ArmorCode Pros and Cons: Top Advantages and Disadvantages

Quick AI Summary Based on G2 Reviews

Generated from real user reviews

Users appreciate the seamless integration with scanners, which provides a clear view of security weaknesses. (1 mentions)
Users value the easy integrations of ArmorCode, which enhance security visibility across various scanners seamlessly. (1 mentions)
Users value the seamless integrations with scanners, providing a unified view of security vulnerabilities in ArmorCode. (1 mentions)
Users value the wide integration with scanners, enabling a unified understanding of security vulnerabilities. (1 mentions)
Users report inadequate reporting with ArmorCode, citing issues with accuracy and limited customization options. (1 mentions)
Users find the limited customization of ArmorCode's reporting impacts the accuracy and flexibility of their insights. (1 mentions)
Users experience inaccurate reporting with limited customization options, impacting their overall satisfaction with ArmorCode. (1 mentions)

Top Pros or Advantages of ArmorCode

1. Cloud Management
Users appreciate the seamless integration with scanners, which provides a clear view of security weaknesses.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you like about ArmorCode?

It gets integrated with almost all scanners and create a unified understand of where the product is lagging in terms of security.

2. Easy Integrations
Users value the easy integrations of ArmorCode, which enhance security visibility across various scanners seamlessly.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you like about ArmorCode?

It gets integrated with almost all scanners and create a unified understand of where the product is lagging in terms of security.

3. Integrations
Users value the seamless integrations with scanners, providing a unified view of security vulnerabilities in ArmorCode.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you like about ArmorCode?

It gets integrated with almost all scanners and create a unified understand of where the product is lagging in terms of security.

4. Visibility
Users value the wide integration with scanners, enabling a unified understanding of security vulnerabilities.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you like about ArmorCode?

It gets integrated with almost all scanners and create a unified understand of where the product is lagging in terms of security.

Top Cons or Disadvantages of ArmorCode

1. Inadequate Reporting
Users report inadequate reporting with ArmorCode, citing issues with accuracy and limited customization options.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you dislike about ArmorCode?

Sometimes the reporting is no accurate and has very less customization

2. Limited Customization
Users find the limited customization of ArmorCode's reporting impacts the accuracy and flexibility of their insights.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you dislike about ArmorCode?

Sometimes the reporting is no accurate and has very less customization

3. Reporting Issues
Users experience inaccurate reporting with limited customization options, impacting their overall satisfaction with ArmorCode.
See 1 mentions

See Related User Reviews

Vaibhav S.
VS

Vaibhav S.

Mid-Market (51-1000 emp.)

3.5/5

"Kept Protected from Vunrabilities"

What do you dislike about ArmorCode?

Sometimes the reporting is no accurate and has very less customization

ArmorCode Reviews (3)

Reviews

ArmorCode Reviews (3)

4.0
3 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Vaibhav S.
VS
Core Support Engineer
Mid-Market (51-1000 emp.)
"Kept Protected from Vunrabilities"
What do you like best about ArmorCode?

It gets integrated with almost all scanners and create a unified understand of where the product is lagging in terms of security. Review collected by and hosted on G2.com.

What do you dislike about ArmorCode?

Sometimes the reporting is no accurate and has very less customization Review collected by and hosted on G2.com.

MD Sabbir H.
MH
Instructor
Small-Business (50 or fewer emp.)
"Review of ArmorCode"
What do you like best about ArmorCode?

Easily integrate with JIRA, Gitlab, Github etc. More secure from development to deployment . Identify potential vulnerabilities and provides guidance on how to solve them. Review collected by and hosted on G2.com.

What do you dislike about ArmorCode?

Limited scability, not much options to customise, analytics and reporting is not that good Review collected by and hosted on G2.com.

LL
Mid-Market (51-1000 emp.)
"Amazing platform for managing appsec and infrastructure vulnerablities"
What do you like best about ArmorCode?

ArmorCode is a fantastic platform that brings vulnerabilities across dispersed areas into a single place to triage, assign, and report. It has simplified workflows for both my Application Security and Infrastructure Security teams. It streamlines the process of vulnerability management across the enterprise. Review collected by and hosted on G2.com.

What do you dislike about ArmorCode?

There is a lot of data presented by ArmorCode, and ensuring that the data is presented in a way that clearly illustrates the risk to the organization takes time and effort to realize. Review collected by and hosted on G2.com.

There are not enough reviews of ArmorCode for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Scrut Automation Logo
Scrut Automation
4.9
(1,300)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
2
Wiz Logo
Wiz
4.7
(777)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
CloudBees Logo
CloudBees
4.4
(619)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
4
Tenable Nessus Logo
Tenable Nessus
4.5
(301)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
5
Arctic Wolf Logo
Arctic Wolf
4.7
(279)
Arctic Wolf provides Cyber-SOC as a service, designed to make every link in the security chain stronger.
6
Recorded Future Logo
Recorded Future
4.6
(223)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
7
Cisco Vulnerability Management (formerly Kenna.VM) Logo
Cisco Vulnerability Management (formerly Kenna.VM)
4.3
(217)
Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to focus their limited resources and remediate more efficiently. Cisco’s data science-driven prioritization evaluates both enterprise data and a wealth of data on real-world exploit activity and translates that context into actionable intelligence to guide remediation.
8
Intruder Logo
Intruder
4.8
(206)
Intruder is a proactive security monitoring platform for internet-facing systems.
9
Check Point Exposure Management Logo
Check Point Exposure Management
4.6
(168)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
10
Qualys VMDR Logo
Qualys VMDR
4.4
(167)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
Show More
Product Avatar Image
ArmorCode