[go: up one dir, main page]

Introducing G2.ai, the future of software buying.Try now

Best Risk-Based Vulnerability Management Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities
Show More
Show Less

Featured Risk-Based Vulnerability Management Software At A Glance

Cyberint, a Check Point Company
Sponsored
Highest Performer:
Top Trending:
Show LessShow More
Highest Performer:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
185 Listings in Risk-Based Vulnerability Management Available
(274)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Arctic Wolf
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

    Users
    • IT Manager
    • IT Director
    Industries
    • Hospital & Health Care
    • Financial Services
    Market Segment
    • 71% Mid-Market
    • 19% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Arctic Wolf Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    53
    Threat Detection
    44
    Cybersecurity
    26
    Ease of Use
    25
    Risk Management
    18
    Cons
    Expensive
    10
    False Positives
    6
    Learning Curve
    6
    Cybersecurity Risks
    5
    Inefficient Ticketing System
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Arctic Wolf features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.3
    9.5
    Reporting
    Average: 8.7
    9.6
    Vulnerability Intelligence
    Average: 8.7
    9.6
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2012
    HQ Location
    Eden Prairie, MN
    Twitter
    @AWNetworks
    4,357 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,232 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service.

Users
  • IT Manager
  • IT Director
Industries
  • Hospital & Health Care
  • Financial Services
Market Segment
  • 71% Mid-Market
  • 19% Enterprise
Arctic Wolf Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
53
Threat Detection
44
Cybersecurity
26
Ease of Use
25
Risk Management
18
Cons
Expensive
10
False Positives
6
Learning Curve
6
Cybersecurity Risks
5
Inefficient Ticketing System
5
Arctic Wolf features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.3
9.5
Reporting
Average: 8.7
9.6
Vulnerability Intelligence
Average: 8.7
9.6
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2012
HQ Location
Eden Prairie, MN
Twitter
@AWNetworks
4,357 Twitter followers
LinkedIn® Page
www.linkedin.com
3,232 employees on LinkedIn®
(63)4.5 out of 5
13th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HackerOne Bounty significantly reduces your threat exposure by tapping into the largest global community of ethical hackers. This dynamic solution offers preemptive and continuous oversight of your di

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 41% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • HackerOne Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Helpful
    12
    Collaboration
    11
    Customer Support
    11
    Security Protection
    11
    Cons
    Complexity Issues
    5
    Expensive
    5
    Time Management
    5
    Poor Customer Support
    4
    Poor Interface Design
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HackerOne Platform features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.3
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HackerOne
    Year Founded
    2012
    HQ Location
    San Francisco, California
    Twitter
    @Hacker0x01
    326,931 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,145 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

HackerOne Bounty significantly reduces your threat exposure by tapping into the largest global community of ethical hackers. This dynamic solution offers preemptive and continuous oversight of your di

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 41% Enterprise
HackerOne Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Helpful
12
Collaboration
11
Customer Support
11
Security Protection
11
Cons
Complexity Issues
5
Expensive
5
Time Management
5
Poor Customer Support
4
Poor Interface Design
4
HackerOne Platform features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.3
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
HackerOne
Year Founded
2012
HQ Location
San Francisco, California
Twitter
@Hacker0x01
326,931 Twitter followers
LinkedIn® Page
www.linkedin.com
6,145 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(158)4.6 out of 5
15th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

    Users
    • Threat Intelligence Analyst
    Industries
    • Financial Services
    • Computer & Network Security
    Market Segment
    • 71% Enterprise
    • 18% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence, predictive analytics, and integrates with other security tools.
    • Reviewers like the platform's ability to provide a well-curated list of relevant threat actors, detailed TTPs, and proactive approach to threat hunting, making it a valuable tool for improving threat visibility and response.
    • Users mentioned that Recorded Future can be overwhelming due to its complex interface, high cost, steep learning curve, and the potential for alert fatigue if not carefully fine-tuned.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Recorded Future Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    67
    Features
    66
    Threat Detection
    48
    Threat Intelligence
    48
    Insights
    43
    Cons
    Expensive
    29
    Complexity
    26
    Learning Curve
    19
    Information Overload
    18
    Difficult Learning
    17
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Recorded Future features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.9
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2009
    HQ Location
    Somerville, US
    Twitter
    @RecordedFuture
    108,837 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,104 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the

