This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
It lets us analyze the all the assests on network making sure that no device is left unchecked and the scoring system helps us to priortize the vulnerabilities. Review collected by and hosted on G2.com.
there were some instance where i noticed some of the bugs which lead to unuse of the tool for a limited period of time and scanning process hinders the system usage. Review collected by and hosted on G2.com.
Validated through LinkedIn
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.

