Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Security Scorecard

SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company’s approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Web, Application Security, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Credentials, DNS Health, Endpoint Security, IP Reputation and Cubit Score. To receive an email with your company’s current score, please visit instant.securityscorecard.com.

Work for Security Scorecard?

Learning about Security Scorecard?

We can help you find the solution that fits you best.

Security Scorecard Reviews

Ask Security Scorecard a Question
Write a Review
Filter Reviews
Showing 0 Security Scorecard reviews
LinkedIn Connections

What Security Risk Analysis solution do you use?

Thanks for letting us know!

There are not enough reviews of Security Scorecard for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Sophos UTM Logo
Sophos UTM
4.1
(67)
The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.
2
Qualys Logo
Qualys
4.3
(32)
Vulnerability Management
3
Tripwire Enterprise Logo
Tripwire Enterprise
3.6
(15)
Tripwire is a provider of advanced threat, security and compliance solutions to confidently detect, prevent and respond to cybersecurity threats
4
Cyberoam UTM Logo
Cyberoam UTM
4.3
(15)
Cyberoam Unified Threat Management appliances, available as hardware and virtual appliances, offer comprehensive security to organizations.
5
Core Insight Enterprise Logo
Core Insight Enterprise
3.8
(12)
Vulnerability Management
6
Change Tracker Gen7 R2 Logo
Change Tracker Gen7 R2
4.7
(5)
NNT Change Tracker Generation 7 uses either an agent-based or agentless architecture. After initial discovery, NNT-Change Tracker scans your devices and compares them to a standard policy.
7
Symantec Network Forensics & Security Analytics Logo
Symantec Network Forensics & Security Analytics
4.1
(5)
Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of the time you would spend with conventional processes.
8
Tenable.io Logo
Tenable.io
4.4
(4)
Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.
9
InsightVM Logo
InsightVM
4.5
(2)
Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development to streamline and automate remediation efforts.
10
BeyondTrust Vulnerability Management Logo
BeyondTrust Vulnerability Management
4.0
(1)
Reduce risk with cross-platform vulnerability assessment and remediation, including built-in configuration compliance, patch management and compliance reporting.
Show more
Kate from G2

Learning about Security Scorecard?

I can help.
* We monitor all Security Scorecard reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.