Introducing G2.ai, the future of software buying.Try now

Top Free Attack Surface Management Software

Check out our list of free Attack Surface Management Software. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Attack Surface Management Software to ensure you get the right product.

View Free Attack Surface Management Software

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
44 Attack Surface Management Products Available
(712)4.7 out of 5
Optimized for quick response
5th Easiest To Use in Attack Surface Management software
View top Consulting Services for Wiz
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Wiz features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 9.0
    8.9
    Continuous Monitoring
    Average: 9.0
    8.7
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Kenny L.
    KL
    Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
    JS
    The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    18,649 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,991 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including more than 50% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the developme

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 9.0
8.9
Continuous Monitoring
Average: 9.0
8.7
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Kenny L.
KL
Wiz.io enables my small SaaS company with enterprise-grade security solutions for our cloud-native environments by simplifying security management,... Read review
JS
The ease of use and the ability for us to have our application teams get just the information they needed was why we selected the product. Getting... Read review
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
18,649 Twitter followers
LinkedIn® Page
www.linkedin.com
2,991 employees on LinkedIn®
(293)4.5 out of 5
Optimized for quick response
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    9.0
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.5
    8.9
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Abhishek Kumar G.
    AG
    1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
    DN
    -Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,341 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Tenable Nessus features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
9.0
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.5
8.9
Ease of Admin
Average: 8.9
Abhishek Kumar G.
AG
1. Portability: Install on Laptop and use any where required. 2.Quick: Quickly completes scan. 3.Easy to use. 4. Cost effective. Read review
DN
-Free to use -Has community version where you can use Nessus for free to some extent -Great user interface -It also identifies miscofinguration... Read review
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,495 Twitter followers
LinkedIn® Page
www.linkedin.com
2,341 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(195)4.8 out of 5
Optimized for quick response
7th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.0
    9.3
    Compliance Monitoring
    Average: 8.5
    9.6
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • RE
    Intruder delivers a great balance between strong vulnerability scanning capabilities and a clean, intuitive user experience. The setup was... Read review
    Yiannis B.
    YB
    Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    973 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    80 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 35% Mid-Market
Intruder features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.0
9.3
Compliance Monitoring
Average: 8.5
9.6
Ease of Admin
Average: 8.9
RE
Intruder delivers a great balance between strong vulnerability scanning capabilities and a clean, intuitive user experience. The setup was... Read review
Yiannis B.
YB
Easy to use, automated and accepted by certification bodies. It allows you to do scans on apps and infrastructure plus so you can go as deep as you... Read review
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
973 Twitter followers
LinkedIn® Page
www.linkedin.com
80 employees on LinkedIn®
(108)4.9 out of 5
12th Easiest To Use in Attack Surface Management software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    9.8
    Compliance Monitoring
    Average: 8.5
    9.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Pratik J.
    PJ
    Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
    R Bhanu P.
    RP
    We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,620 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,002 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
9.8
Compliance Monitoring
Average: 8.5
9.8
Ease of Admin
Average: 8.9
Pratik J.
PJ
Third party integrations, vulnerability management, secret scanning, IaC scanning is what our engineering teams use daily. Strongly recommend... Read review
R Bhanu P.
RP
We like three things about PingSafe: - Hassle-free agentless onboarding - Real-time zero false-positives alerts - And a great product support team Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,620 Twitter followers
LinkedIn® Page
www.linkedin.com
3,002 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 65% Mid-Market
    • 34% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    10.0
    Vulnerability Intelligence
    Average: 9.0
    9.9
    Continuous Monitoring
    Average: 9.0
    9.9
    Compliance Monitoring
    Average: 8.5
    9.7
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Krishna Chaitanya P.
    KP
    Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
    Tanuj M.
    TM
    Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    184 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 65% Mid-Market
  • 34% Small-Business
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
10.0
Vulnerability Intelligence
Average: 9.0
9.9
Continuous Monitoring
Average: 9.0
9.9
Compliance Monitoring
Average: 8.5
9.7
Ease of Admin
Average: 8.9
Krishna Chaitanya P.
KP
Riskprofiler offers value for money, considering its features and benefits, and usability. Read review
Tanuj M.
TM
Its the best security solution. Has helped us in managing external as well as internal threats efficiently. It can also be used to manage multiple... Read review
Seller Details
Company Website
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
184 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
(87)4.8 out of 5
4th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

