Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Reflex Security Reviews & Product Details

Profile Status

This profile is currently managed by Reflex Security but has limited features.

Are you part of the Reflex Security team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Reflex Security Media

Reflex Security Demo - Scenario Generation
Reflex generates complete tabletop scenarios from a single input (the company's domain). The platform uses open-source intelligence to research the target organization and produces a scenario with forensics-level detail in minutes, including company profile, products, business model, impacted tec...
Product Avatar Image

Have you used Reflex Security before?

Answer a few questions to help the Reflex Security community

Reflex Security Reviews (2)

Reviews

Reflex Security Reviews (2)

5.0
2 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
LC
Founder and CEO
Small-Business (50 or fewer emp.)
"Reflex Raises the Bar on Tabletop Exercises"
What do you like best about Reflex Security?

I have been doing tabletop exercises for the past decade. The traditional model is filled with structural issues that most practitioners know about but don’t talk about. Reflex actually fixes them.

The scenario engine is a core improvement. Based on as little or as much information as you want to feed it, Reflex builds the attack vector, the threat actor and the organizational context. What usually took weeks of scenario development and stakeholder coordination can be done in under a few hours. That time compression, and quality of the output, significantly changes what I can do for an organization.

Participant engagement is where most exercises fall apart. You know the look. Technical teams being asked to suspend disbelief because of unrealistic assumptions, or exec teams on their phones, half-checked out. Reflex solves that too. Everyone gets their own console tuned to their role. AI agents participate as attackers and as colleagues who aren’t part of the formal exercise. They’ll ask questions, make noise, put on a lot of pressure. A facilitator doesn’t provide every inject. Each participant has to bring what they are finding to the team which is so much more realistic.

The reporting is very good. You get an all-encompassing transcript showing how people found information, how they communicated with others when they were under pressure, and what decisions they took and when. And that’s a whole different level of insight than a quick hot wash at the end of a traditional session.

One thing I didn’t expect to see going in: I started using Reflex for cyber tabletops and quickly realized it handles BCP/DR, crisis communications, and enterprise risk scenarios just as well. That’s opened conversations well beyond the security team. Review collected by and hosted on G2.com.

What do you dislike about Reflex Security?

Fully in-person sessions with one shared screen lose some of what makes it effective. Everybody, or at least every team, needs their own console. But I have come to understand that Reflex’s model is actually more realistic anyway. Real incidents aren’t worked in a single conference room around a u-shaped table. You have parallel bridges running simultaneously. The platform is similar to the way incidents actually play out.

The format of the after-action report is still evolving. The depth of what the platform captures is impressive. The bigger problem is that the industry has yet to figure out what an after-action report should look like for this kind of exercise. The mistake would be to try to rebuild the old reports with this platform. Reflex is not revamping an old model, they are building a new one. Their team is engaged and the process feels very collaborative. Review collected by and hosted on G2.com.

Gustavo G.
GG
Founder & CEO
Small-Business (50 or fewer emp.)
"Highly Realistic, Company-Specific Incident Response Simulation"
What do you like best about Reflex Security?

Its ability to create a highly realistic, company-specific simulation that exposes real weaknesses in our incident response under pressure.

This was not a generic exercise — it was tailored to our tech stack, clients, and regulatory environment, which made it feel like a real incident. Review collected by and hosted on G2.com.

What do you dislike about Reflex Security?

I don’t recall anything specific that stood out as a negative during the experience. Review collected by and hosted on G2.com.

There are not enough reviews of Reflex Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
vPenTest Logo
vPenTest
4.6
(229)
vPenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error. vPenTest essentially combines the knowledge, methodologies, techniques, and commonly used tools of multiple consultants into a single platform that consistently exceeds expectations of a penetration test. By developing our proprietary framework that continuously grows based on our research & development, we’re able to modernize the way penetration tests are conducted.
2
Picus Security Logo
Picus Security
4.8
(218)
Picus Security is the pioneer of Breach and Attack Simulation (BAS) and Adversarial Exposure Validation (AEV). The Picus Security Validation Platform unifies exposure assessment, security control validation, and exposure validation to help organizations continuously measure and reduce real cyber risk.
3
Cymulate Logo
Cymulate
4.9
(172)
Cymulate comprehensively identifies the security gaps in your infrastructure and provides actionable insights for proper remediation. Run safely from the internet, our battery of simulated attacks causes no interruption to your operation or business productivity.
4
Pentera Logo
Pentera
4.5
(144)
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io.
5
RidgeBot Logo
RidgeBot
4.5
(97)
RidgeBot, a robotic penetration testing system, fully automates the testing process by coupling ethical hacking techniques to decision-making algorithms. RidgeBots locate risks and vulnerabilities discovered in network, servers, and applications, prove the potential impact or damage with exploit evidence. It provides risk-based vulnerability management and alleviates the shortage of security testing personnel by automation.
6
Adaptive Security Logo
Adaptive Security
4.9
(72)
Adaptive Security offers a comprehensive suite of cybersecurity solutions designed to enhance organizational resilience against evolving threats. Their offerings include Phishing Simulations, Security Awareness Training, and Phishing Triage, all tailored to meet the unique needs of businesses ranging from small enterprises to Fortune 500 companies.
7
Right-Hand Cybersecurity Logo
Right-Hand Cybersecurity
4.8
(66)
Right-Hand helps you to make your employees defensible against cyber-threats.
8
Defendify All-In-One Cybersecurity Solution Logo
Defendify All-In-One Cybersecurity Solution
4.7
(57)
Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.
9
Sophos PhishThreat Logo
Sophos PhishThreat
4.3
(22)
Sophos Phish Threat is a cloud-based security awareness training and phishing simulation platform designed to educate employees on identifying and responding to phishing attacks. By simulating realistic phishing scenarios and providing interactive training modules, it helps organizations strengthen their human firewall against cyber threats. Key Features and Functionality: - Realistic Phishing Simulations: Offers hundreds of customizable templates that mimic real-world phishing attacks, enabling organizations to test and improve employee vigilance. - Automated Training Modules: Provides over 30 interactive training courses covering security and compliance topics, automatically enrolling users who fall for simulated attacks. - Comprehensive Reporting: Delivers actionable insights through intuitive dashboards, tracking user susceptibility, training progress, and overall organizational risk levels. - Multi-Language Support: Available in nine languages, ensuring accessibility for diverse workforces. - Seamless Integration: Integrates with Sophos Central, allowing unified management alongside other security solutions like email and endpoint protection. Primary Value and Problem Solved: Sophos Phish Threat addresses the critical challenge of human error in cybersecurity by transforming employees into proactive defenders against phishing attacks. By combining realistic simulations with targeted training, it reduces the likelihood of successful phishing attempts, thereby enhancing the organization's overall security posture and minimizing the risk of data breaches and financial loss.
10
HTB CTF & Threat Range Logo
HTB CTF & Threat Range
4.7
(22)
The HTB CTF platform enables security leaders to shape realistic live-fire team assessments based on the outcome desired and the specific audience involved - hosting up to thousands of players, easy to deploy.
Show More
People Icons

Start a Discussion about Reflex Security

Have a software question? Get answers from real users and experts.

Start a Discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Reflex Security