# Best Dark Web Monitoring Tools

  *By [Lauren Worth](https://research.g2.com/insights/author/lauren-worth)*

   Dark Web Monitoring tools are used to identify mentions of their organization on deep web and dark web forums and marketplaces, particularly any mentions which include compromised business data being illegally shared or sold. Deep web references areas on the internet that are non-indexed pages; dark web refers to non-indexed, illicit sites and private communications which are only accessible via Tor and I2P. This software uses automated scanners, web crawlers, and scraping techniques to continually monitor and analyze in real time any leaked sensitive business information, such as customer lists or data, employee login credentials, trade secrets, proprietary technology, and other valuable datasets made available on illicit markets. Businesses use dark web monitoring to reduce business risk, detect data breaches early, and to protect their intellectual property and brand reputation. Most commonly, dark web monitoring software is deployed and managed by a company&#39;s IT team or security team. Many of these tools have integrations with ticketing systems to assist with distributing real-time alerts to the right parties for remediation.

There is some overlap between dark web monitoring solutions and [employee identity theft protection software](https://www.g2.com/categories/employee-identity-theft-protection) and [threat intelligence software](https://www.g2.com/categories/threat-intelligence). Employee identity theft protection software may monitor an individual employee&#39;s data on the dark web in addition to the surface web, but these tools are geared toward assisting an individual in the company, not a company&#39;s overall assets and brand. Threat intelligence software may also utilize some dark web monitoring functions, but has additional robust features to also identify novel cyber threats like new malware or active zero-day vulnerability exploits.

To qualify for inclusion in the Dark Web Monitoring tools category, a product must:

- Provide automated monitoring of dark web forums and marketplaces for mentions of company name, employee data, customer data, and other selected keywords
- Provide tools to analyze threats, including providing historical threat data, threat location data, threat actors names, relationships, URLs, and other relevant information to conduct further investigations
- Provide real-time alerts when compromised company or other selected information is detected on the dark web





## Category Overview

**Total Products under this Category:** 89


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 8,200+ Authentic Reviews
- 89+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.


## Best Dark Web Monitoring Tools At A Glance

- **Leader:** [CloudSEK](https://www.g2.com/products/cloudsek/reviews)
- **Highest Performer:** [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews)
- **Easiest to Use:** [CloudSEK](https://www.g2.com/products/cloudsek/reviews)
- **Top Trending:** [Guardz](https://www.g2.com/products/guardz/reviews)
- **Best Free Software:** [LastPass](https://www.g2.com/products/lastpass/reviews)


---

**Sponsored**

### Whiteintel Dark Web Intelligence

Whiteintel.io is a dark web monitoring and threat intelligence platform. It scans underground forums, marketplaces, paste sites, and data breach sources to identify exposed credentials and sensitive data linked to an organization&#39;s domains, employees, or customers. The platform detects compromised credentials from data breaches and info stealer malware infections. When devices are infected with info stealers, Whiteintel.io identifies harvested credentials before they can be used for unauthorized access. Users receive alerts when their organization&#39;s data appears in dark web sources or known breach datasets. Whiteintel.io aggregates findings into a centralized dashboard where security teams can search, filter, and investigate exposures. The platform supports domain monitoring, email-based credential lookups, and threat actor activity tracking.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2488&amp;secure%5Bdisplayable_resource_id%5D=2488&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2488&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1795498&amp;secure%5Bresource_id%5D=2488&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Fdark-web-monitoring&amp;secure%5Btoken%5D=8c036751867e1f101c507ee338aca4d43971e873eb9ff7f18ece63d171b6f58a&amp;secure%5Burl%5D=https%3A%2F%2Fwhiteintel.io&amp;secure%5Burl_type%5D=custom_url)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [CloudSEK](https://www.g2.com/products/cloudsek/reviews)
  CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give context to our customers’ digital risks.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 130

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Analysis:** 9.5/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 6.1/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.8/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [CloudSEK](https://www.g2.com/sellers/cloudsek)
- **Year Founded:** 2015
- **HQ Location:** Singapore, SG
- **Twitter:** @cloudsek (2,413 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cloudsek/ (231 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Analyst
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 53% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (52 reviews)
- Monitoring (46 reviews)
- Customer Support (43 reviews)
- Features (42 reviews)
- Threat Detection (33 reviews)

**Cons:**

- False Positives (35 reviews)
- Inefficient Alerts (21 reviews)
- Dashboard Issues (15 reviews)
- Inefficient Alert System (15 reviews)
- Complex UI (8 reviews)

### 2. [SOCRadar Extended Threat Intelligence](https://www.g2.com/products/socradar-extended-threat-intelligence/reviews)
  Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar empowers security teams with our groundbreaking Extended Threat Intelligence (XTI) platform and is leading the charge toward the future with Agentic Threat Intelligence (ATI). What does SOCRadar do? At its core, SOCRadar provides a unified, cloud-hosted platform designed to enrich your cyber threat intelligence by contextualizing it with data from your attack surface, digital footprint, dark web exposure, and supply chain. We help security teams see what attackers see by combining External Attack Surface Management, Cyber Threat Intelligence, and Digital Risk Protection into a single, easy-to-use solution. This enables your organization to discover hidden vulnerabilities, detect data leaks, and shut down threats like phishing and brand impersonation before they can harm your business. By combining these critical security functions, SOCRadar replaces the need for separate, disconnected tools. Our holistic approach offers a streamlined, modular experience, providing a complete, real-time view of your threat landscape to help you stay ahead of attackers. Our vision for Agentic Threat Intelligence (ATI) goes beyond today&#39;s chatbots and LLMs. We are focused on making it practical for security teams to use AI agents to solve real-world problems. Our initiative will empower you to either deploy pre-built agents or easily create your own, leveraging deep integrations to automate complex tasks that were previously difficult to perform accurately. SOCRadar is dedicated to pioneering this change, making autonomous security an accessible reality for your team.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 100

