Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at ThreatMapper, reclaim access to make changes.
Intruder
Sponsored
Intruder
Visit Website
Product Avatar Image
ThreatMapper

By Deepfence

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at ThreatMapper, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.2 out of 5 stars

How would you rate your experience with ThreatMapper?

Intruder
Sponsored
Intruder
Visit Website
It's been two months since this profile received a new review
Leave a Review

ThreatMapper Reviews & Product Details

ThreatMapper Media

ThreatMapper Demo - ThreatMapper Topology View
Use ThreatMapper to scan your infrastructure, discover workloads, and map the topology
ThreatMapper Demo - ThreatMapper Vulnerabilities View
Scan your workloads and infrastructure (containers, filesystems, hosts, applications) for vulnerabilities. Discover issues that were missed during CI scanning, or which were disclosed after the workload was deployed.
ThreatMapper Demo - ThreatMapper 'Most Exploitable Vulnerabilities' View
ThreatMapper correlates vulnerabilities against the measured attack surface, then ranks them using severity, exploit method, proximity to attack surface and presence of active connections. Know what to fix first, in order to minimise your exposure to risk.
Product Avatar Image

Have you used ThreatMapper before?

Answer a few questions to help the ThreatMapper community

ThreatMapper Reviews (12)

Reviews

ThreatMapper Reviews (12)

4.2
12 reviews

Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Azmeera Goutham N.
AN
Graduate Engineering Trainee
Small-Business (50 or fewer emp.)
"Terrific ThreatMapper"
What do you like best about ThreatMapper?

Real time visualization in the application and has various multi cloud apps and it helped monitoring features and sensored roadmaps with great support Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

It is an open source platform and with that third party resources are not so good and couldn't find all vulnerabilities Review collected by and hosted on G2.com.

Gaurav  R.
GR
DevOps Engineer
Mid-Market (51-1000 emp.)
Business partner of the seller or seller's competitor, not included in G2 scores.
"Multiple cloud Scanner for vulernability bug of container, application"
What do you like best about ThreatMapper?

Threat mapper is free and available for multiple cloud platform, best thing is it rank the vulnerability at risk level. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

Not more to dislike about threatmapper, can provide better documentation Review collected by and hosted on G2.com.

Aman P.
AP
Security Services Senior Consultant
Enterprise (> 1000 emp.)
"Perfect Scanner for threat scanning in host's and applications!!"
What do you like best about ThreatMapper?

The best thing about ThreatMapper is an open-source tool that scans, maps and ranks all the known vulnerabilities in the hosts, applications, containers etc. The kind of reliability ThreatMapper offers is unmatchable also that is the best thing about this wonderful tool. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

There is not much to dislike about ThreatMapper but just want the developers to add more robust threat/vulnerabilities list for CMS platforms like wordpress, drupal and joomla. Review collected by and hosted on G2.com.

RR
Associate Editor
Small-Business (50 or fewer emp.)
"Secure vulnerable threats"
What do you like best about ThreatMapper?

Effective visualization and discovery of threats and vulnerabilities in real-time, multi-cloud implementation. Easy accessibility and set-up, enable effective monitoring with loaded tools. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

More updates are required and set-up should be simpler. More interactive Ui will be an add-on. Overall nothing to complain but the interface can be much better. No doubt the product is efficient. Review collected by and hosted on G2.com.

RANA S.
RS
Piping Engineer
Mechanical or Industrial Engineering
Mid-Market (51-1000 emp.)
"Vulnerability Scanner!!"
What do you like best about ThreatMapper?

To scan Kubernetes or fargate environments as installtion is very easy. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

For Setup require skilled worker. Community support require. Review collected by and hosted on G2.com.

Raunak G.
RG
Product Growth
Small-Business (50 or fewer emp.)
"Difficult to set-up."
What do you like best about ThreatMapper?

It is difficult to set up Threatmapper with your tech. However, once done properly it can help significantly in assessing the potential sources from where cyber attacks or DDoS attacks might happen. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

The setting up is very difficult. It is not a plug-n-play solution. Need a dedicated developer to get this up and running within the organisation. Also, the learning curve is pretty steep for non-tech business owners. Review collected by and hosted on G2.com.

Isra K.
IK
Manager
Mid-Market (51-1000 emp.)
"ThreatMapper"
What do you like best about ThreatMapper?

Good Service of 24/7

Real-time discovery and visualization of applications in production

Sensored Roadmaps

Supports multi-cloud and multi-modality apps

Helpful Monitoring features

Notifications for every activity Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

Multiple limitations on threatmapper

Now Threatmapper is Open source platform

Third-party resources are not appropriate

Unknown vulnerabilities

Dev/DevOps are not aligned

Not all vulnerabilities can be patched Review collected by and hosted on G2.com.

Shivaling P.
SP
C
Mid-Market (51-1000 emp.)
"THREATMAPPER: WHAT YOU CANNOT SEE YOU CAN SECURE IT"
What do you like best about ThreatMapper?

The best thing i like is threatmapper is opensource now and can't wait to explore its full capabilities for multicloud implementation and kubernetes security scanning Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

since it is relatively new no community support available online to tune it to meet security best scanning across multicloud and also securing by scanning kubernetes clusters Review collected by and hosted on G2.com.

Apoorv C.
AC
Consultant
Small-Business (50 or fewer emp.)
"best platform for identifying vulnerabilities in images, repositories, containers etc."
What do you like best about ThreatMapper?

It notifies the developer about build failure. Users can also monitor the build status. Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

There should be training videos published itself by Threatmapper Review collected by and hosted on G2.com.

Julie G.
JG
Cybersecurity Ambassador
Small-Business (50 or fewer emp.)
"Usable for anyone"
What do you like best about ThreatMapper?

not intimidating in design and it's results are understandable Review collected by and hosted on G2.com.

What do you dislike about ThreatMapper?

Seems to lack some of the sparkliest regard Review collected by and hosted on G2.com.

Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
ThreatMapper
View Alternatives