Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
G2 recognized CTM360
CTM360

By CTM360

4.7 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with CTM360?

CTM360 Reviews & Product Details

Pricing

Pricing provided by CTM360.

External Attack Surface Management

Contact Us
10 users Per Year

CTM360 Media

CTM360 Demo - RiskHub Platform
RiskHub: Redefining Third-Party Risk Management with Streamlined Security Assessments
CTM360 Demo - Make Yourself a Harder Target
HackerView is CTM360’s External Attack Surface Management platform, offering automated asset discovery, issue identification, security ratings, and third-party risk management. It passively maps your organization’s digital presence using public data and comes pre-populated for immediate use.
CTM360 Demo - Threat Intelligence Specific for You
CyberBlindspot is CTM360's Digital Risk Protection platform which combines surface, deep, and dark web monitoring, including brand protection, anti-phishing, and takedowns. The platform enables you to take action on incidents derived from threat intelligence that is directly linked to your organi...
CTM360 Demo - Go Beyond IOCs to Understand Adversary Behavior
ThreatCover is a Comprehensive Threat Intelligence Platform (TIP) that Empowers Your Team to Efficiently Defend and Respond to the Diverse Range of Threats. Powered by curated sources of threat feeds that are continually processed, prioritized, and mapped against Mitre Att&ck framework, ou...
CTM360 Demo - Unparalleled Email Security Enriched with Threat Intelligence
DMARC360 is a platform for DMARC data collection, analysis of email traffic patterns, and rapid email security framework deployment, including incident response through our expert CIRT. Our Team is dedicated to assisting you in achieving DMARC compliance and brand protection against email frau...
CTM360 Demo - Takedowns are our forte!
At CTM360, we offer the world's most advanced takedown capabilities through our CyberBlindspot (CBS) platform, ensuring real-time threat disruption to safeguard your digital assets in an ever-evolving cyber threat landscape. Designed to neutralize malicious activities promptly, our platform em...
At CTM360, we believe effective cybersecurity should be accessible to all. Our powerful,
free-to-use Community Edition
is a gateway to our industry-leading Digital Risk Protection platform. Use this edition to secure your digital assets. To
Play CTM360 Video
At CTM360, we believe effective cybersecurity should be accessible to all. Our powerful, free-to-use Community Edition is a gateway to our industry-leading Digital Risk Protection platform. Use this edition to secure your digital assets. To
In this talk, Mirza takes you on a journey from the true definitions of IT Security, Information Security, and Cybersecurity to building a practical framework that addresses gaps most organizations overlook.
This isn’t about selling tools.
Play CTM360 Video
In this talk, Mirza takes you on a journey from the true definitions of IT Security, Information Security, and Cybersecurity to building a practical framework that addresses gaps most organizations overlook. This isn’t about selling tools.
Product Avatar Image

Have you used CTM360 before?

Answer a few questions to help the CTM360 community

CTM360 Reviews (99)

Reviews

CTM360 Reviews (99)

4.7
99 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Twapandula H.
TH
Small-Business (50 or fewer emp.)
"CTM Review"
What do you like best about CTM360?

like that the platform helps identify exposed assets, misconfigurations, and digital risks quickly, enabling us to take proactive action. The interface is clean, the alerts are timely, and the platform makes it easy to see how our organization appears from a hacker’s point of view. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

While CTM360 is a valuable platform, some areas could be enhanced. Reports generated can sometimes lack full detail regarding risk description, impact, and remediation guidance. In some cases, findings would benefit from clearer asset-level context, such as mapping each risk directly to its associated IP, domain, or system. Additionally, some country-level intelligence feels generic, and deeper localization would strengthen situational awareness for national stakeholders like CSIRTs and CERTs. Review collected by and hosted on G2.com.

Shahryar M.
SM
Senior Pre-Sales Executive
"Exceptional Threat Visibility and Support"
What do you like best about CTM360?

I love how CTM360 offers a strong and comprehensive digital risk protection platform with excellent visibility across external threat surfaces. I appreciate their proactive and efficient threat intelligence, brand monitoring, and takedown capabilities that help organizations stay ahead of emerging cyber risks. The platform is user-friendly and easy to navigate, which significantly enhances the overall experience. Their support team is also exceptional, being very responsive and professional. I particularly value the engagement of their leadership when dealing with clients and partners, which adds a personal touch to their service. Moreover, the threat intelligence feeds are incredibly timely, contextual, and provide actionable insights that help detect and mitigate risks efficiently. The Brand Monitoring and External Attack Surface Discovery features are crucial for providing continuous visibility into exposed assets, allowing us to identify risks before they can be exploited. Additionally, the initial setup of CTM360 was quite easy and quick, taking about an hour to complete. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

Overall the platform works well, however new features could be introduced to make the tool more worth it. Specifically, I would like to see advanced alert prioritization, risk scoring, and customizable dashboards. Review collected by and hosted on G2.com.