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Analysis:** 8.9/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 4.3/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.4/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [SOCRadar ](https://www.g2.com/sellers/socradar)
- **Company Website:** https://socradar.io
- **Year Founded:** 2018
- **HQ Location:** Delaware
- **Twitter:** @socradar (5,712 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/socradar (195 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Computer &amp; Network Security
  - **Company Size:** 42% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (27 reviews)
- Threat Intelligence (25 reviews)
- Alerts (20 reviews)
- Insights (19 reviews)
- Monitoring (19 reviews)

**Cons:**

- Inefficient Alerts (10 reviews)
- Inefficient Alert System (10 reviews)
- False Positives (8 reviews)
- Insufficient Information (7 reviews)
- Limited Features (7 reviews)

### 3. [Recorded Future](https://www.g2.com/products/recorded-future/reviews)
  Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,900 businesses and government organizations across 80 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 219

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Analysis:** 8.9/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.9/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Recorded Future](https://www.g2.com/sellers/recorded-future)
- **Company Website:** https://www.recordedfuture.com
- **Year Founded:** 2009
- **HQ Location:** Somerville, US
- **Twitter:** @RecordedFuture (108,155 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/678036/ (1,151 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Threat Intelligence Analyst, Cyber Threat Intelligence Analyst
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 67% Enterprise, 19% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (100 reviews)
- Features (96 reviews)
- Threat Intelligence (68 reviews)
- Threat Detection (65 reviews)
- Insights (64 reviews)

**Cons:**

- Complexity (38 reviews)
- Expensive (36 reviews)
- Learning Curve (30 reviews)
- Insufficient Information (26 reviews)
- Difficult Learning (25 reviews)

### 4. [ZeroFox](https://www.g2.com/products/zerofox/reviews)
  ZeroFox is the solution used to illuminate threat actor intent, mitigate threats and exposures, remove threats from the internet, and preemptively safeguard your reputation. ZeroFox uniquely fuses the core capabilities of Cyber Threat Intelligence, Brand and Domain Protection, Attack Surface Intelligence, Executive Protection and Physical Security Intelligence in one platform packed with intelligence you’ll actually use. ZeroFox defends your business from the everyday attacks that impact revenue, erode trust, and frustrate teams by: Discovering exposed assets, brands, domains, accounts, and emerging threats Validating the risks that matter most to you and your digital estate Disrupting attacks before they harm your business, your customers, and your people Our continuous cycle—Discover, Validate, Disrupt—delivers outcomes and helps organizations achieve deeper threat contextualization, faster detection and response times, and longer-term cost savings by anticipating, understanding, and mitigating external digital threats at scale. Join thousands of customers, including some of the largest public sector organizations and leaders in finance, media, technology, retail, and healthcare, and let ZeroFox deliver timely, personal, and usable intelligence so you can stay ahead of what’s next and reclaim what’s right.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 132

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Analysis:** 8.4/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.7/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [ZeroFox](https://www.g2.com/sellers/zerofox)
- **Company Website:** https://www.zerofox.com
- **Year Founded:** 2013
- **HQ Location:** Baltimore, MD
- **Twitter:** @ZeroFOX (5,204 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2890672 (872 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 46% Enterprise, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (35 reviews)
- Protection (32 reviews)
- Threat Detection (28 reviews)
- Alert Notifications (23 reviews)
- Alerts (22 reviews)

**Cons:**

- Inefficient Alerts (24 reviews)
- False Alarms (16 reviews)
- Slow Performance (14 reviews)
- False Positives (12 reviews)
- Inefficient Alert System (11 reviews)

### 5. [Cyble](https://www.g2.com/products/cyble/reviews)
  Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging advanced agentic AI and processing vast amounts of data, Cyble empowers businesses to navigate the complexities of the cyber threat landscape effectively. Its unique approach involves collecting and enriching signals from various sources, including the dark web, deep web, and surface web, providing unparalleled visibility into emerging threats and adversarial activities. Targeting a wide range of industries, Cyble&#39;s platform is particularly beneficial for security teams, risk management professionals, and organizations that prioritize safeguarding their digital assets. The comprehensive suite of solutions offered by Cyble includes Threat Intelligence, Dark Web &amp; Deep Web Monitoring, Attack Surface Management (ASM), and Brand Intelligence, among others. These tools are designed to address specific use cases such as identifying vulnerabilities, monitoring brand reputation, and managing third-party risks, making it an essential resource for organizations aiming to bolster their cybersecurity measures. Cyble&#39;s key features are centered around its unified platform, which integrates multiple cybersecurity functions into a single interface. This integration allows for seamless communication between different security components, enabling teams to anticipate, identify, and neutralize threats with remarkable speed and precision. For instance, the Digital Forensics &amp; Incident Response (DFIR) capabilities equip organizations with the tools needed to investigate and respond to incidents effectively, while the DDoS Protection and Cloud Security Posture Management (CSPM) features ensure that businesses can maintain operational integrity even under attack. Moreover, Cyble stands out in its category by combining vast data intelligence with cutting-edge AI automation. This proactive defense strategy not only helps organizations react to cyber threats but also empowers them to stay ahead of potential risks. By enhancing visibility into the threat landscape and providing actionable insights, Cyble enables enterprises to protect their assets, safeguard brand trust, and operate with confidence in an increasingly complex digital environment. The result is a robust cybersecurity framework that supports organizations in navigating the ever-evolving challenges of the cyber world.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 141