    Users
    • Security Analyst
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 51% Enterprise
    • 30% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSEK features and usability ratings that predict user satisfaction
    8.9
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.0
    9.2
    Compliance Monitoring
    Average: 8.5
    9.6
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • AR
    Cloudsek offers AI-driven threat intelligence that delivers real-time insights. Read review
    MK
    CloudSek XVigil is a robust and user-friendly threat intelligence platform that provides timely, actionable insights to enhance cyber-security. The... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CloudSEK
    Year Founded
    2015
    HQ Location
    Singapore, SG
    Twitter
    @cloudsek
    2,308 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    214 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSEK is a contextual AI company that predicts Cyber Threats. We combine the power of Cyber Crime monitoring, Brand Monitoring, Attack Surface monitoring, and Supply Chain intelligence to give con

Users
  • Security Analyst
Industries
  • Financial Services
  • Banking
Market Segment
  • 51% Enterprise
  • 30% Mid-Market
CloudSEK features and usability ratings that predict user satisfaction
8.9
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.0
9.2
Compliance Monitoring
Average: 8.5
9.6
Ease of Admin
Average: 8.9
AR
Cloudsek offers AI-driven threat intelligence that delivers real-time insights. Read review
MK
CloudSek XVigil is a robust and user-friendly threat intelligence platform that provides timely, actionable insights to enhance cyber-security. The... Read review
Seller Details
Seller
CloudSEK
Year Founded
2015
HQ Location
Singapore, SG
Twitter
@cloudsek
2,308 Twitter followers
LinkedIn® Page
www.linkedin.com
214 employees on LinkedIn®
(76)4.5 out of 5
Optimized for quick response
13th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 39% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Saner CVEM features and usability ratings that predict user satisfaction
    9.5
    Vulnerability Intelligence
    Average: 9.0
    9.1
    Continuous Monitoring
    Average: 9.0
    9.1
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • JS
    It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
    SV
    I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Avantech
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    559 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    145 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerCyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large enterpr

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 39% Small-Business
Saner CVEM features and usability ratings that predict user satisfaction
9.5
Vulnerability Intelligence
Average: 9.0
9.1
Continuous Monitoring
Average: 9.0
9.1
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
JS
It is a security management platform focused on endpoints providing responsiveness in the agents and server having a positive effect as it scans... Read review
SV
I like this tool because it is easy to use and awesome. I like to access it from anywhere and make quick evaluations without having to adjust... Read review
Seller Details
Seller
Avantech
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
559 Twitter followers
LinkedIn® Page
www.linkedin.com
145 employees on LinkedIn®
(69)4.8 out of 5
8th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
    9.1
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.0
    8.3
    Compliance Monitoring
    Average: 8.5
    8.9
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Retail
    AR
    SOCRadar brings everything together in one place—threat intelligence, digital risk protection, and attack surface monitoring—so you don’t need... Read review
    Verified User in Government Administration
    AG
    It enables us to understand the current threat with speed and precision Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SOCRadar
    Company Website
    Year Founded
    2018
    HQ Location
    Delaware
    Twitter
    @socradar
    5,442 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Since 2019, SOCRadar has been a pioneer in SaaS cybersecurity, now serving over 900 customers across 75 countries. Our mission is to provide accessible, proactive threat intelligence. Today, SOCRadar

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
SOCRadar Extended Threat Intelligence features and usability ratings that predict user satisfaction
9.1
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.0
8.3
Compliance Monitoring
Average: 8.5
8.9
Ease of Admin
Average: 8.9
Verified User in Retail
AR
SOCRadar brings everything together in one place—threat intelligence, digital risk protection, and attack surface monitoring—so you don’t need... Read review
Verified User in Government Administration
AG
It enables us to understand the current threat with speed and precision Read review
Seller Details
Seller
SOCRadar
Company Website
Year Founded
2018
HQ Location
Delaware
Twitter
@socradar
5,442 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Detectify features and usability ratings that predict user satisfaction
    9.0
    Vulnerability Intelligence
    Average: 9.0
    10.0
    Continuous Monitoring
    Average: 9.0
    9.4
    Compliance Monitoring
    Average: 8.5
    8.7
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Computer Software
    AC
    Easy to use. At the same time it saves us a lot of the guessing work. Read review
    Verified User in Gambling & Casinos
    AG
    The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,361 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    98 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify features and usability ratings that predict user satisfaction
9.0
Vulnerability Intelligence
Average: 9.0
10.0
Continuous Monitoring
Average: 9.0
9.4
Compliance Monitoring
Average: 8.5
8.7
Ease of Admin
Average: 8.9
Verified User in Computer Software
AC
Easy to use. At the same time it saves us a lot of the guessing work. Read review
Verified User in Gambling & Casinos
AG
The ease of use with complete results. It's fairly easy to setup detectify and get it up and running, the output from scans is easily reviewed and... Read review
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,361 Twitter followers
LinkedIn® Page
www.linkedin.com
98 employees on LinkedIn®
(60)4.7 out of 5
9th Easiest To Use in Attack Surface Management software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

