enough data
Detection & Response
9.1
27
Not enough data
9.2
26
Not enough data
9.6
26
Not enough data
8.5
28
Not enough data
Management
8.6
26
Not enough data
8.9
25
Not enough data
9.2
23
Not enough data
Analytics
8.8
27
Not enough data
8.2
26
Not enough data
8.8
27
Not enough data
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.8
326
Not enough data
Configuration
Feature Not Available
Not enough data
8.9
278
Not enough data
8.4
251
Not enough data
8.1
248
Not enough data
8.5
269
Not enough data
Visibility
9.3
290
Not enough data
9.2
287
Not enough data
Vulnerability Management
8.4
268
Not enough data
9.2
297
Not enough data
9.0
278
Not enough data
9.1
294
Not enough data
Attack Surface ManagementHide 12 FeaturesShow 12 Features
8.6
222
Not enough data
Asset Management
9.3
193
Not enough data
8.0
167
Not enough data
7.6
163
Not enough data
Monitoring
8.6
176
Not enough data
9.0
191
Not enough data
8.8
179
Not enough data
9.0
188
Not enough data
Risk Management
9.2
207
Not enough data
8.6
195
Not enough data
8.7
192
Not enough data
8.5
196
Not enough data
Generative AI
8.0
101
Not enough data
8.6
135
Not enough data
Alerts management
8.8
109
Not enough data
8.5
110
Not enough data
9.0
119
Not enough data
Monitoring
8.4
104
Not enough data
8.5
115
Not enough data
8.4
101
Not enough data
7.8
104
Not enough data
Automation
8.2
109
Not enough data
8.6
112
Not enough data
Analysis
8.7
126
Not enough data
8.5
123
Not enough data
9.3
126
Not enough data
8.5
114
Not enough data
Issue Resolution
8.6
117
Not enough data
8.9
122
Not enough data
9.0
114
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
8.2
51
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
8.1
44
Not enough data
8.7
45
Not enough data
8.5
45
Not enough data
6.8
43
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
8.4
47
Not enough data
7.2
46
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
9.0
50
Not enough data
8.9
49
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
9.0
27
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
9.5
20
Not enough data
9.3
20
Not enough data
8.9
20
Not enough data
9.6
23
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
8.9
19
Not enough data
9.2
22
Not enough data
9.0
18
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
9.4
21
Not enough data
9.5
20
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
7.9
18
Not enough data
8.1
17
Not enough data
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
7.6
15
Not enough data
Generative AI - Exposure Management Platforms
6.2
14
Not enough data
5.9
13
Not enough data
Risk Identification and Assessment - Exposure Management Platforms
8.3
13
Not enough data
8.3
13
Not enough data
Monitoring and Integration - Exposure Management Platforms
8.3
13
Not enough data
8.6
14
Not enough data
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
8.6
13
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
8.7
9
Not enough data
8.3
8
Not enough data
8.1
7
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
8.7
9
Not enough data
9.0
8
Not enough data
8.8
8
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
8.5
10
Not enough data
8.5
9
Not enough data
8.5
8
Not enough data
Not enough data
Not enough data
Model Protection - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Runtime Monitoring - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Policy Enforcement and Compliance - AI Security Solutions
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
7.2
12
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
6.7
11
Not enough data
7.0
11
Not enough data
7.0
11
Not enough data
Services - Cloud Detection and Response (CDR)
8.2
12
Not enough data
Reviews
Reviewers' Company Size
Wiz
Wiz
Small-Business(50 or fewer emp.)
6.3%
Mid-Market(51-1000 emp.)
39.1%
Enterprise(> 1000 emp.)
54.5%
Zenmap
Zenmap
Small-Business(50 or fewer emp.)
36.0%
Mid-Market(51-1000 emp.)
44.0%
Enterprise(> 1000 emp.)
20.0%
Reviewers' Industry
Wiz
Wiz
Financial Services
18.3%
Information Technology and Services
12.0%
Computer Software
11.2%
Hospital & Health Care
4.1%
Computer & Network Security
4.0%
Other
50.4%
Zenmap
Zenmap
Information Technology and Services
38.5%
Computer Networking
11.5%
Computer & Network Security
11.5%
Marketing and Advertising
7.7%
Education Management
7.7%
Other
23.1%
Alternatives
Wiz
Wiz Alternatives
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
CrowdStrike Falcon Cloud Security
CrowdStrike Falcon Cloud...
Add CrowdStrike Falcon Cloud Security
Orca Security
Orca Security
Add Orca Security
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Zenmap
Zenmap Alternatives
Tenable Nessus
Tenable Nessus
Add Tenable Nessus
OpenVAS
OpenVAS
Add OpenVAS
Red Hat Ansible Automation Platform
Red Hat Ansible Automation...
Add Red Hat Ansible Automation Platform
Burp Suite
Burp Suite
Add Burp Suite
Discussions
Wiz
Wiz Discussions
Monty the Mongoose crying
Wiz has no discussions with answers
Zenmap
Zenmap Discussions
Can we find out Web application vulnearabilities at code level using Zenmap? if so How?
1 Comment
Miguel Angel A.
MA
Zenmap is not a Web app vulnerability scanner. With Zenmap you can do network level vulnerability scanning on your web server (check for open ports and...Read more
Is Zenmap tool used for ethical hacking ?,
1 Comment
Luis C.
LC
It can be used for ethical hacking, remember it helps you to identify devices and find vulnerabilities within the networkRead more
Monty the Mongoose crying
Zenmap has no more discussions with answers