Nagendra S.
NS
Head of Network Infrastructure
"Effortless Security Monitoring, Outstanding Support"
What do you like best about CTM360?

I appreciate CTM360's approach to customer service, particularly their understanding of our requirements, which ensures that the service is tailored to our specific needs. The platform's Hackerview asset page stands out for its effectiveness in providing critical information, and their summary reports are invaluable for delivering insights to our Executive Management in a clear and concise manner. Additionally, the initial setup was very easy, allowing us to quickly integrate the solution into our operations. My overall satisfaction with CTM360 is reflected in my willingness to recommend the platform with the highest score of 10 out of 10. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

I would prefer CTM360 to follow up on the issues that are pending for remediation and keep us engaged. This lack of proactive follow-up can leave me feeling as if there's a gap in the support and oversight necessary to ensure vulnerabilities are addressed promptly. Review collected by and hosted on G2.com.

Tumane M.
TM
Cybersecurity Manager
Mid-Market (51-1000 emp.)
"Comprehensive Asset Protection with Instant Remediation Feedback"
What do you like best about CTM360?

CTM360 provides a thorough assessment of my organization's digital assets. With CTM360, I have a clear overview of all internet-facing assets, allowing vulnerabilities to be identified and addressed quickly and efficiently. The feedback on remediation efforts is immediate, and their support team is always available, and is also proactive. They are able to initiate immediate scans that reflect the most up-to-date status. We are able to also share the threat intel, to which we also share with our constituents. The platform is user friendly for use. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

I feel that having greater control would be much more valuable than simply being able to remediate. For instance, I would like the ability to manage my assets list more effectively. If my company owns multiple assets across different domains, I should have the option to determine which of these assets influence the rating of my company profile, according to my own risk matrix. Is it possible to add a pentest module? That would be highly appreciated. Review collected by and hosted on G2.com.

Vince Jason V.
VV
Mid-Market (51-1000 emp.)
"Effortless Implementation and Intuitive Features"
What do you like best about CTM360?

There's no need for a deployment. Can be easily implemented within the threat intel team. Additionally, CTM360's features are great in terms of being able to understand them easily. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

None that I can think of right now. I guess I'm fully satisfied with the solution Review collected by and hosted on G2.com.

Verified User in Banking
CB
Mid-Market (51-1000 emp.)
"Intuitive Threat Monitoring with Fast Support"
What do you like best about CTM360?

I find the GUI of CTM360 exceptionally intuitive, thanks to its multi-module approach that clearly highlights different information based on the operational context. This makes navigating the platform seamless and enhances my understanding of complex data. The dashboard's clean and well-maintained data structure ensures clarity and efficiency in monitoring threats. I also appreciate the responsiveness of the CTM360 team, who act quickly and reliably, providing meaningful insights through chat or direct calls, which significantly enhances my experience. The initial setup was very easy, making it a convenient solution to deploy. Combined with these aspects, CTM360 effectively addresses challenges in threat intelligence and active threat monitoring, making it an invaluable tool for our operations. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

I find the AI integration with CTM360 to be somewhat clumsy, as it doesn't seamlessly fit into the operational workflow. The AI feels like it's still in early development mode, lacking the polish and efficiency expected from a mature feature. Furthermore, there is a need for better understanding and handling of the operational context, especially when highlighting vulnerabilities. This gap often leads to false positives or recurring alerts across multiple targets that could actually represent the same issue, creating unnecessary noise and potentially obscuring genuine threats. Review collected by and hosted on G2.com.

Ts. Sau-Wern T.
TT
Director/Chief Engineer - Head of Platform Engineering - Technology Division
"Effortless Asset Monitoring with Stellar Take Down Service"
What do you like best about CTM360?