Users
  • Threat Intelligence Analyst
Industries
  • Financial Services
  • Computer & Network Security
Market Segment
  • 71% Enterprise
  • 18% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Recorded Future is a threat intelligence platform that provides real-time, actionable threat intelligence, predictive analytics, and integrates with other security tools.
  • Reviewers like the platform's ability to provide a well-curated list of relevant threat actors, detailed TTPs, and proactive approach to threat hunting, making it a valuable tool for improving threat visibility and response.
  • Users mentioned that Recorded Future can be overwhelming due to its complex interface, high cost, steep learning curve, and the potential for alert fatigue if not carefully fine-tuned.
Recorded Future Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
67
Features
66
Threat Detection
48
Threat Intelligence
48
Insights
43
Cons
Expensive
29
Complexity
26
Learning Curve
19
Information Overload
18
Difficult Learning
17
Recorded Future features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.9
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2009
HQ Location
Somerville, US
Twitter
@RecordedFuture
108,837 Twitter followers
LinkedIn® Page
www.linkedin.com
1,104 employees on LinkedIn®
(108)4.9 out of 5
1st Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Starting at $4,999.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    • Security Consultant
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 65% Mid-Market
    • 34% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    55
    Features
    27
    Customer Support
    26
    Threat Detection
    26
    Easy Integrations
    23
    Cons
    Complexity
    10
    Difficult Learning
    8
    Complex Setup
    7
    Learning Curve
    7
    Complex Searching
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
    9.9
    Has the product been a good partner in doing business?
    Average: 9.3
    9.9
    Reporting
    Average: 8.7
    9.9
    Vulnerability Intelligence
    Average: 8.7
    9.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    183 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
  • Security Consultant
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 65% Mid-Market
  • 34% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
55
Features
27
Customer Support
26
Threat Detection
26
Easy Integrations
23
Cons
Complexity
10
Difficult Learning
8
Complex Setup
7
Learning Curve
7
Complex Searching
5
RiskProfiler - External Threat Exposure Management features and usability ratings that predict user satisfaction
9.9
Has the product been a good partner in doing business?
Average: 9.3
9.9
Reporting
Average: 8.7
9.9
Vulnerability Intelligence
Average: 8.7
9.9
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
183 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
(114)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Risk-Based Vulnerability Management software
View top Consulting Services for Tenable Vulnerability Management
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    12
    Ease of Use
    10
    Automated Scanning
    9
    Scanning Efficiency
    9
    Easy Integrations
    5
    Cons
    Lack of Information
    5
    Expensive
    4
    Insufficient Information
    4
    Pricing Issues
    4
    Difficult Learning
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.1
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.7
    8.8
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,433 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,341 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
12
Ease of Use
10
Automated Scanning
9
Scanning Efficiency
9
Easy Integrations
5
Cons
Lack of Information
5
Expensive
4
Insufficient Information
4
Pricing Issues
4
Difficult Learning
3
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
8.1
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.7
8.8
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,433 Twitter followers
LinkedIn® Page
www.linkedin.com
2,341 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 61% Enterprise
    • 18% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ServiceNow Security Operations Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Integration Capabilities
    8
    Integration Support
    7
    Ease of Use
    6
    Incident Management
    6
    Implementation Ease
    5
    Cons
    Difficult Setup
    3
    Integration Issues
    3
    Expensive
    2
    Learning Curve
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Security Operations features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.7
    9.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    52,613 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30,456 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simplify and automate threat and vulnerability management and incident response while reducing risks to your organization. ServiceNow Security Operations powered by AI Agents helps security teams scal

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 61% Enterprise
  • 18% Mid-Market
ServiceNow Security Operations Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Integration Capabilities
8
Integration Support
7
Ease of Use
6
Incident Management
6
Implementation Ease
5
Cons
Difficult Setup
3
Integration Issues
3
Expensive
2
Learning Curve
2
Licensing Issues
2
ServiceNow Security Operations features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.7
9.4
Risk-Prioritization
Average: 8.7
Seller Details
Company Website
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
52,613 Twitter followers
LinkedIn® Page
www.linkedin.com
30,456 employees on LinkedIn®
(140)4.6 out of 5
4th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

