# CTM360 Reviews
**Vendor:** CTM360  
**Category:** [Threat Intelligence Software](https://www.g2.com/categories/threat-intelligence)  
**Average Rating:** 4.7/5.0  
**Total Reviews:** 116
## About CTM360
CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection &amp; Anti-phishing, Surface, Deep, &amp; Dark Web Monitoring, Security Ratings, Third-party risk Management, and fully managed unlimited Takedowns. As a pioneer and innovator in preemptive security, CTM360 operates as an external CTEM technology platform outside an organization’s perimeter. Seamless and turn-key, CTM360 requires no configurations, installations or inputs from the end-user, with all data pre-populated and specific to your organization. All aspects are managed by CTM360.



## CTM360 Pros & Cons
**What users like:**

- Users praise the **responsive customer support** of CTM360, enhancing overall satisfaction and experience with the platform. (48 reviews)
- Users praise the **user-friendly design** of CTM360, allowing easy navigation and seamless integration with existing tools. (45 reviews)
- Users value CTM360&#39;s **user-friendly interface and comprehensive threat intelligence** , enhancing proactive brand protection and incident response. (31 reviews)
- Users value the **strong monitoring** and support of CTM360, aiding in faster detection of threats and impersonation. (28 reviews)
- Users value the **high detection efficiency** of CTM360, ensuring swift and accurate identification of threats. (24 reviews)
- Users value the **robust security monitoring** of CTM360, enhancing their operational safety against potential threats. (24 reviews)
- Insights (21 reviews)
- Service Quality (21 reviews)
- Users commend CTM360 for its **exceptional detection capabilities** in identifying and neutralizing phishing and digital threats. (19 reviews)
- Protection (19 reviews)

**What users dislike:**

- Users note the **limited features** of CTM360, requiring extra tools and restrictions on monitoring and takedowns. (9 reviews)
- Users report **integration issues** with CTM360, particularly with SIEM solutions like QRadar, affecting threat reporting efficiency. (8 reviews)
- Users note a **lack of features** in CTM360, which limits its effectiveness and requires supplementary tools for security. (5 reviews)
- Users express frustration with the **lack of API integration** which hinders streamlined security processes and user experience. (5 reviews)
- Users find the **lack of integrations** with other security tools a significant limitation in CTM360&#39;s effectiveness. (5 reviews)
- Users find CTM360&#39;s **limited functionality** hampers operational efficiency, with clumsy AI and restricted third-party monitoring. (5 reviews)
- Users find the **integration complexity** of CTM360 challenging, particularly in customized environments with steep learning curves. (4 reviews)
- Inaccuracy (4 reviews)
- Insufficient Data (4 reviews)
- Insufficient Information (4 reviews)

## CTM360 Reviews
  ### 1. Exceptional Cyber Threat Intelligence Platform That Delivers Actionable Security Insights

**Rating:** 5.0/5.0 stars

**Reviewed by:** Raghavendran K. | SOC analyst, Enterprise (> 1000 emp.)

**Reviewed Date:** April 27, 2026

**What do you like best about CTM360?**

We've been leveraging CTM360 for many year as our threat intelligence strategy, and it has significantly elevated our organization's cyber defense posture. From timely threat intel to deep contextual insights, CTM360  has proven to be a critical asset for proactive threat detection, risk reduction, and decision-making. 

CTM360 offers a unified platform that brings together multiple capabilities — including threat feeds, actor profiling, dark web monitoring, brand protection

The UI is user-friendly and designed with analysts in mind. Dashboards are customizable, and the platform offers automated reporting capabilities that are CISO-ready — a huge plus when presenting threat posture updates to leadership.

The customer success and analyst support teams are responsive and incredibly knowledgeable. We've benefited from tailored threat briefings and intel advisory services.

CTM360 stands out in a crowded CTI market for its depth, speed, and operational relevance. It has become a strategic component of our cybersecurity program, helping us stay one step ahead of threat actors. For any organization looking to strengthen their threat intelligence capability.

**What do you dislike about CTM360?**

Nothing , we are very much satisfied with CTM360.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 is helping us solve some of the most critical challenges related to external threat surface management and digital risk protection — areas that are often blind spots for internal security teams. The platform consolidates global cyber threat intelligence, underground chatter, and dark web monitoring into one view. It has allowed us to detect early indicators of targeting, leaked credentials, or brand impersonation attempts that we would have otherwise missed.

  ### 2. CTM360 Delivers Actionable External Threat Visibility for Faster SOC Response

**Rating:** 4.0/5.0 stars

**Reviewed by:** Ahmad K. | Enterprise (> 1000 emp.)

**Reviewed Date:** April 27, 2026

**What do you like best about CTM360?**

CTM360 provides strong visibility into external threat exposure, especially around brand abuse, phishing, and digital risk monitoring. The platform helps our SOC team detect threats early and respond faster before incidents escalate. The dashboards offer good overall situational awareness, and the threat intelligence provided is relevant and actionable in most cases. Integration with SOC workflows supports daily monitoring and investigation activities and adds real value to external security posture management.

**What do you dislike about CTM360?**

The most helpful aspect of CTM360 is its ability to identify external threats that are often missed by traditional internal security tools. Phishing detection, dark web monitoring, and brand-related threat visibility are particularly useful. The alerts usually contain enough context to begin investigation quickly, reducing manual research time for analysts.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 solves the challenge of limited visibility into external threats such as phishing campaigns, brand abuse, impersonation domains, and exposed digital assets that are not easily detected by traditional internal security tools. By continuously monitoring the external threat landscape, the platform helps our SOC identify risks earlier in the attack lifecycle. This benefits us by improving proactive detection, reducing investigation time, and enabling faster response to threats before they impact users or the organization. Overall, CTM360 strengthens our external security posture and helps close visibility gaps outside the perimeter while supporting day-to-day SOC operations.

  ### 3. Comprehensive Cybersecurity, Streamlined Performance

**Rating:** 5.0/5.0 stars

**Reviewed by:** Mohammed Sherif M. | Information Security Operations Analyst, Enterprise (> 1000 emp.)

**Reviewed Date:** April 27, 2026

**What do you like best about CTM360?**

I appreciate that CTM360 helps with brand protection by looking out for threat actors trying to impersonate our bank and checking for devices exposed to the public. It checks for leaked credit card details and exposed ports that shouldn't be public, which protects our brand in cyberspace. The third-party risk assessment feature works well for us in assessing vendors. CTM360 also effectively detects credit card leaks and helps us block them to prevent financial losses. It hunts for exposed spots within our network, protecting us from potential infiltrations. I value how it prevents threat actors from using our domain for phishing activities, ensuring we protect our reputation. Overall, all domains work well, and we're satisfied with the service.

**What do you dislike about CTM360?**

For now everything is fine

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 for brand protection to prevent impersonation of the bank, check exposed devices, ports, and credit card leaks. It helps protect our brand and customers' financial details from threat actors, ensuring our domain isn't used for phishing.

  ### 4. Broad Threat Intelligence and an Intuitive, Well-Integrated Dashboard

**Rating:** 4.0/5.0 stars

**Reviewed by:** Verified User in Telecommunications | Small-Business (50 or fewer emp.)

**Reviewed Date:** March 28, 2026

**What do you like best about CTM360?**

Its threat intelligence coverage is broad and thorough. I also like how well integrated the dashboard is. It is intuitive and easy to navigate around whilst still providing all the important functions. The vulnerability tracking feature gives a clear and up-to-date view of exposed assets and risks without having to dig through raw data.