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Analysis:** 9.4/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 6.6/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.6/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Cyble](https://www.g2.com/sellers/cyble)
- **Company Website:** https://cyble.com
- **Year Founded:** 2019
- **HQ Location:** Alpharetta, US
- **Twitter:** @cybleglobal (16,359 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cyble-global/ (246 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 38% Enterprise, 17% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (72 reviews)
- Threat Intelligence (70 reviews)
- Features (56 reviews)
- Insights (49 reviews)
- Threat Detection (48 reviews)

**Cons:**

- Inefficient Alerts (27 reviews)
- False Positives (20 reviews)
- Limited Customization (20 reviews)
- Poor Customer Support (20 reviews)
- Poor Support Management (19 reviews)

### 6. [CTM360](https://www.g2.com/products/ctm360-ctm360/reviews)
  CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection &amp; Anti-phishing, Surface, Deep, &amp; Dark Web Monitoring, Security Ratings, Third-party risk Management, and fully managed unlimited Takedowns. As a pioneer and innovator in preemptive security, CTM360 operates as an external CTEM technology platform outside an organization’s perimeter. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 114

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **Analysis:** 8.4/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 5.7/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.9/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [CTM360](https://www.g2.com/sellers/ctm360)
- **Company Website:** https://www.ctm360.com/
- **Year Founded:** 2014
- **HQ Location:** Manama, BH
- **Twitter:** @teamCTM360 (999 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/ctm360/ (125 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 42% Mid-Market, 31% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (48 reviews)
- Ease of Use (45 reviews)
- Features (31 reviews)
- Monitoring (28 reviews)
- Detection Efficiency (24 reviews)

**Cons:**

- Limited Features (9 reviews)
- Integration Issues (8 reviews)
- Lack of Features (5 reviews)
- Lack of Integration (5 reviews)
- Lack of Integrations (5 reviews)

### 7. [1Password](https://www.g2.com/products/1password/reviews)
  The Most Used Enterprise Password Manager, trusted by over 180,00 businesses, 1Password helps improve security, visibility and control over how their passwords and company data are protected. Secure every sign-in by integrating 1Password with your existing IAM infrastructure. Enforce strong, integrated security policies at scale, be proactive about cybersecurity threats to reduce risk, and quickly and easily generate detailed reports on password security posture.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,762

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Analysis:** 9.1/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.5/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [1Password](https://www.g2.com/sellers/1password)
- **Company Website:** https://1password.com/
- **Year Founded:** 2005
- **HQ Location:** Ontario
- **Twitter:** @1Password (139,665 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1password/ (2,911 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, CEO
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 54% Small-Business, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (331 reviews)
- Security (270 reviews)
- Password Management (181 reviews)
- Intuitive (143 reviews)
- Easy Access (134 reviews)

**Cons:**

- Password Management (95 reviews)
- Expensive (91 reviews)
- Login Issues (69 reviews)
- Autofill Issues (63 reviews)
- Cost (60 reviews)

### 8. [Keeper Password Manager](https://www.g2.com/products/keeper-password-manager/reviews)
  Keeper Security is transforming cybersecurity for millions of individuals and thousands of organizations globally. Built with end-to-end encryption, Keeper&#39;s intuitive cybersecurity platform is trusted by Fortune 100 companies to protect every user, on every device, in every location. Our patented zero-trust and zero-knowledge privileged access management solution unifies enterprise password, secrets and connections management with zero-trust network access and endpoint privilege mangement. By combining these critical identity and access management components into a single cloud-based solution, Keeper delivers unparalleled visibility, security and control while ensuring compliance and audit requirements are met. Learn how Keeper can defend your organization against today’s cyber threats at KeeperSecurity.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 1,187

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Analysis:** 9.0/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.1/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Keeper Security](https://www.g2.com/sellers/keeper-security)
- **Company Website:** https://www.keepersecurity.com/
- **Year Founded:** 2011
- **HQ Location:** Chicago, IL
- **Twitter:** @keepersecurity (18,949 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3554342/ (756 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, Owner
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 42% Small-Business, 42% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (168 reviews)
- Security (128 reviews)
- Secure Sharing (88 reviews)
- Password Management (87 reviews)
- Features (74 reviews)

**Cons:**

- Password Management (71 reviews)
- Autofill Issues (49 reviews)
- Login Issues (39 reviews)
- Password Issues (34 reviews)
- Learning Curve (33 reviews)

### 9. [Check Point Exposure Management](https://www.g2.com/products/check-point-exposure-management/reviews)
  Exposure Management isn’t just a buzzword, it’s the future of cybersecurity. Attackers move fast, exploiting misconfigurations, leaked credentials, and control gaps before patch cycles even start. Traditional tools give you dashboards and alerts, but visibility without action is just noise. Check Point’s latest innovation changes the game. By combining billions of internal telemetry points from Check Point’s global footprint with billions of external signals from the open, deep, and dark web via Cyberint, we deliver a Unified Intelligence Fabric that provides complete clarity across your attack surface. The industry is moving from fragmented feeds to real context on what’s an actual priority. Further prioritization is enabled through active validation of the threats, confirmation of compensating controls and deduplication of alerts between tools. Then, with Veriti’s safe-by-design remediation, we’re not just assigning tickets to the ether. Fixes are actually implemented. Every fix is validated before enforcement, meaning exposures are remediated without downtime, and risk reduction becomes measurable. Gartner predicts organizations adopting CTEM with mobilization will see 50% fewer successful attacks by 2028, and we’re leading that charge with action, not just tickets. Ready to see how exposure management done right looks? Get a 15-minute demo and experience preemptive security in action \&gt; https://l.cyberint.com/em-demo