    Users
    No information available
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 43% Enterprise
    • 40% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • CTM360 is a digital risk protection and threat intelligence platform that offers services such as brand protection, anti-phishing, and takedowns.
    • Reviewers like the platform's user-friendly interface, comprehensive coverage, proactive monitoring, and the highly responsive and professional support team.
    • Reviewers experienced some difficulties with the platform's interface, finding it not user-friendly at times, and mentioned that the takedown process can sometimes be slow.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CTM360 features and usability ratings that predict user satisfaction
    8.7
    Vulnerability Intelligence
    Average: 9.0
    8.7
    Continuous Monitoring
    Average: 9.0
    8.7
    Compliance Monitoring
    Average: 8.5
    9.5
    Ease of Admin
    Average: 8.9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CTM360
    Company Website
    Year Founded
    2014
    HQ Location
    Manama, BH
    Twitter
    @teamCTM360
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CTM360 is a consolidated external security platform that integrates External Attack Surface Management, Digital Risk Protection, Cyber Threat Intelligence, Brand Protection & Anti-phishing, Surfac

Users
No information available
Industries
  • Banking
  • Financial Services
Market Segment
  • 43% Enterprise
  • 40% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • CTM360 is a digital risk protection and threat intelligence platform that offers services such as brand protection, anti-phishing, and takedowns.
  • Reviewers like the platform's user-friendly interface, comprehensive coverage, proactive monitoring, and the highly responsive and professional support team.
  • Reviewers experienced some difficulties with the platform's interface, finding it not user-friendly at times, and mentioned that the takedown process can sometimes be slow.
CTM360 features and usability ratings that predict user satisfaction
8.7
Vulnerability Intelligence
Average: 9.0
8.7
Continuous Monitoring
Average: 9.0
8.7
Compliance Monitoring
Average: 8.5
9.5
Ease of Admin
Average: 8.9
Seller Details
Seller
CTM360
Company Website
Year Founded
2014
HQ Location
Manama, BH
Twitter
@teamCTM360
978 Twitter followers
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Small-Business
    • 41% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Notus features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    9.9
    Continuous Monitoring
    Average: 9.0
    9.6
    Compliance Monitoring
    Average: 8.5
    8.5
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    CI
    Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2023
    HQ Location
    London, GB
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Notus's primary focus is to overcome cyber asset visibility by integrating with a wide range of data sources, providing security teams with comprehensive, continuous, unified, and up-to-date visibilit

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Small-Business
  • 41% Mid-Market
Notus features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
9.9
Continuous Monitoring
Average: 9.0
9.6
Compliance Monitoring
Average: 8.5
8.5
Ease of Admin
Average: 8.9
Verified User in Information Technology and Services
CI
Efficient resource utilization is a key advantage of CAASM products like Notus, optimizing resource allocation for cost savings and improved... Read review
Seller Details
Year Founded
2023
HQ Location
London, GB
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
(41)4.7 out of 5
Optimized for quick response
14th Easiest To Use in Attack Surface Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 63% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyble features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    9.2
    Continuous Monitoring
    Average: 9.0
    8.7
    Compliance Monitoring
    Average: 8.5
    9.4
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Information Technology and Services
    II
    Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
    Verified User in Information Technology and Services
    AI
    One product with almost 14 capabilities. We were able to consolidate 5 different products into one leading to huge cost saving and at the same time... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyble
    Company Website
    Year Founded
    2019
    HQ Location
    Alpharetta, US
    Twitter
    @cybleglobal
    17,253 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    240 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cyble is an AI-native cybersecurity solution designed to help organizations enhance their digital security posture through real-time intelligence, detection, and response capabilities. By leveraging a