**What do you dislike about CTM360?**

Integrating CTM360 with other internal tools hasn't been as seamless as I would have hoped. I am aware of the APIs that CTM360 provides however they do not provide the information that we want. We wanted to pull some of the insights from CTM360 like the cybersecurity scores and ratings but not necessarily the details. We wanted to display this information on an internal dashboard for our staff members to see but this proved to be challenging.

**What problems is CTM360 solving and how is that benefiting you?**

It helps us uncover potential threats at scale without having to do the manual work of running penetration tests and network scans just to identify vulnerabilities.

  ### 5. CTM360 Hackerview: Consolidated Monitoring with Low Operational Overhead

**Rating:** 5.0/5.0 stars

**Reviewed by:** Ifeyemi I. | Mid-Market (51-1000 emp.)

**Reviewed Date:** May 01, 2026

**What do you like best about CTM360?**

I believe hackerview is most helpful. It shows your technologies used at the external perimeter, vulnerabilities and remediation. There are several upsides of using CTM360.
1. It addresses blindspots that scanners might not cover.
2. Consolidated monitoring across surface, deep and dark web
3. Low or zero operational overhead

**What do you dislike about CTM360?**

I can’t think of anything a competitor offers that CTM360 lacks.

**What problems is CTM360 solving and how is that benefiting you?**

It solves the problem of external cyber risk that are ordinarily not seen and left out. It benefits us by providing continuous visibility, very early detection which helps strengthen board and audit assurance.

  ### 6. User-Friendly with Actionable Insights

**Rating:** 5.0/5.0 stars

**Reviewed by:** Heshan N. | Enterprise (> 1000 emp.)

**Reviewed Date:** April 28, 2026

**What do you like best about CTM360?**

I like CTM360 for its user-friendly dashboard with actionable insights. It's really helpful because it makes it easy for both the technical and management teams to understand the overall security posture. The initial setup was easy too, which was great.

**What do you dislike about CTM360?**

Fully understanding all features initially takes some time. It would be better to add some tutorials.

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 for external attack surface monitoring, helping security teams proactively identify risks. Its user-friendly dashboard with actionable insights makes it easy for both technical and management teams to understand our overall security posture.

  ### 7. nothing

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Insurance | Mid-Market (51-1000 emp.)

**Reviewed Date:** March 15, 2026

**What do you like best about CTM360?**

What I like most about CTM360 is its ability to provide comprehensive visibility into external cyber risks and proactively detect threats like phishing, brand abuse, and exposed assets in one unified platform. It simplifies security operations and enables faster, more effective threat response.

**What do you dislike about CTM360?**

While CTM360 is very powerful in detecting external threats, the platform could benefit from improved dashboard customization and deeper integrations with other security tools to make workflows even more efficient.

**What problems is CTM360 solving and how is that benefiting you?**

The Problems CTM360 Solves

1. External cyber threats and unknown attack surfaces
Many companies don’t know the full extent of their digital presence (domains, cloud assets, exposed services). Attackers often exploit these unknown or misconfigured assets.
CTM360 identifies and monitors an organization’s external attack surface and exposed assets so vulnerabilities can be discovered early.

2. Phishing, brand impersonation, and online fraud
Attackers frequently create fake websites, social media profiles, or apps pretending to be legitimate organizations to steal customer data or money.
CTM360 detects these threats and enables fast takedowns of phishing sites, fraudulent domains, and malicious apps.

3. Threats on the surface, deep, and dark web
Sensitive company information, leaked credentials, or attack planning often appears on hidden parts of the internet.
CTM360 continuously monitors open sources, deep web, and dark web channels to identify threats before they lead to real incidents.

4. Fragmented cybersecurity tools and alert overload
Many organizations use multiple security tools that generate huge volumes of alerts but lack context.
CTM360 consolidates capabilities such as digital risk protection, threat intelligence, attack surface management, and monitoring into one platform, reducing complexity and improving response speed.

  ### 8. Strong Monitoring and Clear Case Workflow with Responsive Support

**Rating:** 5.0/5.0 stars

**Reviewed by:** Nora A. | Cybersecurity Specialist, Small-Business (50 or fewer emp.)

**Reviewed Date:** February 02, 2026

**What do you like best about CTM360?**

Strong monitoring and good case handling. The platform helps us detect impersonation faster, the case workflow is clear and the support team is responsive when we need help or clarification.

**What do you dislike about CTM360?**

There are a lot of features in the portal, which is good, but it can feel overwhelming, and navigation is not always straightforward.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 helps us detect and respond to external brand abuse such as phishing pages, impersonation domains/accounts, and rogue apps. Instead of relying on manual searching, we get centralized monitoring and case tracking.

  ### 9. CTM Review

**Rating:** 3.5/5.0 stars

**Reviewed by:** Twapandula H. | Small-Business (50 or fewer emp.)

**Reviewed Date:** December 01, 2025

**What do you like best about CTM360?**

like that the platform helps identify exposed assets, misconfigurations, and digital risks quickly, enabling us to take proactive action. The interface is clean, the alerts are timely, and the platform makes it easy to see how our organization appears from a hacker’s point of view.

**What do you dislike about CTM360?**

While CTM360 is a valuable platform, some areas could be enhanced. Reports generated can sometimes lack full detail regarding risk description, impact, and remediation guidance. In some cases, findings would benefit from clearer asset-level context, such as mapping each risk directly to its associated IP, domain, or system. Additionally, some country-level intelligence feels generic, and deeper localization would strengthen situational awareness for national stakeholders like CSIRTs and CERTs.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 helps us address the challenge of limited visibility into our external attack surface. It identifies exposed assets, misconfigurations, and digital risks that would otherwise remain unnoticed. This is especially important for a CSIRT environment where monitoring public-facing infrastructure and online threats is essential.

  ### 10. Exceptional Threat Visibility and Support

**Rating:** 4.5/5.0 stars

**Reviewed by:** Shahryar M. | Senior Pre-Sales Executive

**Reviewed Date:** November 26, 2025

**What do you like best about CTM360?**

I love how CTM360 offers a strong and comprehensive digital risk protection platform with excellent visibility across external threat surfaces. I appreciate their proactive and efficient threat intelligence, brand monitoring, and takedown capabilities that help organizations stay ahead of emerging cyber risks. The platform is user-friendly and easy to navigate, which significantly enhances the overall experience. Their support team is also exceptional, being very responsive and professional. I particularly value the engagement of their leadership when dealing with clients and partners, which adds a personal touch to their service. Moreover, the threat intelligence feeds are incredibly timely, contextual, and provide actionable insights that help detect and mitigate risks efficiently. The Brand Monitoring and External Attack Surface Discovery features are crucial for providing continuous visibility into exposed assets, allowing us to identify risks before they can be exploited. Additionally, the initial setup of CTM360 was quite easy and quick, taking about an hour to complete.

**What do you dislike about CTM360?**

Overall the platform works well, however new features could be introduced to make the tool more worth it. Specifically, I would like to see advanced alert prioritization, risk scoring, and customizable dashboards.

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 to identify and manage external threats, providing continuous visibility across digital footprints. It helps detect and mitigate risks efficiently with timely, actionable insights, strengthening our cybersecurity and reducing digital exposure.