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Analysis:** 9.1/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 8.3/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.2/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,991 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Threat Analyst, Cyber Security Analyst
  - **Top Industries:** Banking, Financial Services
  - **Company Size:** 69% Enterprise, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Threat Intelligence (63 reviews)
- Threat Detection (52 reviews)
- Insights (41 reviews)
- Customer Support (39 reviews)

**Cons:**

- Inefficient Alerts (21 reviews)
- False Positives (15 reviews)
- Inefficient Alert System (15 reviews)
- Integration Issues (11 reviews)
- Limited Features (11 reviews)

### 10. [LastPass](https://www.g2.com/products/lastpass/reviews)
  LastPass delivers Secure Access Essentials, helping individuals and organizations manage and protect access to AI, applications, and credentials straight from the browser. Trusted by more than 100,000 businesses and millions of users worldwide, LastPass combines strong security with everyday simplicity. For individuals, LastPass makes online life easier by securely storing credentials, generating strong passwords, and autofilling logins when needed. That means less friction, fewer resets, and safer access wherever work and life happens. For businesses, LastPass helps lean IT teams secure AI‑driven work by reducing risk by controlling access to unapproved apps, while storing and managing employee credentials and integrating with identity providers to fill gaps left by SSO. It’s simpler access, better visibility, and stronger security without added complexity.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2,021

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Analysis:** 8.6/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.9/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [LastPass](https://www.g2.com/sellers/lastpass)
- **Company Website:** https://www.lastpass.com/
- **Year Founded:** 2008
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @LastPass (45,997 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/lastpass/ (772 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, CEO
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 63% Small-Business, 25% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (227 reviews)
- Password Management (170 reviews)
- Security (155 reviews)
- Autofill Feature (107 reviews)
- Password Security (99 reviews)

**Cons:**

- Autofill Issues (83 reviews)
- Password Management (78 reviews)
- Login Issues (66 reviews)
- Password Issues (44 reviews)
- Browser Extension Issues (43 reviews)

### 11. [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews)
  RiskProfiler is an advanced cybersecurity platform purpose-built for Continuous Threat Exposure Management (CTEM). It unifies external, cloud, vendor, and brand risk intelligence into a single ecosystem—providing organizations with real-time visibility, contextual threat insights, and actionable remediation guidance. Through its integrated suite, External Attack Surface Managemnet, Third\_party Risk Management, Cloud Attack Surface Management, and Brand Risk Protection; the platform continuously discovers, classifies, and evaluates external-facing assets and risks across the internet, multi-cloud environments, and third-party ecosystems. Powered by AI-enabled risk questionnaires, RiskProfiler automates the exchange, validation, and scoring of security assessments, dramatically accelerating third-party due diligence and compliance validation. The platform’s context-enriched graph engine correlates vulnerabilities, exposures, and configurations with real-world threat data, revealing how attackers might exploit an organization’s digital footprint. Its newly enhanced Cyber Threat Intelligence (CTI) module provides live insights into industry-specific attack trends, threat actor profiles, and evolving TTPs, directly embedded within the dashboard. By analyzing CVEs, IOCs, and exploit patterns, it maps these to relevant assets and potential attack paths, enabling focused, prioritized mitigation. From identifying exposed cloud resources across AWS, Azure, and Google Cloud to uncovering brand impersonation, phishing campaigns, or logo abuse, RiskProfiler delivers unified visibility and continuous monitoring that extends beyond the perimeter. It helps organizations anticipate, contextualize, and neutralize threats before they turn into breaches, transforming exposure management into a truly intelligent, predictive defense capability.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 118

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.9/10 (Category avg: 9.3/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 3.9/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 10.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Riskprofiler](https://www.g2.com/sellers/riskprofiler)
- **Company Website:** https://riskprofiler.io/
- **Year Founded:** 2019
- **HQ Location:** Rock Hill , US
- **Twitter:** @riskprofilerio (211 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/riskprofiler (28 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, Security Consultant
  - **Top Industries:** Information Technology and Services, Design
  - **Company Size:** 66% Mid-Market, 33% Small-Business


#### Pros & Cons

**Pros:**

- Risk Management (70 reviews)
- Features (32 reviews)
- Customer Support (31 reviews)
- Ease of Use (30 reviews)
- Easy Setup (29 reviews)

**Cons:**

- Learning Curve (17 reviews)
- Complexity (16 reviews)
- Difficult Learning (16 reviews)
- Learning Difficulty (10 reviews)
- Complex Setup (8 reviews)

