This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Red Sift ASM Reviews & Product Details

Profile Status

This profile is currently managed by Red Sift ASM but has limited features.

Are you part of the Red Sift ASM team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Red Sift ASM Media

Red Sift ASM Demo - Leverage unmanaged attack surface data
Identify mismanaged or unmanaged assets that other tools miss. Red Sift ASM continuously scans domains, hostnames, and IP addresses so your data is always fresh.
Red Sift ASM Demo - Automated asset inventory
Build an inventory of your external-facing and cloud assets without spreadsheets or manual processes. Connect to cloud providers, certificate authorities, registrars, and managed DNS providers to import and monitor all of your assets.
Red Sift ASM Demo - Get complete visibility into cloud accounts
Integrate with AWS, Google Cloud and Azure out-of-the-box for a more holistic view of the entire attack surface.
Red Sift ASM Demo - Information to take action
In-depth, real-time data about each asset makes it straightforward to take action as soon as a misconfiguration or unmanaged asset is identified.
Product Avatar Image

Have you used Red Sift ASM before?

Answer a few questions to help the Red Sift ASM community

Red Sift ASM Reviews (1)

Reviews

Red Sift ASM Reviews (1)

4.0
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Information Technology and Services
UI
Enterprise (> 1000 emp.)
"Best cybersecurity software"
What do you like best about Red Sift ASM?

We are using it for automated asset detection with continuous network and cybersecurity monitoring. That's way it is better by providing cybersecurity when search engine uses multiple sources of information to find best website. Review collected by and hosted on G2.com.

What do you dislike about Red Sift ASM?

There isn't much that I dislike about Red Sift ASM. I like the way it works. Review collected by and hosted on G2.com.

There are not enough reviews of Red Sift ASM for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Wiz Logo
Wiz
4.7
(756)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
2
Scrut Automation Logo
Scrut Automation
4.9
(1,298)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
3
Red Hat Ansible Automation Platform Logo
Red Hat Ansible Automation Platform
4.6
(374)
Red Hat Ansible Automation Platform is a simple way to automate apps and infrastructure. Application Deployment + Configuration Management + Continuous Delivery.
4
Tenable Nessus Logo
Tenable Nessus
4.5
(299)
From the beginning, we've worked hand-in-hand with the security community. We continuously optimize Nessus based on community feedback to make it the most accurate and comprehensive vulnerability assessment solution in the market. 20 years later and we're still laser focused on community collaboration and product innovation to provide the most accurate and complete vulnerability data - so you don't miss critical issues which could put your organization at risk. Tenable is a 2021 Gartner Representative Vendor in Vulnerability Assessment.
5
Harness Platform Logo
Harness Platform
4.6
(281)
Harness is the first Continuous Delivery-as-a-Service platform that uses Machine Learning to simplify the entire process of delivering code from artifact into production – quickly, safely, securely, and repeatably.
6
Trend Vision One Logo
Trend Vision One
4.7
(228)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
7
Orca Security Logo
Orca Security
4.6
(224)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
8
Gearset DevOps Logo
Gearset DevOps
4.7
(215)
Gearset is the most trusted DevOps platform with a full suite of powerful solutions for every team developing on Salesforce. Deploy: Achieve fast, reliable metadata and data deployments, including sandbox seeding, Vlocity, CPQ and Flows. Automate: Speed up your end-to-end release management with CI/CD and pipelines, for both regular releases and long term projects. Data management: Securely back up, archive, and restore your data with confidence.
9
Recorded Future Logo
Recorded Future
4.6
(215)
Recorded Future Intelligence Cloud elevates your existing security defenses by enhancing the depth and breadth of protection by giving you insights into threats and attacks before they impact, so you can stay ahead of attackers, at the speed and scale of today’s threat environment.
10
Intruder Logo
Intruder
4.8
(202)
Intruder is a proactive security monitoring platform for internet-facing systems.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Red Sift ASM