  ### 11. Effortless Security Monitoring, Outstanding Support

**Rating:** 5.0/5.0 stars

**Reviewed by:** Nagendra S. | Head of Network Infrastructure

**Reviewed Date:** November 26, 2025

**What do you like best about CTM360?**

I appreciate CTM360's approach to customer service, particularly their understanding of our requirements, which ensures that the service is tailored to our specific needs. The platform's Hackerview asset page stands out for its effectiveness in providing critical information, and their summary reports are invaluable for delivering insights to our Executive Management in a clear and concise manner. Additionally, the initial setup was very easy, allowing us to quickly integrate the solution into our operations. My overall satisfaction with CTM360 is reflected in my willingness to recommend the platform with the highest score of 10 out of 10.

**What do you dislike about CTM360?**

I would prefer CTM360 to follow up on the issues that are pending for remediation and keep us engaged. This lack of proactive follow-up can leave me feeling as if there's a gap in the support and oversight necessary to ensure vulnerabilities are addressed promptly.

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 to monitor our infrastructure, providing vulnerability insights and remediation steps, enhancing our security posture.

  ### 12. The support is great, when required to takedown, they resolved tge issue promptly

**Rating:** 5.0/5.0 stars

**Reviewed by:** hasib a. | Unit Head- Cyber Intelligence and SOC, Enterprise (> 1000 emp.)

**Reviewed Date:** November 12, 2025

**What do you like best about CTM360?**

The dashboard, it is easy to understand by non-technical person as well, specially executives.

**What do you dislike about CTM360?**

It would be great, if they provide more insights n from dark web.

**What problems is CTM360 solving and how is that benefiting you?**

To takedown malicious or adversary who are threat to our brand.

  ### 13. Comprehensive Asset Protection with Instant Remediation Feedback

**Rating:** 4.5/5.0 stars

**Reviewed by:** Tumane M. | CSIRT Manager, Mid-Market (51-1000 emp.)

**Reviewed Date:** November 19, 2025

**What do you like best about CTM360?**

CTM360 provides a thorough assessment of my organization's digital assets. With CTM360, I have a clear overview of all internet-facing assets, allowing vulnerabilities to be identified and addressed quickly and efficiently. The feedback on remediation efforts is immediate, and their support team is always available, and is also proactive. They are able to initiate immediate scans that reflect the most up-to-date status. We are able to also share the threat intel, to which we also share with our constituents.  The platform is user friendly for use.

**What do you dislike about CTM360?**

I feel that having greater control would be much more valuable than simply being able to remediate. For instance, I would like the ability to manage my assets list more effectively. If my company owns multiple assets across different domains, I should have the option to determine which of these assets influence the rating of my company profile, according to my own risk matrix. Is it possible  to add a pentest module? That would be highly appreciated.

**What problems is CTM360 solving and how is that benefiting you?**

CTM is helping us take a more proactive approach to our incident handling operations. It supports us in addressing issues that could potentially be exploited if they are not resolved promptly.

  ### 14. Robust Brand Protection with Powerful Takedown and Supportive Team

**Rating:** 5.0/5.0 stars

**Reviewed by:** Ahmed  R. | Head of Information Security and Cybersecurity, Enterprise (> 1000 emp.)

**Reviewed Date:** April 23, 2026

**What do you like best about CTM360?**

CTM360 platform offers a robust solution for brand protection and dark web monitoring.

What I like most is its powerful takedown capability, especially in cases where other solutions have failed. The team is also very supportive: they track incidents closely and handle matters with urgency.

**What do you dislike about CTM360?**

There’s always room for improvement. At the moment, though, I can’t think of anything I dislike about CTM360.

**What problems is CTM360 solving and how is that benefiting you?**

Brand impersonation, Dark web monitoring especially the website take down

  ### 15. Effortless Implementation and Intuitive Features

**Rating:** 5.0/5.0 stars

**Reviewed by:** Vince Jason V. | Mid-Market (51-1000 emp.)

**Reviewed Date:** November 17, 2025

**What do you like best about CTM360?**

There's no need for a deployment. Can be easily implemented within the threat intel team. Additionally, CTM360's features are great in terms of being able to understand them easily.

**What do you dislike about CTM360?**

None that I can think of right now. I guess I'm fully satisfied with the solution

**What problems is CTM360 solving and how is that benefiting you?**

As my client is a holding company with multiple brand, usingASM from a solution like CTM360 significantly enhances the management of cyber risk across its diverse subsidiaries. It provides a unified, continuous view of the external attack surface for all portfolio companies, which is crucial since holding companies are often judged by the security posture of their weakest link. This central visibility allows the parent company's security team to proactively identify, prioritize, and remediate vulnerabilities—such as misconfigured cloud assets, exposed APIs, or shadow IT—consistently across the entire corporate structure, ensuring governance and compliance standards are maintained, and ultimately reducing the likelihood of a brand-damaging security incident affecting any of its ventures.

  ### 16. Intuitive Threat Monitoring with Fast Support

**Rating:** 4.5/5.0 stars

**Reviewed by:** Verified User in Banking | Mid-Market (51-1000 emp.)

**Reviewed Date:** July 02, 2025

**What do you like best about CTM360?**

I find the GUI of CTM360 exceptionally intuitive, thanks to its multi-module approach that clearly highlights different information based on the operational context. This makes navigating the platform seamless and enhances my understanding of complex data. The dashboard's clean and well-maintained data structure ensures clarity and efficiency in monitoring threats. I also appreciate the responsiveness of the CTM360 team, who act quickly and reliably, providing meaningful insights through chat or direct calls, which significantly enhances my experience. The initial setup was very easy, making it a convenient solution to deploy. Combined with these aspects, CTM360 effectively addresses challenges in threat intelligence and active threat monitoring, making it an invaluable tool for our operations.

**What do you dislike about CTM360?**

I find the AI integration with CTM360 to be somewhat clumsy, as it doesn't seamlessly fit into the operational workflow. The AI feels like it's still in early development mode, lacking the polish and efficiency expected from a mature feature. Furthermore, there is a need for better understanding and handling of the operational context, especially when highlighting vulnerabilities. This gap often leads to false positives or recurring alerts across multiple targets that could actually represent the same issue, creating unnecessary noise and potentially obscuring genuine threats.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 actively monitors and notifies us of external threats, informs us about vulnerabilities, and mitigates fraud. It enhances our understanding of industry challenges and increases operational security.

  ### 17. Effortless Asset Monitoring with Stellar Take Down Service

**Rating:** 4.5/5.0 stars

**Reviewed by:** Ts. Sau-Wern T. | Director/Chief Engineer - Head of Platform Engineering - Technology Division

**Reviewed Date:** November 16, 2025

**What do you like best about CTM360?**

I find CTM360 incredibly beneficial for a variety of reasons. Firstly, it provides an excellent monitoring system for our public-facing assets, ensuring we stay informed about risks associated with our participants and keeping us updated with the latest news on threats and claims from potential threat actors. This is crucial for maintaining the security integrity of our operations. The feature that stands out to me is the takedown service, which is one of the fastest and most efficient in the industry. It allows us to react quickly to discovered vulnerabilities, considerably mitigating potential risks. Additionally, I appreciate having a comprehensive view of all our public-facing assets presented in a unified, singular interface—making it easy to manage and evaluate our security posture. I also admire CTM360 for its regular improvements to the platform, ensuring it stays ahead in addressing our cybersecurity needs. The initial setup was impressively straightforward, warranting a rating of 9 out of 10 for ease, reflecting its user-friendliness. Overall, my high confidence in recommending CTM360 is demonstrated by my scoring of 9 out of 10 for recommending it to others.

