Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Detectify

5.0
(1)

Detectify is a SaaS based website security service that analyzes and monitors the security level of a user's website by applying a broad range of emulated hacker attacks and provide report that describes the identified vulnerabilities and their potential risk in the hands of malicious hackers.

Work for Detectify?

Learning about Detectify?

We can help you find the solution that fits you best.

Detectify Reviews

Ask Detectify a Question
Write a Review
Filter Reviews
Filter Reviews
Ratings
Company Size
User Role
Industry
Showing 1 Detectify review
LinkedIn Connections
Detectify review by Hima S.
Hima S.
Validated Reviewer
Review Source
content

"QA"

What do you like best?

The best thing about detectify is the security feature for the internal paths and URLs of the applications

What do you dislike?

There is nothing to point out to say its not affective. Just love all about it

What business problems are you solving with the product? What benefits have you realized?

By addressing security vulnerabilities on web tickets this helps protect our websites from being hacked or taken advantage of by bad people.

Sign in to G2 to see what your connections have to say about Detectify

What Penetration Testing solution do you use?

Thanks for letting us know!

There are not enough reviews of Detectify for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Metasploit Logo
Metasploit
4.5
(15)
Metasploit Pro is a penetration testing tool that increases penetration tester's productivity, prioritizes and demonstrates risk through closed-loop vulnerability validation, and measures security awareness through simulated phishing emails.
2
Veracode Application Security Platform Logo
Veracode Application Security Platform
3.2
(12)
Veracode is the world's best automated, on-demand application security testing and code review solution.
3
SQLmap Logo
SQLmap
4.4
(13)
Automatic SQL injection and database takeover tool
4
Swascan Security Suite Logo
Swascan Security Suite
4.7
(3)
Provides automated security testing and security scan of web applications to identify vulnerabilities, scans your network and devices and suggest to you recommendations on how they can be fixed, and provides a source code analysis to identify and resolve security weaknesses and vulnerabilities
5
BeEF Logo
BeEF
4.2
(3)
BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.
6
HackerOne Logo
HackerOne
3.8
(3)
The Most Trusted Hacker-Powered Security Platform
7
Cobalt.io Logo
Cobalt.io
3.5
(1)
Cobalt's Pen Testing as a Service (PTaaS) Platform transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of certified freelancers, Cobalt's crowdsourced SaaS pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget.
8
Defensics Logo
Defensics
3.5
(1)
Test running apps and services for common security weaknesses and vulnerabilities using malformed inputs to detect flaws. Leverage fully automated tests across 250+ test suites, protocol-specific attack patterns and automatic test mutation
9
CAST Application Intelligence Platform Logo
CAST Application Intelligence Platform
(0)
CAST Application Intelligence Platform (AIP) is an enterprise-grade software measurement and quality analysis solution designed to analyze multi-tiered, multi-technology applications for technical vulnerabilities and adherence to architectural and coding standards and then provide business relevant information to the IT organization through various dashboards and products built with end users in mind.
10
SATAN Logo
SATAN
(0)
SATAN is a tool to help systems administrators. It recognizes several common networking-related security problems, and reports the problems without actually exploiting them.
Show more
Kate from G2

Learning about Detectify?

I can help.
* We monitor all Detectify reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.