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 63% Enterprise
  • 24% Mid-Market
Cyble features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
9.2
Continuous Monitoring
Average: 9.0
8.7
Compliance Monitoring
Average: 8.5
9.4
Ease of Admin
Average: 8.9
Verified User in Information Technology and Services
II
Cyble consistently delivers results with a proactive approach and is always used to introduce new features to help monitor all the Dark Web... Read review
Verified User in Information Technology and Services
AI
One product with almost 14 capabilities. We were able to consolidate 5 different products into one leading to huge cost saving and at the same time... Read review
Seller Details
Seller
Cyble
Company Website
Year Founded
2019
HQ Location
Alpharetta, US
Twitter
@cybleglobal
17,253 Twitter followers
LinkedIn® Page
www.linkedin.com
240 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Glasstrail features and usability ratings that predict user satisfaction
    9.7
    Vulnerability Intelligence
    Average: 9.0
    9.6
    Continuous Monitoring
    Average: 9.0
    9.5
    Compliance Monitoring
    Average: 8.5
    8.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Raj kumar k.
    RK
    By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
    Deep Shree V.
    DV
    Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Auckland
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Glasstrail does all the hard work of identifying weaknesses in your external attack surface before bad actors do. Weekly scans prioritise issues as digestible actions. Track progress via the dashboard

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
Glasstrail features and usability ratings that predict user satisfaction
9.7
Vulnerability Intelligence
Average: 9.0
9.6
Continuous Monitoring
Average: 9.0
9.5
Compliance Monitoring
Average: 8.5
8.8
Ease of Admin
Average: 8.9
Raj kumar k.
RK
By using GlassTrail I am free from all cyber risks. Because earlier I tried to protect myself from cyber risks in many places but nothing worked... Read review
Deep Shree V.
DV
Its offers automated scans to detect vulnerabilities. Its also avoid from potential security risks. Its also manage system when user is busy with... Read review
Seller Details
HQ Location
Auckland
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 73% Mid-Market
    • 7% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Halo Security features and usability ratings that predict user satisfaction
    8.2
    Vulnerability Intelligence
    Average: 9.0
    8.8
    Continuous Monitoring
    Average: 9.0
    8.5
    Compliance Monitoring
    Average: 8.5
    7.8
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • SH
    I appreciate the easy user experience of Halo Security, which makes it simple to use once installed. I value the software's ability to protect... Read review
    Verified User in Information Technology and Services
    EI
    I appreciate the actionable insights that Halo Security offers. Instead of simply listing vulnerabilities, it helps you identify which ones are... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Miami Beach, US
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Halo Security is an External Attack Surface Management (EASM) platform that helps organizations discover, monitor, and secure their external digital footprint against cyber threats. The solution enabl

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 73% Mid-Market
  • 7% Small-Business
Halo Security features and usability ratings that predict user satisfaction
8.2
Vulnerability Intelligence
Average: 9.0
8.8
Continuous Monitoring
Average: 9.0
8.5
Compliance Monitoring
Average: 8.5
7.8
Ease of Admin
Average: 8.9
SH
I appreciate the easy user experience of Halo Security, which makes it simple to use once installed. I value the software's ability to protect... Read review
Verified User in Information Technology and Services
EI
I appreciate the actionable insights that Halo Security offers. Instead of simply listing vulnerabilities, it helps you identify which ones are... Read review
Seller Details
Company Website
Year Founded
2013
HQ Location
Miami Beach, US
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Edgescan features and usability ratings that predict user satisfaction
    9.2
    Vulnerability Intelligence
    Average: 9.0
    6.1
    Continuous Monitoring
    Average: 9.0
    5.0
    Compliance Monitoring
    Average: 8.5
    9.0
    Ease of Admin
    Average: 8.9
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Evan B.
    EB
    The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
    Mark H.
    MH
    Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,305 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    91 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
  • Computer Software
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Edgescan features and usability ratings that predict user satisfaction
9.2
Vulnerability Intelligence
Average: 9.0
6.1
Continuous Monitoring
Average: 9.0
5.0
Compliance Monitoring
Average: 8.5
9.0
Ease of Admin
Average: 8.9
Evan B.
EB
The services that they offer are easy to integrate and simple to monitor. The people behind the product are some of the best in the industry and... Read review
Mark H.
MH
Edgescan allows us to execute penetration tests and security scans monthly at a great price point. Uncovered vulnerabilities can be addressed more... Read review
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,305 Twitter followers
LinkedIn® Page
www.linkedin.com
91 employees on LinkedIn®