**What do you dislike about CTM360?**

The is a limit of how many 3rd parties on the supply chain one can monitor.

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 to monitor public assets, assess risks, receive threat news, and react quickly to vulnerabilities. The platform's fast takedown service provides a comprehensive view of assets, enhancing security measures efficiently.

  ### 18. Easy to use, a holistic approach to external perimeter monitoring

**Rating:** 5.0/5.0 stars

**Reviewed by:** Ramsès D.

**Reviewed Date:** November 16, 2025

**What do you like best about CTM360?**

I greatly appreciate the ease of use of CTM360 and its different approach compared to other solutions. CTM360 focuses on the essentials while offering comprehensive and holistic coverage. Features like 'Hacker view', 'Deep scan', external attack surface management, CTI, Darkweb monitoring, third-party risk management, and interventions allow us to effectively manage our clients' attack surface and take corrective actions quickly. The product helps us automate the management and monitoring of the external perimeter, which significantly reduces our workload, especially since we manage dozens of clients. Its efficiency allows us to produce comprehensive reports quickly and be proactive against threats. I particularly like the 'hackerview' which reveals vulnerabilities and TTPs, positioning CTM360 as much more relevant than traditional IOCs. The frequently provided reports are very relevant for identifying current trends and preparing for them. Finally, the customer service with Salman Anwar is exemplary in terms of availability and responsiveness. The initial implementation was easy thanks to the turnkey solution provided by the CTM360 team.

**What do you dislike about CTM360?**

Improve the malware analysis section to have many more reports. Have a sandbox to analyze samples and generate a report. Also, be able to conduct research on a wider variety of malware.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 automates the management of cyber threats, facilitates CTI and malware analysis, and offers relevant reports. It simplifies attack surface monitoring, optimizes corrective actions, and allows for seamless incorporation of TTPs and IOCs into our systems.

  ### 19. Senior Cybersecuity Manager

**Rating:** 5.0/5.0 stars

**Reviewed by:** Shaahid M H. | Senior Manager, Cyber Security, Mid-Market (51-1000 emp.)

**Reviewed Date:** December 09, 2025

**What do you like best about CTM360?**

Zero Touch on-boarding Log in and go. There is no complex configuration or manual entry of domains required. The platform automatically maps your entire digital footprint—including hidden Shadow IT—delivering immediate value and visibility from day one.
Efficient, Managed Takedowns
takedowns handled entirely by their professional analyst team. They navigate the complex legal requirements to kill phishing sites and fake profiles quickly, acting as a seamless extension of your own SOC.

Customer-Centric
They actually listen. CTM360 is known for treating clients as partners rather than ticket numbers. They rapidly build and deploy new features based on your direct feedback and specific reporting needs.

**What do you dislike about CTM360?**

Nothing to note we’re satisfied with the solution.

**What problems is CTM360 solving and how is that benefiting you?**

Their HackerView module acts as a continuous, external scanner that finds everything linked to our business. this have benefit from hoping to know our permeter to knowing it

  ### 20. Exceptional Security Solution with Seamless Setup

**Rating:** 5.0/5.0 stars

**Reviewed by:** mehzad s.

**Reviewed Date:** November 13, 2025

**What do you like best about CTM360?**

I find CTM360 incredibly beneficial for securing our organizational operations. The software is instrumental in resolving executive impersonation and other issues across more than 100 social media platforms, which is essential for protecting our digital footprint. I appreciate that CTM360 offers a comprehensive end-to-end solution, going beyond mere identification of security problems to actively resolving them. The ability to assess the security maturity level of third-party vendors without accessing their actual infrastructure is another standout feature. This capability provides unbiased insights, helping us make informed decisions regarding strategic partnerships and integrations, especially vital in combating supply chain attacks. I value this transparency as it allows us to verify claims made by potential partners. Additionally, the user-friendly, interactive interface enhances usability, ensuring quick setup and easy adaptation within just one to two days. Our executives have strongly praised the CTM360 dashboard for its clarity and efficacy in orienting them to our security posture, demonstrating its value in strategic decision-making. Overall, I would rate CTM360 a perfect 10 for its reliability, comprehensive service, and invaluable security insights.

**What do you dislike about CTM360?**

no

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 to monitor our digital footprint and resolve issues like executive impersonation and fraudulent activities on social media. It provides end-to-end solutions by not only detecting but also resolving issues in a timely manner.

  ### 21. Effortless Setup, Intuitive to Use

**Rating:** 4.0/5.0 stars

**Reviewed by:** Lemmy Mwanza M. | Head Information Security &amp; Data Protection /CISO

**Reviewed Date:** November 27, 2025

**What do you like best about CTM360?**

I really appreciate the ease of use that CTM360 offers. It's incredibly straightforward, and there are no costs associated with training the team on how to use it because everything is so intuitive. This simplicity translates to significant time and resource savings, allowing us to focus on the core aspects of our work without worrying about learning how to navigate a complex system. Furthermore, the initial setup of CTM360 is hassle-free, as it requires no implementation. This efficiency in getting started allows us to quickly integrate it into our processes and begin leveraging its features without any downtime. Overall, CTM360's user-friendly design and efficient setup are instrumental in enhancing our cybersecurity operations.

**What do you dislike about CTM360?**

CTM360 doesn't cover all security domains, necessitating the use of additional tools to achieve comprehensive security coverage.

**What problems is CTM360 solving and how is that benefiting you?**

I find CTM360 easy to use, eliminating training costs and simplifying setup without implementation.

  ### 22. Effortless Setup and Outstanding Support

**Rating:** 5.0/5.0 stars

**Reviewed by:** Yakubu A. | Chief Information Security Officer (CISO), Mid-Market (51-1000 emp.)

**Reviewed Date:** November 27, 2025

**What do you like best about CTM360?**

The product stands out for its ease of use and straightforward implementation process. It offers a wide range of features, and the customer support has been reliable and helpful.

**What do you dislike about CTM360?**

I really appreciate everything this platform offers. However, the cost might be a barrier for some companies.

**What problems is CTM360 solving and how is that benefiting you?**

External Attack Surface Management is a crucial aspect of cybersecurity, focusing on identifying and monitoring all internet-facing assets that could be vulnerable to threats. By continuously scanning for potential exposures, it helps organizations stay ahead of attackers and reduce the risk of breaches. This approach is essential for maintaining a strong security posture in today’s digital landscape.

  ### 23. Seamless Brand Protection with Top-Notch Threat Intelligence

**Rating:** 5.0/5.0 stars

**Reviewed by:** hassan ali s. | Enterprise (> 1000 emp.)

**Reviewed Date:** May 11, 2026

**What do you like best about CTM360?**

I really like CTM360 for social media. It's something that stands out to me. Also, the entire team works well with it, which I appreciate. Additionally, the initial setup of CTM360 was very easy.

**What do you dislike about CTM360?**

No thing

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 for brand protection, managing card numbers, attack surfaces on social media, and threat intelligence.

