This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review
Compare this with other toolsSave it to your board and evaluate your options side by side.
Save to board

Valence Security Reviews & Product Details

Profile Status

This profile is currently managed by Valence Security but has limited features.

Are you part of the Valence Security team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used Valence Security before?

Answer a few questions to help the Valence Security community

Valence Security Reviews (1)

Reviews

Valence Security Reviews (1)

5.0
1 reviews
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
Verified User in Computer Software
UC
Small-Business (50 or fewer emp.)
"Valence Security is awesome"
What do you like best about Valence Security?

I like valence security for it great protection related to SAAS and SSPM safeguards. Review collected by and hosted on G2.com.

What do you dislike about Valence Security?

Nothing notable, but i would like better UI with more language accessibility that's internal. Review collected by and hosted on G2.com.

There are not enough reviews of Valence Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Cynet Logo
Cynet
4.7
(250)
AutoXDR™ converges multiple technologies (EPP, EDR, UBA, Deception, Network Analytics and vulnerability management), with a 24/7 cyber SWAT team, to provide unparalleled visibility and defend all domains of your internal network: endpoints, network, files and users, from all types of attacks.
2
SpinOne Logo
SpinOne
4.8
(126)
All-in-One SaaS Security for Mission-Critical SaaS Apps
3
Netskope One Platform Logo
Netskope One Platform
4.4
(73)
Netskope is a Cloud Access Security Broker (CASB)
4
Varonis Data Security Platform Logo
Varonis Data Security Platform
4.6
(61)
Data Security platform detects insider threats and cyberattacks by analyzing data, account activity, and user behavior; prevents and limits disaster by locking down sensitive and stale data; and efficiently sustains a secure state with automation.
5
Zygon Logo
Zygon
4.9
(46)
Modern IT and Security teams use our platform to orchestrate modern identity governance at scale. Access reviews, account (de)provisioning and overall identity lifecycle operations are automated for all their applications.
6
CrowdStrike Falcon Shield Logo
CrowdStrike Falcon Shield
4.8
(32)
Proactively find and fix weaknesses across your SaaS platforms, and maintain continuous security for all global settings and user privileges.
7
Metomic Logo
Metomic
4.6
(19)
Metomic helps companies protect sensitive data across their SaaS apps.
8
Nudge Security Logo
Nudge Security
4.5
(18)
Nudge Security continuously discovers and inventories every cloud and SaaS application your employees use at work, including shadow IT, so you can understand and manage your SaaS security posture. Nudge Security helps busy security and IT teams work more efficiently with automated playbooks that accelerate SOC 2 access reviews, employee offboarding, and SSO onboarding. When an application in your SaaS supply chain experiences a breach, Nudge Security alerts you to the risk and helps you intervene to protect potentially-affected accounts.
9
SaaS Alerts Logo
SaaS Alerts
4.6
(12)
SaaS Alerts helps you prevent breaches, protect client data and become a proactive, strategic partner in your clients’ cybersecurity.
10
Workspace Audit Logo
Workspace Audit
4.7
(11)
Find and Fix Security Gaps in Your Google Workspace Get a complete, automated overview of your security posture. Our read-only scanner identifies misconfigurations and provides actionable steps to improve your Workspace environment. We also help you STAY secure. With our automated monitoring you schedule daily, weekly or monthly scans, allowing you to fix issues before they become a problem.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Valence Security