### 12. [Guardz](https://www.g2.com/products/guardz/reviews)
  Guardz is a unified cybersecurity platform specifically designed for Managed Service Providers (MSPs). This innovative solution consolidates essential security controls, identity threat detection and response (ITDR), endpoint protection (EDR), email security, user awareness training and phishing simulations, and Managed Detection and Response (MDR) into a single AI-native framework. The platform aims to enhance operational efficiency by streamlining security processes and providing a comprehensive approach to cybersecurity. Targeting MSPs, Guardz addresses the unique challenges these providers face in managing multiple security tools that often operate in silos. By adopting an identity-centric approach, Guardz connects various security vectors, effectively reducing the gaps that can leave organizations vulnerable. This layered and holistic view enables MSPs to respond to user risks in real time, ensuring that security measures are not only reactive but also proactive in safeguarding client environments. Key features of Guardz include its 24/7 AI and human-led Managed Detection and Response (MDR) services. The platform employs agentic AI to triage threats at machine speed, allowing for rapid identification and prioritization of potential security incidents. This automated triage process is complemented by expert analysts who validate findings, mitigate risks, and guide response actions. As a result, MSPs can offer scalable protection to their clients without the need to expand their workforce, making it a cost-effective solution for growing cybersecurity demands. Guardz stands out in the cybersecurity landscape by providing a unified platform that integrates various security functions into one cohesive system. This integration not only simplifies the management of security tools but also enhances the overall effectiveness of security measures. By leveraging AI-driven insights and human expertise, Guardz empowers MSPs to deliver robust cybersecurity solutions that adapt to the evolving threat landscape, ensuring their clients remain protected against emerging risks.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 107

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Analysis:** 8.5/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 9.8/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Guardz](https://www.g2.com/sellers/guardz)
- **Company Website:** https://guardz.com/
- **Year Founded:** 2022
- **HQ Location:** Tel Aviv, IL
- **Twitter:** @GuardzCyber (110 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/guardz/ (153 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Owner, Manager
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 73% Small-Business, 21% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (58 reviews)
- Security (49 reviews)
- Features (37 reviews)
- Easy Setup (28 reviews)
- Threat Detection (28 reviews)

**Cons:**

- Limited Features (13 reviews)
- Integration Issues (8 reviews)
- Lack of Features (8 reviews)
- Limited Customization (8 reviews)
- Insufficient Information (7 reviews)

### 13. [AlertMedia](https://www.g2.com/products/alertmedia/reviews)
  All-in-One Platform to Detect, Understand, and Respond to Risk AlertMedia is purpose-built to enable fast, confident decision-making when people, operations, and brand are on the line. The leading Risk Intelligence and Response platform, AlertMedia combines real-time threat intelligence with emergency communication and response workflows so teams quickly understand what’s happening, who’s impacted, and what to do next. Organizations in more than 150 countries, from small businesses to the Fortune 500, including DHL, JetBlue, Coca-Cola Bottling, and Walmart, rely on AlertMedia for enterprise-grade reliability and flexibility without the complexity that slows teams down during real incidents. The AlertMedia Difference Deeper, Actionable Risk Intelligence \&gt; Early signals from online activity and OSINT, combined with analyst-verified intelligence, help teams detect emerging threats early, cut through noise, and act with confidence. Fast, Globally Reliable Emergency Communication \&gt; High-throughput, multichannel delivery with two-way messaging and simple workflows so messages go out in seconds at any scale. Connected Workflows From Detection to Resolution \&gt; Intelligence, people data, and response actions come together in one system reducing clicks, improving alignment, and accelerating response. Built for Rapid Adoption and Execution \&gt; Intuitive workflows and minimal training drive broader admin adoption eliminating bottlenecks and enabling teams to scale processes with confidence. Scales with Program Maturity \&gt; Expand risk monitoring and response capabilities as needs grow without adding tools, headcount, or operational complexity.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 523

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.7/10 (Category avg: 9.3/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)


**Seller Details:**

- **Seller:** [Alert Media](https://www.g2.com/sellers/alert-media)
- **Company Website:** https://www.alertmedia.com
- **Year Founded:** 2013
- **HQ Location:** Austin, Texas
- **Twitter:** @alertmedia (4,879 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/3582832/ (488 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager
  - **Top Industries:** Hospital &amp; Health Care, Banking
  - **Company Size:** 58% Mid-Market, 36% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (101 reviews)
- Customer Support (49 reviews)
- Alerts Management (46 reviews)
- Communication (41 reviews)
- Notifications (31 reviews)

**Cons:**

- Notification Issues (16 reviews)
- Inefficiency (8 reviews)
- Integration Issues (8 reviews)
- Limitations (8 reviews)
- Limited Functionality (7 reviews)

### 14. [Flashpoint](https://www.g2.com/products/flashpoint/reviews)
  Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified threat intelligence platform, harnesses the power of primary-source collections, curated human insight, and artificial intelligence to deliver decisive action against a comprehensive range of critical threats. Core Capabilities: → Identify and remediate cyber threats, fraud, vulnerabilities, physical security, and national security risks. → Access over 3.6 petabytes of continuously collected data from the internet’s open and difficult-to-access spaces. Add new channels and data sources in minutes to track sources as they surface. → Operationalize intelligence across your entire security stack with seamless integrations throughout the intelligence lifecycle.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Analysis:** 8.6/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.1/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Flashpoint for Threat Intelligence](https://www.g2.com/sellers/flashpoint-for-threat-intelligence)
- **Year Founded:** 2010
- **HQ Location:** New York, NY
- **Twitter:** @FlashpointIntel (13,829 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/flashpoint-intel/ (358 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Security and Investigations
  - **Company Size:** 63% Enterprise, 23% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (23 reviews)
- Features (21 reviews)
- Helpful (13 reviews)
- Insights (13 reviews)
- Search Functionality (12 reviews)