I find CTM360 incredibly beneficial for a variety of reasons. Firstly, it provides an excellent monitoring system for our public-facing assets, ensuring we stay informed about risks associated with our participants and keeping us updated with the latest news on threats and claims from potential threat actors. This is crucial for maintaining the security integrity of our operations. The feature that stands out to me is the takedown service, which is one of the fastest and most efficient in the industry. It allows us to react quickly to discovered vulnerabilities, considerably mitigating potential risks. Additionally, I appreciate having a comprehensive view of all our public-facing assets presented in a unified, singular interface—making it easy to manage and evaluate our security posture. I also admire CTM360 for its regular improvements to the platform, ensuring it stays ahead in addressing our cybersecurity needs. The initial setup was impressively straightforward, warranting a rating of 9 out of 10 for ease, reflecting its user-friendliness. Overall, my high confidence in recommending CTM360 is demonstrated by my scoring of 9 out of 10 for recommending it to others. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

The is a limit of how many 3rd parties on the supply chain one can monitor. Review collected by and hosted on G2.com.

Ramsès D.
RD
"Easy to use, a holistic approach to external perimeter monitoring"
What do you like best about CTM360?

I greatly appreciate the ease of use of CTM360 and its different approach compared to other solutions. CTM360 focuses on the essentials while offering comprehensive and holistic coverage. Features like 'Hacker view', 'Deep scan', external attack surface management, CTI, Darkweb monitoring, third-party risk management, and interventions allow us to effectively manage our clients' attack surface and take corrective actions quickly. The product helps us automate the management and monitoring of the external perimeter, which significantly reduces our workload, especially since we manage dozens of clients. Its efficiency allows us to produce comprehensive reports quickly and be proactive against threats. I particularly like the 'hackerview' which reveals vulnerabilities and TTPs, positioning CTM360 as much more relevant than traditional IOCs. The frequently provided reports are very relevant for identifying current trends and preparing for them. Finally, the customer service with Salman Anwar is exemplary in terms of availability and responsiveness. The initial implementation was easy thanks to the turnkey solution provided by the CTM360 team. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

Improve the malware analysis section to have many more reports. Have a sandbox to analyze samples and generate a report. Also, be able to conduct research on a wider variety of malware. Review collected by and hosted on G2.com.

MS
"Exceptional Security Solution with Seamless Setup"
What do you like best about CTM360?

I find CTM360 incredibly beneficial for securing our organizational operations. The software is instrumental in resolving executive impersonation and other issues across more than 100 social media platforms, which is essential for protecting our digital footprint. I appreciate that CTM360 offers a comprehensive end-to-end solution, going beyond mere identification of security problems to actively resolving them. The ability to assess the security maturity level of third-party vendors without accessing their actual infrastructure is another standout feature. This capability provides unbiased insights, helping us make informed decisions regarding strategic partnerships and integrations, especially vital in combating supply chain attacks. I value this transparency as it allows us to verify claims made by potential partners. Additionally, the user-friendly, interactive interface enhances usability, ensuring quick setup and easy adaptation within just one to two days. Our executives have strongly praised the CTM360 dashboard for its clarity and efficacy in orienting them to our security posture, demonstrating its value in strategic decision-making. Overall, I would rate CTM360 a perfect 10 for its reliability, comprehensive service, and invaluable security insights. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

no Review collected by and hosted on G2.com.

Lemmy Mwanza M.
LM
Head Information Security & Data Protection /CISO
"Effortless Setup, Intuitive to Use"
What do you like best about CTM360?

I really appreciate the ease of use that CTM360 offers. It's incredibly straightforward, and there are no costs associated with training the team on how to use it because everything is so intuitive. This simplicity translates to significant time and resource savings, allowing us to focus on the core aspects of our work without worrying about learning how to navigate a complex system. Furthermore, the initial setup of CTM360 is hassle-free, as it requires no implementation. This efficiency in getting started allows us to quickly integrate it into our processes and begin leveraging its features without any downtime. Overall, CTM360's user-friendly design and efficient setup are instrumental in enhancing our cybersecurity operations. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

CTM360 doesn't cover all security domains, necessitating the use of additional tools to achieve comprehensive security coverage. Review collected by and hosted on G2.com.

Pricing Options

Pricing provided by CTM360.

External Attack Surface Management

Contact Us
10 users Per Year

Third Party Risk Management & Risk Assessments

Contact Us
10 users Per Year

Intelligence Email Security (DMARC)

Contact Us
1 Email Sending Domains Per Year
CTM360 Features
Asset Management
Security Workflow Automation
Deployment
Proactive Alerts
Malware Detection
Intelligence Reports
Endpoint Intelligence
Security Validation
Reseller Database
Monitoring
Violations
Product Avatar Image
Product Avatar Image