    Users
    • Security Threat Analyst
    Industries
    • Banking
    • Financial Services
    Market Segment
    • 70% Enterprise
    • 21% Mid-Market
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Cyberint is a proactive intelligence tool that provides an 'attacker's-eye view' of an organization, alerting to risks like credential leaks, phishing campaigns, and unauthorized brand usage.
    • Reviewers like the platform's ability to provide early warnings on critical risks, its efficient handling of malicious content removal, and the support provided by its team.
    • Users reported a significant learning period to unlock the platform's full potential, the overwhelming volume of raw data, and the need for more robust customization options for reporting.
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberint, a Check Point Company Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    58
    Threat Intelligence
    51
    Threat Detection
    41
    Customer Support
    38
    Insights
    37
    Cons
    Inefficient Alerts
    19
    Inefficient Alert System
    13
    False Positives
    12
    Integration Issues
    10
    Missing Features
    9
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
    9.4
    Has the product been a good partner in doing business?
    Average: 9.3
    8.9
    Reporting
    Average: 8.7
    9.4
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,231 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8,330 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Cyberint, otherwise known as Check Point External Risk Management, reduces risk by helping organizations detect and mitigate external cyber threats before they have an adverse impact. The solution p

Users
  • Security Threat Analyst
Industries
  • Banking
  • Financial Services
Market Segment
  • 70% Enterprise
  • 21% Mid-Market
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Cyberint is a proactive intelligence tool that provides an 'attacker's-eye view' of an organization, alerting to risks like credential leaks, phishing campaigns, and unauthorized brand usage.
  • Reviewers like the platform's ability to provide early warnings on critical risks, its efficient handling of malicious content removal, and the support provided by its team.
  • Users reported a significant learning period to unlock the platform's full potential, the overwhelming volume of raw data, and the need for more robust customization options for reporting.
Cyberint, a Check Point Company Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
58
Threat Intelligence
51
Threat Detection
41
Customer Support
38
Insights
37
Cons
Inefficient Alerts
19
Inefficient Alert System
13
False Positives
12
Integration Issues
10
Missing Features
9
Cyberint, a Check Point Company features and usability ratings that predict user satisfaction
9.4
Has the product been a good partner in doing business?
Average: 9.3
8.9
Reporting
Average: 8.7
9.4
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,231 Twitter followers
LinkedIn® Page
www.linkedin.com
8,330 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key func

    Users
    • Cyber Security Analyst
    • SOC Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Palo Alto Cortex XSIAM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Threat Detection
    38
    Integrations
    28
    Cybersecurity
    26
    Features
    25
    Cons
    Expensive
    27
    Difficult Learning
    17
    Integration Issues
    15
    Complexity
    13
    UX Improvement
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    9.5
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.5
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2005
    HQ Location
    Santa Clara, CA
    Twitter
    @PaloAltoNtwks
    127,614 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17,946 employees on LinkedIn®
    Ownership
    NYSE: PANW
Product Description
How are these determined?Information
This description is provided by the seller.

Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key func

Users
  • Cyber Security Analyst
  • SOC Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 29% Mid-Market
Palo Alto Cortex XSIAM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Threat Detection
38
Integrations
28
Cybersecurity
26
Features
25
Cons
Expensive
27
Difficult Learning
17
Integration Issues
15
Complexity
13
UX Improvement
12
Palo Alto Cortex XSIAM features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
9.5
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.5
Risk-Prioritization
Average: 8.7
Seller Details
Year Founded
2005
HQ Location
Santa Clara, CA
Twitter
@PaloAltoNtwks
127,614 Twitter followers
LinkedIn® Page
www.linkedin.com
17,946 employees on LinkedIn®
Ownership
NYSE: PANW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

    Users
    • Security Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 51% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VMDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Features
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Alerting System
    1
    Cons
    Complexity
    2
    Complex Reporting
    1
    Complex Setup
    1
    Difficult Learning
    1
    Feature Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VMDR features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.3
    Reporting
    Average: 8.7
    8.7
    Vulnerability Intelligence
    Average: 8.7
    8.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,236 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,126 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable step

Users
  • Security Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 51% Enterprise
  • 28% Mid-Market
Qualys VMDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Features
2
Vulnerability Detection
2
Vulnerability Identification
2
Alerting System
1
Cons
Complexity
2
Complex Reporting
1
Complex Setup
1
Difficult Learning
1
Feature Complexity
1
Qualys VMDR features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
8.3
Reporting
Average: 8.7
8.7
Vulnerability Intelligence
Average: 8.7
8.4
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,236 Twitter followers
LinkedIn® Page
www.linkedin.com
3,126 employees on LinkedIn®
(46)4.9 out of 5
Optimized for quick response
7th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:Starting at $499.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