**Cons:**

- Lack of Features (8 reviews)
- Complexity (6 reviews)
- Confusing Interface (6 reviews)
- Limited Features (6 reviews)
- User Frustration (6 reviews)

### 15. [SpyCloud](https://www.g2.com/products/spycloud/reviews)
  SpyCloud protects businesses from identity-based cyberattacks. We proactively alert security teams when their users&#39; data has been compromised by a malware infection or third-party breach, and automate the remediation of exposed users and applications to stop targeted attacks including ransomware, account takeover, and online fraud. The world&#39;s most innovative businesses and consumer brands trust SpyCloud to prevent attacks, safeguard 4+ billion employee and consumer accounts, and streamline cybercrime investigations.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 14

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Analysis:** 8.3/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 10.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [SpyCloud](https://www.g2.com/sellers/spycloud)
- **Year Founded:** 2016
- **HQ Location:** Austin, Texas
- **LinkedIn® Page:** https://www.linkedin.com/company/22295346/ (261 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 43% Enterprise, 43% Mid-Market


#### Pros & Cons

**Pros:**

- Alert Notifications (1 reviews)
- Centralized Management (1 reviews)
- Comprehensive Features (1 reviews)
- Customer Support (1 reviews)
- Deployment Ease (1 reviews)


### 16. [usecure](https://www.g2.com/products/usecure/reviews)
  usecure is an automated Human Risk Management platform that helps MSPs and internal IT teams rapidly reduce employee cyber risk. Deploy adaptive security awareness training, run realistic phishing simulations, monitor exposed credentials on the dark web, and manage policy acknowledgements from one place. Designed for fast rollout and low admin, usecure streamlines compliance, improves user behavior, and proves ROI with clear reporting. Flexible monthly billing and multi-tenant management make it a natural fit for MSPs supporting multiple clients. Trusted by 1,500+ MSPs and 500,000+ end users worldwide. Customers report lower phishing compromise rates and higher security awareness, with setup in minutes and no minimum contracts. Key capabilities include: - Adaptive training tailored to each user’s risk profile - Automated phishing tests with customizable templates and reporting - Proactive domain and credential monitoring with actionable alerts - Centralized policy management with tracking and eSignatures - Multi-tenant, cloud-based management for MSPs, plus integrations with Microsoft 365 and Google Workspace


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 323

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Analysis:** 8.6/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 9.8/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [usecure](https://www.g2.com/sellers/usecure)
- **Company Website:** https://www.usecure.io/
- **Year Founded:** 2016
- **HQ Location:** Manchester,, GB
- **Twitter:** @getusecure (900 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/usecure/ (70 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Director, President
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 58% Small-Business, 37% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (36 reviews)
- Easy Setup (17 reviews)
- Phishing Simulation (15 reviews)
- Training (15 reviews)
- Educational Content (14 reviews)

**Cons:**

- Insufficient Information (8 reviews)
- Inadequate Reporting (7 reviews)
- Poor Reporting (7 reviews)
- Phishing Issues (4 reviews)
- Lack of Features (3 reviews)

### 17. [Dark Web ID](https://www.g2.com/products/dark-web-id/reviews)
  Dark Web ID ensures the greatest amount of protection from risks posed by compromised credentials. It provides 24/7/365 human and machine-powered monitoring of business and personal credentials, including domains, IP addresses and email addresses. Dark Web ID uncovers your compromised credentials in dark web markets, data dumps and other sources and instantly alerts you, giving you the advantage to act before cybercriminals do.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 62

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.2/10 (Category avg: 9.3/10)
- **Analysis:** 8.1/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.9/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Kaseya](https://www.g2.com/sellers/kaseya)
- **Company Website:** https://www.kaseya.com/
- **Year Founded:** 2000
- **HQ Location:** Miami, FL
- **Twitter:** @KaseyaCorp (17,428 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/kaseya/ (5,512 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 65% Small-Business, 32% Mid-Market


### 18. [Progress WhatsUp Gold](https://www.g2.com/products/progress-whatsup-gold/reviews)
  WhatsUp Gold is an IT infrastructure monitoring software designed to help users identify and resolve network issues swiftly, often before they impact end users. This solution provides comprehensive visibility into network performance and availability, enabling IT professionals to maintain optimal operations across their infrastructure. With its interactive mapping interface, WhatsUp Gold allows users to visualize the status of all devices connected to their network, making it easier to monitor both on-premise and cloud-based resources. Targeted primarily at IT administrators and network engineers, WhatsUp Gold is particularly beneficial for organizations that rely heavily on network performance for their daily operations. Its user-friendly design caters to both seasoned professionals and those new to network management, offering a range of features that streamline the monitoring process. The software is designed to support various use cases, from small businesses needing basic monitoring capabilities to large enterprises requiring advanced network management solutions. One of the standout features of WhatsUp Gold is its customizable drag-and-drop dashboards, which provide users with the flexibility to tailor their monitoring experience according to specific needs. These dashboards present real-time data on device status and performance, allowing users to quickly assess the health of their network. Additionally, the software’s automatic discovery and mapping capabilities enable users to visualize their entire network topology, ensuring that no device goes unnoticed during monitoring. WhatsUp Gold also emphasizes optimization, helping users manage network traffic and bandwidth utilization effectively. By providing actionable insights and unified views of network performance, the software empowers IT teams to troubleshoot issues efficiently. The ability to identify and resolve network and server problems proactively not only enhances operational efficiency but also improves overall user satisfaction by minimizing downtime. In summary, WhatsUp Gold offers a robust and interactive solution for IT infrastructure monitoring, combining ease of use with powerful features. Its focus on real-time visibility, customization, and proactive troubleshooting makes it a valuable tool for organizations looking to enhance their network management capabilities.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 380

