Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Cobalt.io

3.5
(1)

Cobalt's Pen Testing as a Service (PTaaS) Platform transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of certified freelancers, Cobalt's crowdsourced SaaS pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget.

Work for Cobalt.io?

Learning about Cobalt.io?

We can help you find the solution that fits you best.

Cobalt.io Reviews

Ask Cobalt.io a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
For Category
Industry
Showing 1 Cobalt.io review
LinkedIn Connections
Cobalt.io review by User in Internet
User in Internet
Validated Reviewer
Review Source
content

"Pen testing at reasonable cost"

What do you like best?

offers customisable pen testing options different tests

What do you dislike?

Can be more difficult to config than other pen testing tools.

What business problems are you solving with the product? What benefits have you realized?

increase site security.

Sign in to G2 to see what your connections have to say about Cobalt.io

What Penetration Testing solution do you use?

Thanks for letting us know!

There are not enough reviews of Cobalt.io for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Metasploit Logo
Metasploit
4.5
(15)
Metasploit Pro is a penetration testing tool that increases penetration tester's productivity, prioritizes and demonstrates risk through closed-loop vulnerability validation, and measures security awareness through simulated phishing emails.
2
SQLmap Logo
SQLmap
4.4
(13)
Automatic SQL injection and database takeover tool
3
Veracode Application Security Platform Logo
Veracode Application Security Platform
3.2
(12)
Veracode is the world's best automated, on-demand application security testing and code review solution.
4
Swascan Security Suite Logo
Swascan Security Suite
4.7
(3)
Provides automated security testing and security scan of web applications to identify vulnerabilities, scans your network and devices and suggest to you recommendations on how they can be fixed, and provides a source code analysis to identify and resolve security weaknesses and vulnerabilities
5
BeEF Logo
BeEF
4.2
(3)
BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.
6
HackerOne Logo
HackerOne
3.8
(3)
The Most Trusted Hacker-Powered Security Platform
7
Detectify Logo
Detectify
5.0
(1)
Detectify is a SaaS based website security service that analyzes and monitors the security level of a user's website by applying a broad range of emulated hacker attacks and provide report that describes the identified vulnerabilities and their potential risk in the hands of malicious hackers.
8
Defensics Logo
Defensics
3.5
(1)
Test running apps and services for common security weaknesses and vulnerabilities using malformed inputs to detect flaws. Leverage fully automated tests across 250+ test suites, protocol-specific attack patterns and automatic test mutation
9
Breachlock Logo
Breachlock
(0)
BreachLock is a security startup that offers a unique SaaS platform delivering on-demand, continuous and scalable security testing suitable for modern cloud and DevOps powered businesses.
10
SATAN Logo
SATAN
(0)
SATAN is a tool to help systems administrators. It recognizes several common networking-related security problems, and reports the problems without actually exploiting them.
Show more
Kate from G2

Learning about Cobalt.io?

I can help.
* We monitor all Cobalt.io reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.