This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Eracent SBOM-HQ Reviews & Product Details

Profile Status

This profile is currently managed by Eracent SBOM-HQ but has limited features.

Are you part of the Eracent SBOM-HQ team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Eracent SBOM-HQ before?

Answer a few questions to help the Eracent SBOM-HQ community

Eracent SBOM-HQ Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Eracent SBOM-HQ for G2 to provide buying insight. Below are some alternatives with more reviews:

1
GitHub Logo
GitHub
4.7
(2,340)
GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over two million people use GitHub to build amazing things together.
2
GitLab Logo
GitLab
4.5
(889)
An open source web interface and source control platform based on Git.
3
Wiz Logo
Wiz
4.7
(777)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
4
CloudBees Logo
CloudBees
4.4
(620)
Enabling the world’s biggest and brightest companies to transition from incoherent, disconnected DevOps to self-service, fast, secure workflows connecting software delivery to business outcomes.
5
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(308)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
6
Arctic Wolf Logo
Arctic Wolf
4.7
(279)
Arctic Wolf provides Cyber-SOC as a service, designed to make every link in the security chain stronger.
7
Recorded Future Logo
Recorded Future
4.6
(227)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
8
Cisco Vulnerability Management (formerly Kenna.VM) Logo
Cisco Vulnerability Management (formerly Kenna.VM)
4.3
(217)
Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to focus their limited resources and remediate more efficiently. Cisco’s data science-driven prioritization evaluates both enterprise data and a wealth of data on real-world exploit activity and translates that context into actionable intelligence to guide remediation.
9
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(177)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
10
Check Point Exposure Management Logo
Check Point Exposure Management
4.6
(168)
Cyberint is now a Check Point Company. Its impactful intelligence solution combines cyber threat intelligence, external attack surface management, brand protection, and digital supply chain intelligence into a single, powerful solution. By leveraging autonomous discovery of all of an organization’s external-facing assets, coupled with open, deep & dark web intelligence, the solution enables cybersecurity teams to accelerate the detection and disruption of their most pressing cyber risks. Global customers, including Fortune 500 leaders across all major market verticals, rely on us to prevent, detect, investigate, and remediate phishing, malware, fraud, brand abuse, data leaks, external vulnerabilities, and more, ensuring continuous external protection from cyber threats.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Eracent SBOM-HQ