Introducing G2.ai, the future of software buying.Try now
Product Avatar Image
G2 recognized CTM360
CTM360

By CTM360

4.7 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with CTM360?

CTM360 Pros and Cons: Top Advantages and Disadvantages

Quick AI Summary Based on G2 Reviews

Generated from real user reviews

Users commend the responsive customer support of CTM360, enhancing their overall experience and satisfaction with the platform. (26 mentions)
Users value the ease of use in CTM360, finding threat management accessible and user-friendly for all. (20 mentions)
Users value the comprehensive monitoring capabilities of CTM360, ensuring robust protection against diverse digital threats. (16 mentions)
Users value the proactive protection of CTM360, effectively managing digital threats with comprehensive and user-friendly features. (15 mentions)
Users commend CTM360 for its exceptional detection capabilities in identifying and neutralizing phishing and digital threats. (12 mentions)
Users praise CTM360 for its exceptional threat detection capabilities, providing swift and effective responses to evolving threats. (12 mentions)
Users experience integration issues with CTM360, particularly with QRadar, affecting threat intelligence reporting capabilities. (5 mentions)
Users find a lack of integrations with CTM360, limiting its effectiveness alongside other security tools and SIEM solutions. (4 mentions)
Users feel frustrated by the limited customization options in CTM360, impacting adaptability to unique needs. (3 mentions)
Users express concern over the limited number of takedowns available, affecting accessibility for various customer segments. (3 mentions)
Users experience slow performance during peak times, which hinders efficiency and timely responses to security incidents. (3 mentions)
Users find the integration complexity of CTM360 challenging, particularly in customized environments with steep learning curves. (2 mentions)
Users find the complex searching process challenging, particularly in tailored security systems, impacting their overall experience. (1 mentions)
Users find complex setup of CTM360 challenging, particularly in highly customized security infrastructures, hindering smooth integration. (1 mentions)

Top Pros or Advantages of CTM360

1. Customer Support
Users commend the responsive customer support of CTM360, enhancing their overall experience and satisfaction with the platform.
See 26 mentions

See Related User Reviews

Vignesh A.
VA

Vignesh A.

Small-Business (50 or fewer emp.)

5.0/5

"Best cloud cyber security partner"

What do you like about CTM360?

CTM360 secure our company digital presence in the cloud, Hacker view and cyber blind spot sections are extraordinary and the takedowns are really proa

Verified User
U

Verified User

Enterprise (> 1000 emp.)

5.0/5

"Senior Information & Cyber Security Officer"

What do you like about CTM360?

- Excellent data quality and feeds that are up-to-date - Wide coverage breadth of brand protection and threat intelligence services - Clear and comp

2. Ease of Use
Users value the ease of use in CTM360, finding threat management accessible and user-friendly for all.
See 20 mentions

See Related User Reviews

Vignesh A.
VA

Vignesh A.

Small-Business (50 or fewer emp.)

5.0/5

"Best cloud cyber security partner"

What do you like about CTM360?

CTM360 secure our company digital presence in the cloud, Hacker view and cyber blind spot sections are extraordinary and the takedowns are really proa

Verified User
U

Verified User

Enterprise (> 1000 emp.)

5.0/5

"Senior Information & Cyber Security Officer"

What do you like about CTM360?

- Excellent data quality and feeds that are up-to-date - Wide coverage breadth of brand protection and threat intelligence services - Clear and comp

3. Monitoring
Users value the comprehensive monitoring capabilities of CTM360, ensuring robust protection against diverse digital threats.
See 16 mentions

See Related User Reviews

Verified User
A

Verified User

Mid-Market (51-1000 emp.)

5.0/5

"CTM360 All in one box"

What do you like about CTM360?

We started using CTM360 with just one entity, and after seeing the value it brought, we decided to roll it out to our other subsidiaries as well. It’s

Verified User
I

Verified User

Enterprise (> 1000 emp.)

5.0/5

"A Powerful and User-Friendly Digital Risk Protection Platform"

What do you like about CTM360?

CTM360 is a dependable and user-friendly platform that empowers organizations to stay ahead of digital threats with minimal complexity and maximum eff

4. Features
Users value the proactive protection of CTM360, effectively managing digital threats with comprehensive and user-friendly features.
See 15 mentions

See Related User Reviews

Majed A.
MA

Majed A.