  ### 24. Bittersweet Access for Community Edition End-Users

**Rating:** 3.5/5.0 stars

**Reviewed by:** Verified User in Telecommunications | Small-Business (50 or fewer emp.)

**Reviewed Date:** November 18, 2025

**What do you like best about CTM360?**

The availability of the Community Edition enables limited access to the platform. As an end user, I found that this version is sufficient to inspire confidence in potential customers.

**What do you dislike about CTM360?**

The community edition has its understandable limitations, but I wish there were more features available to preview. It would be helpful if a trial period with full access could be offered.

**What problems is CTM360 solving and how is that benefiting you?**

By comparing this with our current in-production TI platform, I was able to identify certain gaps and areas where improvements could be made, as well as compare and contrast the different analysis methods and risk rating systems. Overall, I find CTM360 to be more advanced, particularly because it automates many tasks. This automation allows analysts like myself to spend less time on incident handling and dedicate more attention to research and threat hunting.

  ### 25. Solid for security, but slow notifications

**Rating:** 4.5/5.0 stars

**Reviewed by:** Modibo S.

**Reviewed Date:** November 25, 2025

**What do you like best about CTM360?**

I particularly appreciate the Hackview, Threatcover, and Cyna services offered by CTM360. These features provide me with effective coverage in terms of cybersecurity, meeting my expectations for protection and analysis of potential threats. The fact that the application encompasses these different services allows me to manage various aspects of cybersecurity in an integrated manner, which greatly simplifies the process. Furthermore, my level of satisfaction is quite high, as demonstrated by my rating of 9 out of 10 in terms of recommendation to a friend or colleague.

**What do you dislike about CTM360?**

I am frustrated by the frequent delay of mobile OTP codes, which can be very inconvenient for uninterrupted use. Additionally, notifications about events are often delayed, which can cause problems when a quick response is necessary.

**What problems is CTM360 solving and how is that benefiting you?**

n/a

  ### 26. CTM360 is the Best Cyber Security Partner you can have

**Rating:** 5.0/5.0 stars

**Reviewed by:** Jude N. | Assistant Manager, Security Operations &amp; Incident Management, Enterprise (> 1000 emp.)

**Reviewed Date:** July 23, 2025

**What do you like best about CTM360?**

CTM360 independently identifies and protects all our public or online assets without us providing them any details.  The only thing we provide them is our company domain name and they do all the rest (identifying all our online assets and securing them).  They are professional, experienced, responsible and very responsive to any requests we make (such as takedown of fake sites or applications).

**What do you dislike about CTM360?**

There is nothing that I can think of so far.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 provides us a fully outsourced cost effective detection and takedown of external cyber Threats to our organisation.  They are very responsive and accommodating of our request.  They identify all our public assets even without us providing them any input (except providing them the domain names we own).  They search the dark web for threats to us and data leaks, identify impersonations, fake duplicate sites, and other threats and go ahead with takedowns, only involving us in case required for some confirmations.  And they provide us cyber threat feeds (similar to FS-ISAC), along with search tools.

  ### 27. Very useful digital threat management platform

**Rating:** 4.0/5.0 stars

**Reviewed by:** Saif U. | Mid-Market (51-1000 emp.)

**Reviewed Date:** December 08, 2025

**What do you like best about CTM360?**

It's External Attack Surface Exposure Management module "HackerView" is very good, and Digital Threat Protection module "CyberBlindspot" ability to detect and takedown brand impersonation attempts across multiple platforms over the internet and dark web is also extremely useful.

**What do you dislike about CTM360?**

CYNA module needs to authenticate threat actor claims more rigorously before publishing it. Further, if claim pertains to CTM's customer, then they should be notified expediently, and their explicit consent should be sought before publishing it.

**What problems is CTM360 solving and how is that benefiting you?**

Brand protection and external exposure management.

  ### 28. Exceptional Support and Outstanding Brand Protection

**Rating:** 5.0/5.0 stars

**Reviewed by:** Abdulla S. | Supervisor Information Security, Mid-Market (51-1000 emp.)

**Reviewed Date:** November 18, 2025

**What do you like best about CTM360?**

They are very fast in responding to your queries. They stand out with their brand protection product. They're customer service is exceptional and they have regular meetings to ensure quality. We regularly use the product as part of our security and we have no issues in trying out new features or implementation

**What do you dislike about CTM360?**

Looking forward to seeing further integrations in the future. The product could be more user friendly

**What problems is CTM360 solving and how is that benefiting you?**

Most helpful in their fraud detection and brand protection but we are also using it to monitor our internet exposure

  ### 29. Effective Threat Intelligence & Website Takedown Platform

**Rating:** 3.5/5.0 stars

**Reviewed by:** Verified User in Financial Services | Mid-Market (51-1000 emp.)

**Reviewed Date:** September 01, 2025

**What do you like best about CTM360?**

CTM360 provides an efficient platform for detecting phishing websites, impersonation domains, and brand abuse incidents. The dashboard is user-friendly, offering clear incident tracking, fast takedown request submission, and detailed reporting. The threat intelligence coverage is broad, making it easier to monitor potential risks and respond proactively.

**What do you dislike about CTM360?**

So far, I don’t have any major dislikes. The platform has been stable, reliable, and effective in detecting threats and handling takedowns.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 helps us detect and respond to phishing attacks, impersonation websites, and fraudulent domains more efficiently. The platform provides real-time threat intelligence and automated alerts, which allow us to act quickly and request takedowns before threats escalate. It also strengthens brand protection by monitoring for fraudulent activities that could harm our organization’s reputation, ensuring better security for our customers and stakeholders.

  ### 30. Effective Takedowns and Brand Protection

**Rating:** 5.0/5.0 stars

**Reviewed by:** Carlos T. | Information Security Officer

**Reviewed Date:** November 27, 2025

**What do you like best about CTM360?**

I really appreciate how CTM360 swiftly and effectively takes down deceptive sites that could harm our brand reputation. Their efficiency in this area is remarkable and crucial for protecting our corporate image from impersonation attempts. Additionally, their customer-centric approach makes them very easy to work with, which enhances our overall experience with them. I also find the initial setup of CTM360 to be incredibly fast due to its SaaS nature, which allowed for seamless integration with our existing systems. Overall, the features we use within CTM360 are well-matched, well-defined, and mature, meeting our organizational needs effectively.

**What do you dislike about CTM360?**

None so far

**What problems is CTM360 solving and how is that benefiting you?**

I find CTM360 effectively removes false sites, thus preserving our brand reputation and mitigating reputational risk from deceptive sites.

  ### 31. Love Everything About It

**Rating:** 4.5/5.0 stars

**Reviewed by:** Omar A. | Information Security Manager, Enterprise (> 1000 emp.)

**Reviewed Date:** April 27, 2026

**What do you like best about CTM360?**

All thinks in ctm360 are amaizing and we like it

**What do you dislike about CTM360?**

Late in some times at take down and some event entred manually not detected by ctm360

**What problems is CTM360 solving and how is that benefiting you?**

Wr sole the face facebook, whatapp and fake app stores accounts that impersonating the bank identity

  ### 32. Rock-Solid Protection with Zero false Positives

**Rating:** 5.0/5.0 stars

**Reviewed by:** samer s.

**Reviewed Date:** February 08, 2026

**What do you like best about CTM360?**

I really like CTM360's great support team and appreciate that it delivers almost zero false positives. The quality with CTM360 is much better compared to what my team experienced with ZeroFox. Additionally, the initial setup of CTM360 was very easy for my team.

