Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Cybenta, reclaim access to make changes.
SpinOne
Sponsored
SpinOne
Visit Website
Product Avatar Image
Cybenta

By Cybenta

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Cybenta, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.8 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Cybenta?

SpinOne
Sponsored
SpinOne
Visit Website
It's been two months since this profile received a new review
Leave a Review

Cybenta Reviews & Product Details

Cybenta Media

Cybenta Demo -
Cybenta Demo -
Cybenta Demo -
Product Avatar Image

Have you used Cybenta before?

Answer a few questions to help the Cybenta community

Cybenta Reviews (2)

Reviews

Cybenta Reviews (2)

4.8
2 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
SA
Security Operations Engineer
Mid-Market (51-1000 emp.)
"Easy to use"
What do you like best about Cybenta?

Traced Security is easy to use, with fast deployment and quick results. We saw insights in under 5 minutes, which was impressive. It provides good coverage for our Microsoft environment and helped us discover unknown apps, complete with security scores. Automated remediation and user insights have simplified our security efforts. Review collected by and hosted on G2.com.

What do you dislike about Cybenta?

The platform could expand its SaaS coverage to include tools like Zoom, GitHub, and Salesforce. Right now, it’s heavily focused on Microsoft environments, which limits its broader applicability. Review collected by and hosted on G2.com.

Verified User in Computer & Network Security
UC
Mid-Market (51-1000 emp.)
"Review on cybenta"
What do you like best about Cybenta?

It focuses on cyber threat intelligence and incidents response which takes the data from various sources and makes a efficient decision on the tasks. Review collected by and hosted on G2.com.

What do you dislike about Cybenta?

While automation is one of the features thay have but while using it it can miss out couple of IOCs. Review collected by and hosted on G2.com.

There are not enough reviews of Cybenta for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynet - All-in-One Cybersecurity Platform Logo
Cynet - All-in-One Cybersecurity Platform
4.7
(246)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
2
SpinOne Logo
SpinOne
4.8
(120)
All-in-One SaaS Security for Mission-Critical SaaS Apps
3
Netskope One Platform Logo
Netskope One Platform
4.4
(66)
Netskope is a Cloud Access Security Broker (CASB)
4
Varonis Data Security Platform Logo
Varonis Data Security Platform
4.5
(66)
Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
5
Zygon Logo
Zygon
4.9
(46)
Modern IT and Security teams use our platform to orchestrate modern identity governance at scale. Access reviews, account (de)provisioning and overall identity lifecycle operations are automated for all their applications.
6
CrowdStrike Falcon Shield Logo
CrowdStrike Falcon Shield
4.8
(31)
Proactively find and fix weaknesses across your SaaS platforms, and maintain continuous security for all global settings and user privileges.
7
Metomic Logo
Metomic
4.6
(18)
Metomic helps companies protect sensitive data across their SaaS apps.
8
Resmo Logo
Resmo
5.0
(10)
Close the gap between DevOps and SecOps teams with complete visibility for all Cloud and SaaS resources. Use SQL to ask questions and get real-time alerts for security, compliance, performance and cost policy violations.
9
Push Logo
Push
4.8
(9)
Push is a vulnerability scanner for cloud identities: - Get real-time visibility of all your cloud identities, apps and integrations. - Onboard unmanaged apps to SSO. Detect and harden non-SSO identities. - Find and secure vulnerable identities. Prevent your employees creating insecure identities. - Uncover shadow SaaS apps and accounts. Limit SaaS sprawl and reduce supply chain risk. - Improve employee security awareness by equipping users to self-remediate security issues.
10
Nudge Security Logo
Nudge Security
4.7
(8)
Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nudge Security helps busy security and IT teams work more efficiently with automated playbooks that accelerate SOC 2 access reviews, employee offboarding, and SSO onboarding. When an application in your SaaS supply chain experiences a breach, Nudge Security alerts you to the risk and helps you intervene to protect potentially-affected accounts.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Cybenta
View Alternatives