Mid-Market (51-1000 emp.)

5.0/5

"Your Cyber Sentinel: Securing Every Facet of Your Digital Presence — Before Threats Strike"

What do you like about CTM360?

CTM360 is great because it proactively protects your digital presence, combining attack surface management, threat intel, and takedowns in one seamles

Verified User
A

Verified User

Mid-Market (51-1000 emp.)

5.0/5

"CTM360 All in one box"

What do you like about CTM360?

We started using CTM360 with just one entity, and after seeing the value it brought, we decided to roll it out to our other subsidiaries as well. It’s

5. Detection
Users commend CTM360 for its exceptional detection capabilities in identifying and neutralizing phishing and digital threats.
See 12 mentions

See Related User Reviews

Verified User
U

Verified User

Mid-Market (51-1000 emp.)

4.5/5

"User friendly brandprotection"

What do you like about CTM360?

CTM360 alert on latest and high suspicious phishing around global to the organization. Easier to check on the benchmark score around the global reins

Michel .
M

Michel .

Enterprise (> 1000 emp.)

5.0/5

"Relying on cyber threats manager like CTM360 is a must"

What do you like about CTM360?

Detecting all brand related in addition to allowing the user to request takedown

6. Threat Detection
Users praise CTM360 for its exceptional threat detection capabilities, providing swift and effective responses to evolving threats.
See 12 mentions

See Related User Reviews

Verified User
U

Verified User

Mid-Market (51-1000 emp.)

4.5/5

"User friendly brandprotection"

What do you like about CTM360?

CTM360 alert on latest and high suspicious phishing around global to the organization. Easier to check on the benchmark score around the global reins

Michel .
M

Michel .

Enterprise (> 1000 emp.)

5.0/5

"Relying on cyber threats manager like CTM360 is a must"

What do you like about CTM360?

Detecting all brand related in addition to allowing the user to request takedown

Top Cons or Disadvantages of CTM360

1. Integration Issues
Users experience integration issues with CTM360, particularly with QRadar, affecting threat intelligence reporting capabilities.
See 5 mentions

See Related User Reviews

Verified User
U

Verified User

Enterprise (> 1000 emp.)

4.0/5

"Protecting our digital presence by CTM 360"

What do you dislike about CTM360?

Can't integrate CTM with QRadar, some time it report late or failed to report any our brand related phish pages

MI

Muneeb I.

Enterprise (> 1000 emp.)

4.5/5

"CTM360 gets you a comprehensive DRP visibility tailored for the banking sector"

What do you dislike about CTM360?

Although it is a multi-module platform however it needs improvement in integrating threat intelligence with SIEM solution with more details

2. Lack of Integrations
Users find a lack of integrations with CTM360, limiting its effectiveness alongside other security tools and SIEM solutions.
See 4 mentions

See Related User Reviews

MI

Muneeb I.

Enterprise (> 1000 emp.)

4.5/5

"CTM360 gets you a comprehensive DRP visibility tailored for the banking sector"

What do you dislike about CTM360?

Although it is a multi-module platform however it needs improvement in integrating threat intelligence with SIEM solution with more details

Verified User
U

Verified User

Enterprise (> 1000 emp.)

4.0/5

"Protecting our digital presence by CTM 360"

What do you dislike about CTM360?

Can't integrate CTM with QRadar, some time it report late or failed to report any our brand related phish pages

3. Limited Customization
Users feel frustrated by the limited customization options in CTM360, impacting adaptability to unique needs.
See 3 mentions

See Related User Reviews

Verified User
A

Verified User

Small-Business (50 or fewer emp.)

4.5/5

"Delivers exceptional external attack surface monitoring & brand protection at a good value."

What do you dislike about CTM360?

What was once unlimited takedowns are now limited number of takedowns. Addition of takedowns once depleted will be a challenge for certain customer se

Abdul R.
AR

Abdul R.

Enterprise (> 1000 emp.)

4.5/5

"CTM360: A Robust Platform for Digital Risk Protection"

What do you dislike about CTM360?

Customization options for certain reports are limited.

4. Limited Features
Users express concern over the limited number of takedowns available, affecting accessibility for various customer segments.
See 3 mentions

See Related User Reviews

Verified User
A

Verified User

Small-Business (50 or fewer emp.)