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Analysis:** 9.6/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.2/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Progress Software](https://www.g2.com/sellers/progress-software)
- **Company Website:** https://www.progress.com/
- **Year Founded:** 1981
- **HQ Location:** Burlington, MA.
- **Twitter:** @ProgressSW (48,839 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/progress-software/ (4,207 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Network Engineer, Network Administrator
  - **Top Industries:** Information Technology and Services, Education Management
  - **Company Size:** 57% Mid-Market, 26% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (46 reviews)
- Monitoring (43 reviews)
- Monitoring Performance (34 reviews)
- Alert Notifications (30 reviews)
- User Interface (29 reviews)

**Cons:**

- Expensive (16 reviews)
- Complex Setup (14 reviews)
- Learning Curve (14 reviews)
- Poor Interface Design (14 reviews)
- Not User-Friendly (13 reviews)

### 19. [Fortra Brand Protection](https://www.g2.com/products/fortra-brand-protection/reviews)
  Fortra Brand Protection safeguards organization’s critical digital assets and data by detecting and quickly mitigating lookalike domains, phishing sites, fake social profiles, and other external threats. With unmatched collection breadth, expert-curated intelligence, and end-to-end mitigation strategies, Fortra Brand Protection delivers complete visibility across online sources, reduce noise to surface real threats, and enable the industry’s fastest, most effective takedowns


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 35

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Analysis:** 8.8/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 1.2/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.8/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Fortra](https://www.g2.com/sellers/fortra)
- **Company Website:** https://www.fortra.com/
- **Year Founded:** 1982
- **HQ Location:** Eden Prairie, Minnesota
- **Twitter:** @fortraofficial (2,766 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/fortra (1,738 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 49% Mid-Market, 29% Small-Business


#### Pros & Cons

**Pros:**

- Alerts (5 reviews)
- Monitoring (4 reviews)
- Threat Intelligence (4 reviews)
- Ease of Use (3 reviews)
- Response Time (3 reviews)

**Cons:**

- Expensive (3 reviews)
- Difficult Initial Setup (1 reviews)
- Difficult Learning Curve (1 reviews)
- Difficult Setup (1 reviews)
- Lack of Automation (1 reviews)

### 20. [DeCYFIR by CYFIRMA](https://www.g2.com/products/decyfir-by-cyfirma/reviews)
  DeCYFIR is an AI-powered preemptive External Threat Landscape Management platform engineered to help organizations predict and prevent cyberattacks before they occur. Adopting a hacker&#39;s perspective, it delivers early warnings, prioritized insights, and actionable intelligence across the full external threat landscape. Built on a proprietary 9-pillar architecture — spanning Attack Surface Discovery &amp; Intelligence, Vulnerability Intelligence &amp; Threat Prioritization, Brand &amp; Online Exposure Management, Digital Risk &amp; Identity Protection, Third Party Risk Management, Situational Awareness &amp; Emerging Threats, Predictive Threat Intelligence, Threat Adaptive Awareness &amp; Training, and Sector Tailored Deception Intelligence. DeCYFIR correlates signals across all pillars to cut through noise, surface what is truly critical, and empower security teams to stay decisively ahead of emerging threats.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 30

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Analysis:** 10.0/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 3.3/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 10.0/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [CYFIRMA](https://www.g2.com/sellers/cyfirma)
- **Year Founded:** 2017
- **HQ Location:** Singapore, SG
- **Twitter:** @cyfirma (1,005 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cyfirma/ (124 employees on LinkedIn®)
- **Phone:** marketing@cyfirma.com

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 47% Mid-Market, 37% Small-Business


#### Pros & Cons

**Pros:**

- Threat Detection (12 reviews)
- Threat Intelligence (10 reviews)
- Cybersecurity (9 reviews)
- Features (7 reviews)
- Security (7 reviews)

**Cons:**

- Not User-Friendly (4 reviews)
- Complexity (3 reviews)
- Learning Curve (3 reviews)
- Limited Customization (3 reviews)
- Complex Setup (2 reviews)

### 21. [Constella Intelligence API](https://www.g2.com/products/constella-intelligence-api/reviews)
  Constella Intelligence is a leading global Digital Risk Protection business that works in partnership with some of the world’s largest organizations to safeguard what matters most and defeat digital risk. Its solutions are broad, collaborative and scalable, powered by a unique combination of proprietary data, technology and human expertise—including the largest breach data collection on the planet, with over 100 billion attributes and 45 billion curated identity records spanning 125 countries and 53 languages.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 12

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Analysis:** 8.2/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.2/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Constella Intelligence](https://www.g2.com/sellers/constella-intelligence)
- **HQ Location:** Los Altos, California
- **Twitter:** @ConstellaIntel (466 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/constella (85 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 50% Mid-Market, 25% Small-Business


#### Pros & Cons


**Cons:**

- Lack of Features (1 reviews)
- Not User-Friendly (1 reviews)
- Poor Customer Support (1 reviews)