**What do you dislike about CTM360?**

Nothing

**What problems is CTM360 solving and how is that benefiting you?**

I use CTM360 for brand protection and staying updated on cyber threats. It helps solve brand impersonation, keeps me informed about the latest threats and news, detects threat actor claims, and identifies data leaks.

  ### 33. A Platform with Proficient Opportunities and noticeable Threats visibility

**Rating:** 5.0/5.0 stars

**Reviewed by:** Faisal M. | General Manager, Offensive Security Research Product &amp; Technology Division, Enterprise (> 1000 emp.)

**Reviewed Date:** June 29, 2025

**What do you like best about CTM360?**

CTM360  offers an all-in-one external threat management solution that integrates distinctly separate functions such as intelligence gathering, monitoring, protection against digital risks, and even takedown services. Personally, I appreciate their surfacing, deep, and dark web threat neutralization cleansing processes: they are preemptive. The speed at which malicious content is removed is astonishing; the platform quite literally activates a blistering countermeasure that ensures prompt preservation of system integrity. The platform's interface is user-friendly and supports training interactive systems to enhance responsiveness and proficiency in automated computer assistance.

**What do you dislike about CTM360?**

The variety of features that CTM360 has to offer are undeniably useful, however the amount of modules and dashboards available may be overwhelming at first. Advanced analytics and some reporting views could use more tailoring in terms of filters or customization to make insights more actionable. Furthermore, during peak usage times, the platform’s performance tends to lag which presents an opportunity to work on integration with third party SIEM or SOAR platforms.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 has been instrumental in solving some of the challenges we face with external threat detection, brand misuse, and overall digital risk exposure. It identifies phishing domains, impersonation attempts and data leaks on the surface, deep web and dark web. The takedown capability has been particularly useful in rapidly removing vigilant content aimed at our brand and customers. With CTM360 integrating multiple vectors into one platform, our response time for many processes has improved alongside our organizational security stability. Because it streamlines processes, CTM360 reduces manual tasks by sending out real-time notifications as well as automated remediation workflows which enable reallocation of attention to more pressing matters.

  ### 34. Comprehensive and Reliable Digital Risk Protection Platform

**Rating:** 5.0/5.0 stars

**Reviewed by:** Maha B. | Senior Resilience Analyst, Mid-Market (51-1000 emp.)

**Reviewed Date:** June 21, 2025

**What do you like best about CTM360?**

CTM360 stands out as a highly reliable platform that effectively combines brand protection, anti-fraud, and external threat intelligence in one unified solution. It offers exceptional detection quality, accurately identifying threats with minimal false positives. One of its strongest advantages is the speed and efficiency of response — the CTM360 team is always quick to take action and mitigate threats, ensuring our digital assets remain secure. Overall, it’s a robust solution that delivers real value in the evolving threat landscape.

**What do you dislike about CTM360?**

However, there's room for improvement in the takedown process. While effective in many cases, the platform would benefit from expanding the range of websites and platforms it can take down content from. Broader coverage would make the solution even more powerful.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 is helping us address brand impersonation, phishing, fraudulent domains, and external threat exposures across the surface, deep, and dark web. By consolidating these threat areas into one platform, it significantly reduces our manual monitoring efforts and improves our ability to act quickly on threats. The automated detection and fast response allow us to protect our brand reputation, reduce risk of customer fraud, and prevent data exposure, all while saving time and resources for the security team

  ### 35. So user friendly and fit for the Startup mode.

**Rating:** 5.0/5.0 stars

**Reviewed by:** Khalid N. | Chief Risk Officer, Small-Business (50 or fewer emp.)

**Reviewed Date:** July 02, 2025

**What do you like best about CTM360?**

Very practical solution with a very powerful notification system. Keeps me informed about the latest alerts, issues and threats  in the cyber word. the continuous scanning mechanism it offers keeps alerts without needing to worry about new issues being uncovered. We have been growing our business gradually and with that came along a lot of malware, threats and tentative to steal our identity , use our names and make harm to our potential customers. CTM360 help us scale up this business while being alert about any

**What do you dislike about CTM360?**

There are so many feature in the solution that you get lost sometimes. Just working on wrapping up the solution a bit can be very beneficial to all.

**What problems is CTM360 solving and how is that benefiting you?**

We are having a live scan of all of our assets and social media accounts and keep us alert and safe thanks to the different features that are there.

  ### 36. CTM360: Exceptional Availability and Support

**Rating:** 5.0/5.0 stars

**Reviewed by:** Cheikh Oumar Elimane L.

**Reviewed Date:** December 04, 2025

**What do you like best about CTM360?**

I had a very good experience with CTM360, as it allowed us to have a holistic view of our attack surface. The support provided is of very good quality. I really appreciate their availability and professionalism. They are very responsive and take our requests into account. The tool complements our traditional tools well and the initial setup was quick and efficient.

**What do you dislike about CTM360?**

nothing to report at the moment

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 gives me a holistic view of our attack surface. The support is of very good quality, and they are very responsive, taking our requests into account. This complements the traditional tools we use.

  ### 37. The Best Takedown Team and Effortless Implementation with CTM 360

**Rating:** 5.0/5.0 stars

**Reviewed by:** Eliando E. | Mid-Market (51-1000 emp.)

**Reviewed Date:** December 01, 2025

**What do you like best about CTM360?**

The team, speaking about Threat Intelligence not always about the Technology, however the person behin this Technology, CTM 360 have a teams including the analyst that working for us with a lot of improvement and helpful, especially ctm 360 have unlimited takedown that help our organization to avoid cyber attacks that can affect the company's reputation, and ctm 360 very easy to implement

**What do you dislike about CTM360?**

The pricing little pricy, however there is a price for quality

**What problems is CTM360 solving and how is that benefiting you?**

CTM 360 helps us to always be concerned about the reputation of our company and clients in the world of cybersecurity, especially from the public eye.

  ### 38. Comprehensive Threat Visibility with an Intuitive Dashboard

**Rating:** 4.5/5.0 stars

**Reviewed by:** Mohammed A. |  International Advisory Board Member For CCISO, Mid-Market (51-1000 emp.)

**Reviewed Date:** January 12, 2026

**What do you like best about CTM360?**

It offers you comprehensive external threat and digital asset visibility through an intuitive dashboard.

**What do you dislike about CTM360?**

Nothing as of know, all model are good and keep improvement in quarterly bases

**What problems is CTM360 solving and how is that benefiting you?**

Maintain proactive surveillance of all our external Assets and promptly address fraudulent instances.

  ### 39. Seamless and reassuring experience, giving us confidence in our digital presence

**Rating:** 5.0/5.0 stars

**Reviewed by:** Leen  B. | CTI Lead, Mid-Market (51-1000 emp.)

**Reviewed Date:** July 21, 2025

**What do you like best about CTM360?**

It’s efficient, reliable, and always a step ahead. When someone mentions ‘brand protection,’ the first name that comes to mind is CTM360. But to me, it’s more than just brand protection, it’s a digital Swiss Army knife. From takedowns to threat intelligence and proactive monitoring, CTM360 has consistently delivered a seamless, intelligent, and comprehensive experience. It’s a platform that evolves with the threat landscape—and one I’ve come to rely on fully.