4.5/5

"Delivers exceptional external attack surface monitoring & brand protection at a good value."

What do you dislike about CTM360?

What was once unlimited takedowns are now limited number of takedowns. Addition of takedowns once depleted will be a challenge for certain customer se

Faisal M.
FM

Faisal M.

Enterprise (> 1000 emp.)

5.0/5

"A Platform with Proficient Opportunities and noticeable Threats visibility"

What do you dislike about CTM360?

The variety of features that CTM360 has to offer are undeniably useful, however the amount of modules and dashboards available may be overwhelming at

5. Slow Performance
Users experience slow performance during peak times, which hinders efficiency and timely responses to security incidents.
See 3 mentions

See Related User Reviews

Verified User
U

Verified User

Enterprise (> 1000 emp.)

4.0/5

"Cyber fraud professional"

What do you dislike about CTM360?

Some times it be late about leaked credentials

Michel .
M

Michel .

Enterprise (> 1000 emp.)

5.0/5

"Relying on cyber threats manager like CTM360 is a must"

What do you dislike about CTM360?

Sometimes the takedown takes a while to be done

6. Complexity
Users find the integration complexity of CTM360 challenging, particularly in customized environments with steep learning curves.
See 2 mentions

See Related User Reviews

Ebrima S.
ES

Ebrima S.

Mid-Market (51-1000 emp.)

4.0/5

"A Proactive Platform for External Threat Monitoring and Email Security"

What do you dislike about CTM360?

While CTM360 offers comprehensive features, the learning curve for understanding all modules—especially email security metrics—can be steep for first-

Jawharah .
J

Jawharah .

Small-Business (50 or fewer emp.)

4.5/5

"Built on long-term collaboration for enhancing cybersecurity resilience."

What do you dislike about CTM360?

Integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments.

7. Complex Searching
Users find the complex searching process challenging, particularly in tailored security systems, impacting their overall experience.
See 1 mentions

See Related User Reviews

Jawharah .
J

Jawharah .

Small-Business (50 or fewer emp.)

4.5/5

"Built on long-term collaboration for enhancing cybersecurity resilience."

What do you dislike about CTM360?

Integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments.

8. Complex Setup
Users find complex setup of CTM360 challenging, particularly in highly customized security infrastructures, hindering smooth integration.
See 1 mentions

See Related User Reviews

Jawharah .
J

Jawharah .

Small-Business (50 or fewer emp.)

4.5/5

"Built on long-term collaboration for enhancing cybersecurity resilience."

What do you dislike about CTM360?

Integrating CTM360 with existing security infrastructures can sometimes be complex, especially in highly customized environments.

CTM360 Reviews (102)

Reviews

CTM360 Reviews (102)

4.7
102 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Twapandula H.
TH
Small-Business (50 or fewer emp.)
"CTM Review"
What do you like best about CTM360?

like that the platform helps identify exposed assets, misconfigurations, and digital risks quickly, enabling us to take proactive action. The interface is clean, the alerts are timely, and the platform makes it easy to see how our organization appears from a hacker’s point of view. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

While CTM360 is a valuable platform, some areas could be enhanced. Reports generated can sometimes lack full detail regarding risk description, impact, and remediation guidance. In some cases, findings would benefit from clearer asset-level context, such as mapping each risk directly to its associated IP, domain, or system. Additionally, some country-level intelligence feels generic, and deeper localization would strengthen situational awareness for national stakeholders like CSIRTs and CERTs. Review collected by and hosted on G2.com.

Shahryar M.
SM
Senior Pre-Sales Executive
"Exceptional Threat Visibility and Support"
What do you like best about CTM360?

I love how CTM360 offers a strong and comprehensive digital risk protection platform with excellent visibility across external threat surfaces. I appreciate their proactive and efficient threat intelligence, brand monitoring, and takedown capabilities that help organizations stay ahead of emerging cyber risks. The platform is user-friendly and easy to navigate, which significantly enhances the overall experience. Their support team is also exceptional, being very responsive and professional. I particularly value the engagement of their leadership when dealing with clients and partners, which adds a personal touch to their service. Moreover, the threat intelligence feeds are incredibly timely, contextual, and provide actionable insights that help detect and mitigate risks efficiently. The Brand Monitoring and External Attack Surface Discovery features are crucial for providing continuous visibility into exposed assets, allowing us to identify risks before they can be exploited. Additionally, the initial setup of CTM360 was quite easy and quick, taking about an hour to complete. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

Overall the platform works well, however new features could be introduced to make the tool more worth it. Specifically, I would like to see advanced alert prioritization, risk scoring, and customizable dashboards. Review collected by and hosted on G2.com.

