Lynis Enterprise

By CISOFY

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Lynis Enterprise, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.3 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Lynis Enterprise?

It's been two months since this profile received a new review
Leave a Review

Lynis Enterprise Reviews & Product Details

Product Avatar Image

Have you used Lynis Enterprise before?

Answer a few questions to help the Lynis Enterprise community

Lynis Enterprise Reviews (2)

Reviews

Lynis Enterprise Reviews (2)

4.3
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
UI
Enterprise (> 1000 emp.)
"SAAS Linux security solver"
What do you like best about Lynis Enterprise?

Lynis Enterprise is ideal for those who offer secure services to their clients/customers. We can efficiently conduct security scans for systems like LINUX, macOS, and also operate on UNIX-based systems. Easily compare different servers for security issues, errors, installed applications, etc. Review collected by and hosted on G2.com.

What do you dislike about Lynis Enterprise?

Destructive features can only be used for web-based applications and are only supported on Mac systems. They are not available for Windows operators. They are highly costly and limited to one member per system per day, but they are sufficient for the user. Review collected by and hosted on G2.com.

AP
Analyst
Enterprise (> 1000 emp.)
"Perform security audits with lynis"
What do you like best about Lynis Enterprise?

I use Lynis to perform security audits of your system Review collected by and hosted on G2.com.

What do you dislike about Lynis Enterprise?

I think your commands structure very complex. Review collected by and hosted on G2.com.

There are not enough reviews of Lynis Enterprise for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(756)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
Red Hat Ansible Automation Platform Logo
Red Hat Ansible Automation Platform
4.6
(374)
Red Hat Ansible Automation Platform is a simple way to automate apps and infrastructure. Application Deployment + Configuration Management + Continuous Delivery.
3
Tenable Nessus Logo
Tenable Nessus
4.5
(299)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
4
Harness Platform Logo
Harness Platform
4.6
(281)
Harness is the first Continuous Delivery-as-a-Service platform that uses Machine Learning to simplify the entire process of delivering code from artifact into production – quickly, safely, securely, and repeatably.
5
Orca Security Logo
Orca Security
4.6
(224)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
6
Gearset DevOps Logo
Gearset DevOps
4.7
(215)
Gearset is the most trusted DevOps platform with a full suite of powerful solutions for every team developing on Salesforce. Deploy: Achieve fast, reliable metadata and data deployments, including sandbox seeding, Vlocity, CPQ and Flows. Automate: Speed up your end-to-end release management with CI/CD and pipelines, for both regular releases and long term projects. Data management: Securely back up, archive, and restore your data with confidence.
7
Intruder Logo
Intruder
4.8
(202)
Intruder is a proactive security monitoring platform for internet-facing systems.
8
SentinelOne Singularity Endpoint Logo
SentinelOne Singularity Endpoint
4.7
(197)
Stop known and unknown threats on all platforms using sophisticated machine learning and intelligent automation. SentinelOne predicts malicious behavior across all vectors, rapidly eliminates threats with a fully-automated incident response protocol, and adapts defenses against the most advanced cyber attacks.
9
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(187)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
10
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Lynis Enterprise