**What do you dislike about CTM360?**

While the platform performs well, response times during high-load periods can be slower than expected

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 is helping us address the challenges of external threat visibility and digital risk management. By offering proactive brand protection, surface web monitoring, dark web intelligence, and takedown capabilities, the platform allows us to detect and mitigate threats before they escalate

  ### 40. Really Good Dashboards

**Rating:** 4.5/5.0 stars

**Reviewed by:** Cinoj N. | Mid-Market (51-1000 emp.)

**Reviewed Date:** April 26, 2026

**What do you like best about CTM360?**

The dashboards are really good and simple

**What do you dislike about CTM360?**

Mobile version should be made similar to web version

**What problems is CTM360 solving and how is that benefiting you?**

Brand protection, External Cyber Risk Score

  ### 41. CTM360 All in one box

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Financial Services | Mid-Market (51-1000 emp.)

**Reviewed Date:** August 23, 2025

**What do you like best about CTM360?**

We started using CTM360 with just one entity, and after seeing the value it brought, we decided to roll it out to our other subsidiaries as well. It’s made a big difference in how we manage our external threats.
Before this, we were using a dedicated DMARC email security platform, which was very helpful at the time. But with CTM360, we’ve got a much broader solution that covers way more than just email—it's been a solid upgrade for our overall digital risk protection.

**What do you dislike about CTM360?**

There is nothing that I dislike about CTM360

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 has really helped us with brand protection, threat intelligence, and managing our external attack surface. It gives us a clear view of what’s exposed online and alerts us to any potential threats. Their support team is quick to respond, and the platform has made our digital security much stronger.

  ### 42. Great Asset Visibility, But Ticket Control Needs Improvement

**Rating:** 3.5/5.0 stars

**Reviewed by:** Verified User in Security and Investigations | Mid-Market (51-1000 emp.)

**Reviewed Date:** November 25, 2025

**What do you like best about CTM360?**

It provides a broad overview of public-facing assets and enables a faster, more proactive response to incidents and potential vulnerabilities within an organization public cyber landscape.

**What do you dislike about CTM360?**

The platform has the potential to provide much more when it comes to ticket control for users. Ideally, users should be able to decide which assets influence their score, no matter thier license type, based on their own cyber risk matrix.

**What problems is CTM360 solving and how is that benefiting you?**

This tool assists with automating the process of collecting and spreading threat intelligence. It is also useful for monitoring the cyber space of third-party companies.

  ### 43. Seamless Integration and Expert Recommendations Elevate Security

**Rating:** 5.0/5.0 stars

**Reviewed by:** Luka M. | Cyber Security Engineer, Small-Business (50 or fewer emp.)

**Reviewed Date:** November 26, 2025

**What do you like best about CTM360?**

Hackerview and DMARC360 have been valuable for me, especially with the recommendations they provide regarding vulnerabilities in my assets. I also appreciate the prompt responses I receive from their Sales Team. Additionally, I find that their integration with my other vulnerability scanners works smoothly, making the overall experience more efficient.

**What do you dislike about CTM360?**

At this point, I haven't found anything to dislike. Everything has been satisfactory so far.

**What problems is CTM360 solving and how is that benefiting you?**

Addressing the issue of patching and detecting vulnerabilities is crucial. Ensuring that vulnerabilities are identified and patched promptly helps maintain the security and stability of systems.

  ### 44. Exceptional Quality and Outstanding Support

**Rating:** 5.0/5.0 stars

**Reviewed by:** Khulud A. | Cyber Security Operations Manager, Mid-Market (51-1000 emp.)

**Reviewed Date:** December 01, 2025

**What do you like best about CTM360?**

The well design, the outstanding support, and the exceptional quality they provide.

**What do you dislike about CTM360?**

Nothing to be mentioned here; we are very happy with the solution.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 enhances our security by providing proactive external threat detection, rapid incident response for impersonation sites, and full visibility of our attack surface.

  ### 45. Review CTM360 after using for 1 Year period.

**Rating:** 4.0/5.0 stars

**Reviewed by:** Watthanachai K. | Consulting IT Specialist, Small-Business (50 or fewer emp.)

**Reviewed Date:** July 02, 2025

**What do you like best about CTM360?**

Most helpful from CTM360 is take down phishing domain very fast for my customer and could finding and detect Brand Impersonation focus on Social media app with fake content.

**What do you dislike about CTM360?**

Least helpful is data exposure on repository with another platform such as Gitlab , Bitbucket in case some customer using above tool will could not detect.

**What problems is CTM360 solving and how is that benefiting you?**

In the past take down period is big issue for my customer because take around 5-7days and customer have complain on this issue , However when changing to use "Brand Protection" of CTM360 service , CTM360 team could help my team action quickly on take down phishing URL or fake content URL related with my customer domain name. average complete action take down around 2-3 days.

  ### 46. A Truly Professional and Reliable Cybersecurity Partner

**Rating:** 5.0/5.0 stars

**Reviewed by:** Abdulmohsen A. | Sr.Head of Cybersecurity| Data management office, Mid-Market (51-1000 emp.)

**Reviewed Date:** April 30, 2025

**What do you like best about CTM360?**

What I like best about CTM360 is their exceptional end-to-end service and unmatched professionalism across all teams. From their highly skilled technical support to their responsive and knowledgeable sales team, every interaction reflects a deep commitment to client success. Their platform is robust and intuitive, offering real-time threat visibility and effective digital risk protection. What truly sets CTM360 apart is the synergy within their team — whether it’s technical support, incident response, or account management, everyone works with precision, speed, and a customer-first mindset. It’s rare to find a cybersecurity partner that combines technology excellence with such a high level of human professionalism.

**What do you dislike about CTM360?**

To be honest, there’s very little to dislike about CTM360 given their professionalism and strong service delivery. If I had to mention something, it would be the desire to see even more localization or region-specific threat insights to further enhance relevance for entities in specific geographies. That said, their responsiveness and openness to feedback make it easy to communicate any needs or suggestions — and they act on them quickly.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 is helping us address several critical challenges related to external threat visibility, brand protection, and early threat detection. They provide proactive monitoring across the surface, deep, and dark web, which helps us identify threats before they escalate. Their takedown services also play a major role in minimizing the impact of phishing, impersonation, and data leakage attempts.

The benefit for us is clear: faster incident response, better protection of our digital identity, and reduced operational risk. Their unified platform simplifies threat management, allowing our internal teams to focus on strategic priorities while knowing that our external attack surface is being actively protected.

  ### 47. Fantastic

**Rating:** 3.5/5.0 stars

**Reviewed by:** Achein J. | Mid-Market (51-1000 emp.)

**Reviewed Date:** November 28, 2025

**What do you like best about CTM360?**

It’s easy to navigate and the graphics view of assets is great.

**What do you dislike about CTM360?**

I still have to learn more about how to use the platform for deep analysis

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 is helping me have a holistic view of my system security and it also provides solutions

  ### 48. Powerful EASM Capabilities and a Continuously Improving Platform That Delivers Real Value

**Rating:** 5.0/5.0 stars

**Reviewed by:** Verified User in Information Technology and Services | Small-Business (50 or fewer emp.)

**Reviewed Date:** November 17, 2025

**What do you like best about CTM360?**

CTM360 has proven to be one of the most comprehensive platforms for external attack surface management and digital risk protection. The EASM capabilities are truly impressive; providing deep visibility and actionable insights across digital assets. 

What stands out even more is the team’s commitment to continuously enhancing the platform with new features and improvements. It’s rare to see such consistent innovation and responsiveness. A great solution for any organization serious about proactive cybersecurity.