### 22. [Cyrisma](https://www.g2.com/products/cyrisma/reviews)
  Cyrisma helps MSPs and MSSPs turn cyber risk and compliance into revenue. Its unified platform combines vulnerability management, data and asset discovery, compliance tracking, secure configuration, and dark web monitoring into one continuous experience - enabling partners to identify, prioritize, and remediate cyber risk efficiently. With executive-ready reporting, risk monetization insights, and elegant visuals, Cyrisma helps MSPs demonstrate measurable value, strengthen client relationships, and scale their security services profitably.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 60

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Analysis:** 7.2/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 8.1/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Cyrisma](https://www.g2.com/sellers/cyrisma)
- **Company Website:** https://www.cyrisma.com/
- **Year Founded:** 2018
- **HQ Location:** Rochester, NY
- **Twitter:** @Cyrisma_USA (43 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cyrisma/ (15 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** CEO
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 75% Small-Business, 22% Mid-Market


#### Pros & Cons

**Pros:**

- Time-saving (13 reviews)
- Ease of Use (12 reviews)
- Customer Support (10 reviews)
- Features (9 reviews)
- Vulnerability Identification (9 reviews)

**Cons:**

- Missing Features (4 reviews)
- Not User-Friendly (4 reviews)
- Integration Issues (3 reviews)
- Limited Flexibility (3 reviews)
- Poor Customer Support (3 reviews)

### 23. [Defendify All-In-One Cybersecurity Solution](https://www.g2.com/products/defendify-all-in-one-cybersecurity-solution/reviews)
  Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an all-in-one, easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. With Defendify, organizations streamline cybersecurity assessments, testing, policies, training, detection, response &amp; containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection &amp; Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters &amp; Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning See Defendify in action at www.defendify.com.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 57

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.8/10 (Category avg: 9.3/10)
- **Analysis:** 8.9/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.6/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Defendify](https://www.g2.com/sellers/defendify)
- **Year Founded:** 2017
- **HQ Location:** Portland, Maine
- **Twitter:** @defendify (306 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/11098948/ (37 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 65% Small-Business, 35% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (8 reviews)
- Cybersecurity (6 reviews)
- Easy Setup (5 reviews)
- Insights (5 reviews)
- Monitoring (5 reviews)

**Cons:**

- Inadequate Reporting (4 reviews)
- Poor Reporting (4 reviews)
- Lack of Information (2 reviews)
- Limited Customization (2 reviews)
- Limited Features (2 reviews)

### 24. [InsecureWeb](https://www.g2.com/products/insecureweb/reviews)
  InsecureWeb is a great tool to protect your business from the dangers of the DarkWeb. The platform scans the darkest places of the internet 24x7 and alerts you when your information is found so you can take preventive actions. This tool is also a great way to start your own dark web monitoring business or help close new deals. Just imagine that you scan &quot;examplecompany.com&quot; and find a ton of their accounts in the DarkWeb. Would they get your monitoring service if you let them know? Moreover, InsecureWeb provides API access so you can integrate it with your favorite SIEM or XDR, add it to your existing offering, resell it, or even use it as a penetration testing or ethical hacking tool. If you have any questions about InsecureWeb, its features, or its integrations, please feel free to reach out to our support team which is available 🕗 24x7 using the live chat option on our website.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 40

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 7.7/10 (Category avg: 9.3/10)
- **Analysis:** 8.4/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 9.3/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [UTMStack](https://www.g2.com/sellers/utmstack)
- **Year Founded:** 2021
- **HQ Location:** Miami, Florida
- **Twitter:** @WebInsecure (14 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/insecureweb/ (2 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Computer &amp; Network Security
  - **Company Size:** 60% Small-Business, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (1 reviews)
- Monitoring (1 reviews)
- Security (1 reviews)
- Simple (1 reviews)
- Threat Intelligence (1 reviews)


### 25. [Webz.io](https://www.g2.com/products/webz-io/reviews)
  Webz.io is the leading provider of machine-defined web data. It transforms the vast pool of web data from across the open and dark web into structured web data feeds, ready for machines to consume. Using Webz.io’s data, enterprises, developers, and analysts can now unlock the raw potential of web data.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 80

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Analysis:** 8.3/10 (Category avg: 8.7/10)
- **What is your organization&#39;s estimated ROI on the product (payback period in months)?:** 10/10 (Category avg: 10/10)
- **Monitoring - Dark Web:** 7.1/10 (Category avg: 9.1/10)


**Seller Details:**

- **Seller:** [Webhose.io](https://www.g2.com/sellers/webhose-io)
- **Year Founded:** 2015
- **HQ Location:** Tel Aviv District, N/A
- **Twitter:** @webz_io (457 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/webhose-io/ (58 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Information Technology and Services
  - **Company Size:** 49% Small-Business, 36% Mid-Market


#### Pros & Cons

**Pros:**

- Automation (1 reviews)
- Communication (1 reviews)
- Comprehensive Features (1 reviews)
- Customer Support (1 reviews)
- Helpful (1 reviews)




## Parent Category

[Web Security Software](https://www.g2.com/categories/web-security)



## Related Categories

- [Threat Intelligence Software](https://www.g2.com/categories/threat-intelligence)
- [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)
- [Brand Protection Software](https://www.g2.com/categories/brand-protection)
- [Risk-Based Vulnerability Management Software](https://www.g2.com/categories/risk-based-vulnerability-management)
- [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)
- [Exposure Management Platforms](https://www.g2.com/categories/exposure-management-platforms)
- [Digital Risk Protection (DRP) Platforms](https://www.g2.com/categories/digital-risk-protection-drp-platforms)




