Introducing G2.ai, the future of software buying.Try now
Intruder
Sponsored
Intruder
Visit Website
Product Avatar Image
CheckRed

By CheckRed

4.8 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with CheckRed?

Intruder
Sponsored
Intruder
Visit Website
It's been two months since this profile received a new review
Leave a Review

CheckRed Reviews & Product Details

Profile Status

This profile is currently managed by CheckRed but has limited features.

Are you part of the CheckRed team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used CheckRed before?

Answer a few questions to help the CheckRed community

CheckRed Reviews (4)

Reviews

CheckRed Reviews (4)

4.8
4 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
UP
Payroll Specialist
Banking
Mid-Market (51-1000 emp.)
"Enhanced the general security of our cloud systems"
What do you like best about CheckRed?

CheckRed has an all-encompassing solution that offers a detailed cloud security that monitors all our SaaS apps and cloud setup. It is detecting possible configuration errors, through potential threats to security and hacking incidents. Review collected by and hosted on G2.com.

What do you dislike about CheckRed?

Analysing the remediation options, one gets the feeling that there appear to be a limited number of choices. It mainly alerts us of problems and we have to solve them ourselves in our team. Review collected by and hosted on G2.com.

SS
Technical Specialist
Mid-Market (51-1000 emp.)
"A comprehensive solution for modern cybersecurity challenges"
What do you like best about CheckRed?

It provides protection from wide range of threats including malware, ransomware, phishing, etc.

It has advanced heuristic analysis and machine learning algorithms which helps in real time monitoring and threat detection. Review collected by and hosted on G2.com.

What do you dislike about CheckRed?

It may generates false positives, in some cases legitimate files or actions may mark as suspicious.

Full system scans is resource intensive on older or less powerful machines.

Deployment for large organizations can be complex and time consuming. Review collected by and hosted on G2.com.

Sumesh K.
SK
Technical Support Executive
Mid-Market (51-1000 emp.)
"CheckRed is best Cloud Security"
What do you like best about CheckRed?

The ability odf customize securtiy policies to fit specific needs further enhance it's appeal, making its a versatile and powerful tool for cloud security. Review collected by and hosted on G2.com.

What do you dislike about CheckRed?

It may take some time to fully understand and utilize all the functionalities effectively. Review collected by and hosted on G2.com.

Verified User in Computer Networking
UC
Small-Business (50 or fewer emp.)
"Ease of use"
What do you like best about CheckRed?

Ease of use for new users and security. Review collected by and hosted on G2.com.

What do you dislike about CheckRed?

I am still evaluating to check if there are any negative points. Review collected by and hosted on G2.com.

There are not enough reviews of CheckRed for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(752)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
FortiCNAPP Logo
FortiCNAPP
4.4
(384)
FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
3
Scrut Automation Logo
Scrut Automation
4.9
(1,292)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
4
Oneleet Logo
Oneleet
4.9
(527)
Oneleet provides a full-coverage cybersecurity platform through which companies can build, manage, and monitor their cybersecurity management program. The company's core product offers a roadmap for companies to become secure and build trust with their partners.
5
JumpCloud Logo
JumpCloud
4.5
(3,739)
The JumpCloud Directory Platform reimagines the directory as a complete platform for identity, access, and device management.
6
Ubuntu Logo
Ubuntu
4.5
(2,268)
Super-fast, easy to use and free, the Ubuntu operating system powers millions of desktops, netbooks and servers around the world.
7
Vanta Logo
Vanta
4.6
(2,128)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
8
AuditBoard Logo
AuditBoard
4.6
(1,572)
AuditBoard’s modern connected risk platform is designed to elevate your teams, engage the front lines of your business, and help you leverage risk as a strategic driver. At the heart of our connected risk architecture is a unified data core that centralizes your organization's risks, controls, policies, frameworks, issues, and more. The core is surrounded by a set of powerful platform capabilities, including collaboration, automation, a robust workflow engine, business intelligence, and a highly extensible integration layer. Together, AuditBoard’s unified core and purposefully designed platform capabilities set a strong, dynamic foundation for our award-winning applications — RiskOversight, CrossComply, SOXHUB, OpsAudit, ESG, and TPRM.
9
Sprinto Logo
Sprinto
4.8
(1,529)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
10
Drata Logo
Drata
4.8
(1,116)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
CheckRed
View Alternatives