**What do you dislike about CTM360?**

There’s really nothing I can think of to dislike about CTM360.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 helps us gain full visibility over our external attack surface and detect digital threats before they turn into incidents. The EASM module is especially impressive;  it continuously identifies exposed assets, misconfigurations, and potential vulnerabilities that could be exploited.

  ### 49. Flexible Solution That Adds Real Value to Compliance

**Rating:** 5.0/5.0 stars

**Reviewed by:** Fahad F.  A. | CISO, Small-Business (50 or fewer emp.)

**Reviewed Date:** December 03, 2025

**What do you like best about CTM360?**

it's very flexible an added value to my regulatory compliance they appreciate partnership

**What do you dislike about CTM360?**

everything is in place nothing i dislike about it.

**What problems is CTM360 solving and how is that benefiting you?**

Vendor Management meets my SAMA CSF requirements, providing the compliance I need.

  ### 50. A Proactive Platform for External Threat Monitoring and Email Security

**Rating:** 4.0/5.0 stars

**Reviewed by:** Ebrima S. | Computer Security Analyst, Mid-Market (51-1000 emp.)

**Reviewed Date:** May 21, 2025

**What do you like best about CTM360?**

CTM360's HackerView platform provides unmatched visibility into our exposed digital assets and misconfigured email settings. Its clear remediation guidance and intuitive UI help our team quickly prioritize and resolve security risks. The support team’s engagement and resource library are also major strengths.

**What do you dislike about CTM360?**

While CTM360 offers comprehensive features, the learning curve for understanding all modules—especially email security metrics—can be steep for first-time users. Some reports could benefit from more contextual detail or severity scoring to help teams triage more efficiently. More tailored onboarding would be helpful.

**What problems is CTM360 solving and how is that benefiting you?**

CTM360 helps us identify and resolve external cyber risks like exposed assets, DMARC misconfigurations, and domain spoofing. By proactively detecting vulnerabilities and offering clear remediation steps, it enhances our cyber resilience, improves email security, and reduces the risk of exploitation—all from a single, easy-to-use platform.



- [View CTM360 pricing details and edition comparison](https://www.g2.com/products/ctm360-ctm360/reviews?section=pricing&secure%5Bexpires_at%5D=2026-05-13+08%3A34%3A24+-0500&secure%5Bsession_id%5D=ebdd2813-fb04-4481-a69e-2606b6de23d4&secure%5Btoken%5D=d4a5b2490323abe6cca432d5b61389004f4006b5c909f35efc43544f3c85039f&format=llm_user)
## CTM360 Integrations
  - [ConnectWise SIEM](https://www.g2.com/products/connectwise-siem/reviews)
  - [GitHub](https://www.g2.com/products/github/reviews)
  - [IBM Security QRadar Log Insights](https://www.g2.com/products/ibm-security-qradar-log-insights/reviews)
  - [IBM Security QRadar NDR](https://www.g2.com/products/ibm-security-qradar-ndr/reviews)
  - [LogRhythm SIEM](https://www.g2.com/products/exabeam-logrhythm-siem/reviews)
  - [Microsoft Power BI](https://www.g2.com/products/microsoft-microsoft-power-bi/reviews)
  - [Microsoft Teams](https://www.g2.com/products/microsoft-teams/reviews)
  - [Mobile](https://www.g2.com/products/google-mobile/reviews)
  - [Mobile Text Alerts](https://www.g2.com/products/mobile-text-alerts/reviews)
  - [OCI](https://www.g2.com/products/oci/reviews)
  - [SIRP](https://www.g2.com/products/sirp/reviews)
  - [Slack](https://www.g2.com/products/slack/reviews)
  - [Splunk Enterprise](https://www.g2.com/products/splunk-enterprise/reviews)
  - [Splunk Enterprise Security](https://www.g2.com/products/splunk-enterprise-security/reviews)
  - [TrendAI Vision One](https://www.g2.com/products/trendai-vision-one/reviews)
  - [Webhook Relay](https://www.g2.com/products/webhook-relay/reviews)

## CTM360 Features
**Diagnostics**
- Account Overview
- DMARC Alignment
- Analytics

**Detection**
- Bot Mitigation
- Real-Time Monitoring
- Alerts

**Identification**
- Reseller Database
- Monitoring
- Violations

**Functionality**
- Centralized Vendor Catalog
- Questionnaire Templates
- User Access Control

**Functionality**
- Monitoring - Deep Web
- Monitoring - Dark Web
- Analysis
- Ticketing
- Simple Search
- Leak Source
- Centralized Dashboard
- Real-Time Alerts

**Asset Management**
- Asset Discovery
- Shadow IT Detection
- Change Management

**Vulnerability Management - Digital Risk Protection (DRP) Platforms**
- Vulnerability Assessment
- Digital Footprint Mapping
- Fraud Detection
- Data Leak Detection
- Brand Protection

**Generative AI - Exposure Management Platforms**
- Predictive Analytics
- Automated Threat Detection

**Orchestration**
- Asset Management
- Security Workflow Automation
- Deployment

**Compliance**
- Policy Configuration
- Alerts
- Inbound Emails
- Outbound Emails

**Analysis **
- ID Analytics
- Intelligence Reporting
- Incident Reports

**Enforcement**
- Communication
- Plans
- Track

**Risk assessment**
- Risk Scoring
- 4th Party Assessments
- Monitoring And Alerts

**Monitoring**
- Gap Analysis
- Vulnerability Intelligence
- Compliance Monitoring
- Continuous Monitoring

**Incident Response Digital Risk Protection (DRP) Platforms**
- Threat Remediation
- Automated Reponses
- Incident Response Capabilities

**Risk Identification and Assessment - Exposure Management Platforms**
- Comprehensive Risk Assessment
- Advanced Analytics and Reporting

**Information**
- Proactive Alerts
- Malware Detection
- Intelligence Reports

**Protection**
- Threat Identifications
- Threat Interception
- Threat Removal
- Integrations

**Administration**
- Fraud Markers
- Transaction Scoring
- Blacklisting

**Risk Management**
- Risk-Prioritization
- Reconnaissance
- At-Risk Analysis
- Threat Intelligence

**Reporting and Analytics - Digital Risk Protection (DRP) Platforms**
- Threat Trends Analysis
- Risk Assessment Reports
- Customizable Dashboards

**Monitoring and Integration - Exposure Management Platforms**
- Integration and Data Consolidation
- Real-time Monitoring and Alerts

**Personalization**
- Endpoint Intelligence
- Security Validation

**Generative AI**
- AI Text Summarization

**Agentic AI - Fraud Detection**
- Cross-system Integration
- Adaptive Learning
- Decision Making

**Generative AI**
- AI Text Summarization
- Generate Attack Scenarios
- Generate Threat Detection Rules
- Generate Threat Summaries

**Agentic AI - Threat Intelligence**
- Autonomous Task Execution
- Multi-step Planning
- Proactive Assistance
- Decision Making

## Top CTM360 Alternatives
  - [Valimail](https://www.g2.com/products/valimail/reviews) - 4.5/5.0 (459 reviews)
  - [ZeroBounce](https://www.g2.com/products/zerobounce/reviews) - 4.7/5.0 (1,353 reviews)
  - [LastPass](https://www.g2.com/products/lastpass/reviews) - 4.5/5.0 (2,021 reviews)