Nagendra S.
NS
Head of Network Infrastructure
"Effortless Security Monitoring, Outstanding Support"
What do you like best about CTM360?

I appreciate CTM360's approach to customer service, particularly their understanding of our requirements, which ensures that the service is tailored to our specific needs. The platform's Hackerview asset page stands out for its effectiveness in providing critical information, and their summary reports are invaluable for delivering insights to our Executive Management in a clear and concise manner. Additionally, the initial setup was very easy, allowing us to quickly integrate the solution into our operations. My overall satisfaction with CTM360 is reflected in my willingness to recommend the platform with the highest score of 10 out of 10. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

I would prefer CTM360 to follow up on the issues that are pending for remediation and keep us engaged. This lack of proactive follow-up can leave me feeling as if there's a gap in the support and oversight necessary to ensure vulnerabilities are addressed promptly. Review collected by and hosted on G2.com.

Tumane M.
TM
Cybersecurity Manager
Mid-Market (51-1000 emp.)
"Comprehensive Asset Protection with Instant Remediation Feedback"
What do you like best about CTM360?

CTM360 provides a thorough assessment of my organization's digital assets. With CTM360, I have a clear overview of all internet-facing assets, allowing vulnerabilities to be identified and addressed quickly and efficiently. The feedback on remediation efforts is immediate, and their support team is always available, and is also proactive. They are able to initiate immediate scans that reflect the most up-to-date status. We are able to also share the threat intel, to which we also share with our constituents. The platform is user friendly for use. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

I feel that having greater control would be much more valuable than simply being able to remediate. For instance, I would like the ability to manage my assets list more effectively. If my company owns multiple assets across different domains, I should have the option to determine which of these assets influence the rating of my company profile, according to my own risk matrix. Is it possible to add a pentest module? That would be highly appreciated. Review collected by and hosted on G2.com.

Vince Jason V.
VV
Mid-Market (51-1000 emp.)
"Effortless Implementation and Intuitive Features"
What do you like best about CTM360?

There's no need for a deployment. Can be easily implemented within the threat intel team. Additionally, CTM360's features are great in terms of being able to understand them easily. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

None that I can think of right now. I guess I'm fully satisfied with the solution Review collected by and hosted on G2.com.

Verified User in Banking
CB
Mid-Market (51-1000 emp.)
"Intuitive Threat Monitoring with Fast Support"
What do you like best about CTM360?

I find the GUI of CTM360 exceptionally intuitive, thanks to its multi-module approach that clearly highlights different information based on the operational context. This makes navigating the platform seamless and enhances my understanding of complex data. The dashboard's clean and well-maintained data structure ensures clarity and efficiency in monitoring threats. I also appreciate the responsiveness of the CTM360 team, who act quickly and reliably, providing meaningful insights through chat or direct calls, which significantly enhances my experience. The initial setup was very easy, making it a convenient solution to deploy. Combined with these aspects, CTM360 effectively addresses challenges in threat intelligence and active threat monitoring, making it an invaluable tool for our operations. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

I find the AI integration with CTM360 to be somewhat clumsy, as it doesn't seamlessly fit into the operational workflow. The AI feels like it's still in early development mode, lacking the polish and efficiency expected from a mature feature. Furthermore, there is a need for better understanding and handling of the operational context, especially when highlighting vulnerabilities. This gap often leads to false positives or recurring alerts across multiple targets that could actually represent the same issue, creating unnecessary noise and potentially obscuring genuine threats. Review collected by and hosted on G2.com.

Ts. Sau-Wern T.
TT
Director/Chief Engineer - Head of Platform Engineering - Technology Division
"Effortless Asset Monitoring with Stellar Take Down Service"
What do you like best about CTM360?

