Introducing G2.ai, the future of software buying.Try now
Product Avatar Image

JupiterOne

Show rating breakdown
6 reviews
  • 1 profiles
  • 4 categories
Average star rating
4.9
Serving customers since
Profile Filters

All Products & Services

Profile Name

Star Rating

6
0
0
0
0

JupiterOne Reviews

Review Filters
Profile Name
Star Rating
6
0
0
0
0
Verified User in Financial Services
UF
Verified User in Financial Services
04/08/2025
Validated Reviewer
Review source: G2 invite
Incentivized Review

Good application

Cloud native cyber asset, security configuration
Syed K.
SK
Syed K.
Security Engineer | 2x AWS Certified
02/01/2023
Validated Reviewer
Review source: Organic

Fantastic automated solution for compliance, Cyber security posture, and more.

I love how easy it is to set up integrations across different applications. Every aspect of JupiterOne encourages smooth automation and visual presentation through its insights tab. As an auditor, I highly appreciate JupiterOne's ability to update and reuse evidence automatically across different security frameworks - cutting down the tedious work of evidence submission/review by around 80%.
Verified User in Computer Software
UC
Verified User in Computer Software
09/08/2022
Validated Reviewer
Review source: G2 invite
Incentivized Review

About

Contact

HQ Location:
Durham, US

Social

What is JupiterOne?

JupiterOne, accessible at https://jupiterone.io/, is a cybersecurity management platform that focuses on simplifying the complexity of security operations through the use of a powerful, asset-focused infrastructure. The platform is designed to help organizations manage their entire cyber asset universe by connecting and correlating data automatically across a wide array of digital environments. JupiterOne offers features like continuous security, compliance monitoring, vulnerability management, and threat analysis by leveraging a graph-based data model to provide deep insights and visualization of relationships between entities across an organization’s digital environment. This approach enables security teams to effectively manage risks, maintain compliance, and fortify their security posture by providing a comprehensive, up-to-date view of their infrastructure, applications, and data.

Details