Introducing G2.ai, the future of software buying.Try now
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at ThreatStryker, reclaim access to make changes.
Product Avatar Image
ThreatStryker

By Deepfence

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at ThreatStryker, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.0 out of 5 stars
5 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with ThreatStryker?

It's been two months since this profile received a new review
Leave a Review

ThreatStryker Reviews & Product Details

ThreatStryker Media

ThreatStryker Demo - ThreatStryker Topology View
Discover assets and measure the attack surface. View vulnerabilities and top risks.
ThreatStryker Demo - ThreatStryker Alerts View
What is happening within your application? Capture and interrogate alerts - network DPI indicators of attack, and on-host sensor indicators of compromise. ThreatStryker will correlate these events and assess the risk that each attack poses to your applications.
ThreatStryker Demo - ThreatStryker Exploits View
Understand which vulnerabilities pose the greatest risk of exploit to the integrity of your running applications.
Product Avatar Image

Have you used ThreatStryker before?

Answer a few questions to help the ThreatStryker community

ThreatStryker Reviews (1)

Reviews

ThreatStryker Reviews (1)

4.0
1 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
AM
Senior HR Business Partner
Hospital & Health Care
Mid-Market (51-1000 emp.)
"Vulnerability identification and attack monitoring"
What do you like best about ThreatStryker?

ThreatStryker is good at mapping my applications and identifying threats or weak points. This made it easy for me to understand my level of vulnerability, and what aspects to focus on first. The incorporation of runtime attack detection did look like the protection for active threat prevention. Review collected by and hosted on G2.com.

What do you dislike about ThreatStryker?

ThreatStryker can accurately identify threats, it does not offer an automated method to address them. It became arduous to fix each vulnerability individually since it was coupled with a massive environment. The lack of an automated patching function is a significant disadvantage for ThreatStryker. Review collected by and hosted on G2.com.

There are not enough reviews of ThreatStryker for G2 to provide buying insight. Below are some alternatives with more reviews:

1
FortiCNAPP Logo
FortiCNAPP
4.4
(383)
FortiCNAPP is a comprehensive Cloud-Native Application Protection Platform (CNAPP) that consolidates Cloud Security Posture Management (CSPM), Cloud Workload Protection (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes security, and compliance into a single solution. Using AI-based anomaly detection and behavioral analytics, FortiCNAPP continuously monitors cloud environments to identify misconfigurations, vulnerabilities, and active threats in real time. The platform supports agentless and agent-based deployment models, ensuring flexible coverage across diverse architectures. FortiCNAPP also integrates with the Fortinet Security Fabric, correlating cloud data with network and endpoint insights from FortiGuard, FortiSOAR, and more, delivering full-stack threat context, faster remediation, and unified risk management.
2
Wiz Logo
Wiz
4.7
(753)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Scrut Automation Logo
Scrut Automation
4.9
(1,297)
Automatically test your cloud configurations against 150+ CIS benchmarks across multiple cloud accounts on AWS, Azure, GCP and more, to maintain a strong infosec posture.
4
Vanta Logo
Vanta
4.6
(2,146)
It was clear that security and privacy had become mainstream issues, and that we all increasingly relied on cloud services to store everything from our personal photos to our communications at work. Vanta’s mission is to be the layer of trust on top of these services, and to secure the internet, increase trust in software companies, and keep consumer data safe. Today, we're a growing team in San Francisco passionate about making the internet more secure and elevating the standards for technology companies.
5
Sprinto Logo
Sprinto
4.8
(1,546)
Sprinto productizes and automates all compliance requirements that would otherwise require manual effort, documentation, and paperwork, end to end. It integrates with your business systems like GSuite, AWS, Github, Google Cloud, etc., and ensures that these systems are in the state required by SOC2/ISO27001. Sprinto also comes builtin with features like policies, security training, org charts, device monitoring, etc., to help you meet SOC 2/ISO27001 requirements without having to purchase new software for these. All in all, Sprinto takes care of all the compliance roadblocks and speaks the audit language on your behalf, while you focus on increasing revenue.
6
Drata Logo
Drata
4.8
(1,126)
Drata is the world's most advanced security and compliance automation platform with the mission to help businesses earn and keep the trust of their users, customers, partners, and prospects. With Drata, thousands of companies streamline risk management and over 12 compliance frameworks—such as SOC 2, ISO 27001, GDPR, CCPA, PCI DSS and more—through automation, resulting in a strong security posture, lower costs, and less time spent preparing for audits.
7
Secureframe Logo
Secureframe
4.7
(775)
Secureframe helps companies get enterprise ready by streamlining SOC 2 and ISO 27001 compliance. Secureframe allows companies to get compliant within weeks, rather than months and monitors 40+ services, including AWS, GCP, and Azure.
8
Thoropass Logo
Thoropass
4.7
(567)
Thoropass is an all-in-one compliance automation platform that streamlines the entire compliance and audit process by integrating advanced technology with expert guidance. Designed to eliminate the complexities associated with traditional compliance methods, Thoropass offers a seamless solution for achieving and maintaining certifications such as SOC 2, ISO 27001, HITRUST, PCI DSS, and HIPAA. By automating evidence collection, policy creation, and continuous monitoring, Thoropass significantly reduces manual effort, accelerates audit timelines, and enhances overall security posture. Key Features and Functionality: - Automated Evidence Collection and AI Validation: Streamlines the audit preparation process by automatically gathering and validating evidence, reducing manual workload and minimizing errors. - Continuous Monitoring and Alerts: Provides real-time tracking of compliance status and promptly notifies users of any issues, ensuring ongoing adherence to regulatory requirements. - Risk Assessment and Management: Offers tools to identify, assess, and mitigate security risks, helping organizations proactively manage their compliance landscape. - Security Questionnaire Automation: Simplifies the process of responding to security questionnaires by automating responses, saving time and ensuring consistency. - Integrated Audit Services: Combines compliance automation with in-house audit services, offering a cohesive and efficient audit experience without the need for third-party auditors. - Pentesting Services: Provides penetration testing to identify vulnerabilities, ensuring robust security measures are in place. Primary Value and Problem Solved: Thoropass addresses the challenges of traditional compliance processes, which often involve extensive manual effort, fragmented tools, and prolonged audit cycles. By offering a unified platform that automates key compliance tasks and integrates expert audit services, Thoropass reduces compliance and audit overhead by up to 80%, accelerates time-to-audit by 62%, and eliminates over 950 annual work hours for its customers. This comprehensive approach allows organizations to focus on their core business activities while maintaining a strong security and compliance posture.
9
Scytale Logo
Scytale
4.8
(556)
Scytale is the leading AI-powered compliance automation software, including dedicated GRC experts, that streamlines over 40 security and privacy frameworks like SOC 2, ISO 27001, PCI DSS, GDPR and ISO 42001.
10
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(303)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
ThreatStryker
View Alternatives