I find CTM360 incredibly beneficial for a variety of reasons. Firstly, it provides an excellent monitoring system for our public-facing assets, ensuring we stay informed about risks associated with our participants and keeping us updated with the latest news on threats and claims from potential threat actors. This is crucial for maintaining the security integrity of our operations. The feature that stands out to me is the takedown service, which is one of the fastest and most efficient in the industry. It allows us to react quickly to discovered vulnerabilities, considerably mitigating potential risks. Additionally, I appreciate having a comprehensive view of all our public-facing assets presented in a unified, singular interface—making it easy to manage and evaluate our security posture. I also admire CTM360 for its regular improvements to the platform, ensuring it stays ahead in addressing our cybersecurity needs. The initial setup was impressively straightforward, warranting a rating of 9 out of 10 for ease, reflecting its user-friendliness. Overall, my high confidence in recommending CTM360 is demonstrated by my scoring of 9 out of 10 for recommending it to others. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

The is a limit of how many 3rd parties on the supply chain one can monitor. Review collected by and hosted on G2.com.

Ramsès D.
RD
"Easy to use, a holistic approach to external perimeter monitoring"
What do you like best about CTM360?

I greatly appreciate the ease of use of CTM360 and its different approach compared to other solutions. CTM360 focuses on the essentials while offering comprehensive and holistic coverage. Features like 'Hacker view', 'Deep scan', external attack surface management, CTI, Darkweb monitoring, third-party risk management, and interventions allow us to effectively manage our clients' attack surface and take corrective actions quickly. The product helps us automate the management and monitoring of the external perimeter, which significantly reduces our workload, especially since we manage dozens of clients. Its efficiency allows us to produce comprehensive reports quickly and be proactive against threats. I particularly like the 'hackerview' which reveals vulnerabilities and TTPs, positioning CTM360 as much more relevant than traditional IOCs. The frequently provided reports are very relevant for identifying current trends and preparing for them. Finally, the customer service with Salman Anwar is exemplary in terms of availability and responsiveness. The initial implementation was easy thanks to the turnkey solution provided by the CTM360 team. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

Improve the malware analysis section to have many more reports. Have a sandbox to analyze samples and generate a report. Also, be able to conduct research on a wider variety of malware. Review collected by and hosted on G2.com.

Shaahid M H.
SH
Senior Manager, Cyber Security
Mid-Market (51-1000 emp.)
"Senior Cybersecuity Manager"
What do you like best about CTM360?

Zero Touch on-boarding Log in and go. There is no complex configuration or manual entry of domains required. The platform automatically maps your entire digital footprint—including hidden Shadow IT—delivering immediate value and visibility from day one.

Efficient, Managed Takedowns

takedowns handled entirely by their professional analyst team. They navigate the complex legal requirements to kill phishing sites and fake profiles quickly, acting as a seamless extension of your own SOC.

Customer-Centric

They actually listen. CTM360 is known for treating clients as partners rather than ticket numbers. They rapidly build and deploy new features based on your direct feedback and specific reporting needs. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

Nothing to note we’re satisfied with the solution. Review collected by and hosted on G2.com.

MS
"Exceptional Security Solution with Seamless Setup"
What do you like best about CTM360?

I find CTM360 incredibly beneficial for securing our organizational operations. The software is instrumental in resolving executive impersonation and other issues across more than 100 social media platforms, which is essential for protecting our digital footprint. I appreciate that CTM360 offers a comprehensive end-to-end solution, going beyond mere identification of security problems to actively resolving them. The ability to assess the security maturity level of third-party vendors without accessing their actual infrastructure is another standout feature. This capability provides unbiased insights, helping us make informed decisions regarding strategic partnerships and integrations, especially vital in combating supply chain attacks. I value this transparency as it allows us to verify claims made by potential partners. Additionally, the user-friendly, interactive interface enhances usability, ensuring quick setup and easy adaptation within just one to two days. Our executives have strongly praised the CTM360 dashboard for its clarity and efficacy in orienting them to our security posture, demonstrating its value in strategic decision-making. Overall, I would rate CTM360 a perfect 10 for its reliability, comprehensive service, and invaluable security insights. Review collected by and hosted on G2.com.

What do you dislike about CTM360?

no Review collected by and hosted on G2.com.

Product Avatar Image
Product Avatar Image