    Users
    No information available
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • vRx by Vicarius Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    22
    Automation
    20
    Patch Management
    19
    Features
    15
    Vulnerability Identification
    13
    Cons
    Missing Features
    12
    Inaccurate Information
    3
    Inadequate Reporting
    3
    Poor Reporting
    3
    Complexity
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • vRx by Vicarius features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.8
    Reporting
    Average: 8.7
    9.2
    Vulnerability Intelligence
    Average: 8.7
    9.5
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vicarius
    Company Website
    Year Founded
    2016
    HQ Location
    New York, New York
    Twitter
    @vicariusltd
    2,180 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    110 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

vRx by Vicarius goes beyond patch management to offer the most advanced vulnerability remediation solution in the market. vRx offers 3 built-in methods to keep you covered at all times: 1) Automa

Users
No information available
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 37% Small-Business
vRx by Vicarius Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
22
Automation
20
Patch Management
19
Features
15
Vulnerability Identification
13
Cons
Missing Features
12
Inaccurate Information
3
Inadequate Reporting
3
Poor Reporting
3
Complexity
2
vRx by Vicarius features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.3
8.8
Reporting
Average: 8.7
9.2
Vulnerability Intelligence
Average: 8.7
9.5
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Vicarius
Company Website
Year Founded
2016
HQ Location
New York, New York
Twitter
@vicariusltd
2,180 Twitter followers
LinkedIn® Page
www.linkedin.com
110 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

    Users
    No information available
    Industries
    • Computer & Network Security
    • Financial Services
    Market Segment
    • 60% Enterprise
    • 23% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Security Center Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Discovery
    2
    Features
    2
    Vulnerability Identification
    2
    Asset Management
    1
    Automated Scanning
    1
    Cons
    Complexity
    1
    Complex Queries
    1
    Complex Setup
    1
    Difficult Setup
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Security Center features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.3
    8.6
    Reporting
    Average: 8.7
    9.5
    Vulnerability Intelligence
    Average: 8.7
    9.4
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,433 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,341 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Security Center (formerly Tenable.sc) is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuo

Users
No information available
Industries
  • Computer & Network Security
  • Financial Services
Market Segment
  • 60% Enterprise
  • 23% Mid-Market
Tenable Security Center Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Discovery
2
Features
2
Vulnerability Identification
2
Asset Management
1
Automated Scanning
1
Cons
Complexity
1
Complex Queries
1
Complex Setup
1
Difficult Setup
1
False Positives
1
Tenable Security Center features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.3
8.6
Reporting
Average: 8.7
9.5
Vulnerability Intelligence
Average: 8.7
9.4
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Tenable
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,433 Twitter followers
LinkedIn® Page
www.linkedin.com
2,341 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 34% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Defender Vulnerability Management features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.3
    8.7
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    8.8
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    13,963,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    232,306 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 34% Enterprise
Microsoft Defender Vulnerability Management features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.3
8.7
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
8.8
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
13,963,646 Twitter followers
LinkedIn® Page
www.linkedin.com
232,306 employees on LinkedIn®
Ownership
MSFT
(143)4.5 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Banking
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    47
    Ease of Use
    45
    Security
    45
    Automation
    34
    Vulnerability Detection
    33
    Cons
    Expensive
    13
    Limited Scope
    11
    Technical Issues
    11
    Inadequate Reporting
    10
    Limited Features
    10
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Pentera features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.0
    Reporting
    Average: 8.7
    8.3
    Vulnerability Intelligence
    Average: 8.7
    8.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,383 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    430 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Banking
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
47
Ease of Use
45
Security
45
Automation
34
Vulnerability Detection
33
Cons
Expensive
13
Limited Scope
11
Technical Issues
11
Inadequate Reporting
10
Limited Features
10
Pentera features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.0
Reporting
Average: 8.7
8.3
Vulnerability Intelligence
Average: 8.7
8.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,383 Twitter followers
LinkedIn® Page
www.linkedin.com
430 employees on LinkedIn®
(77)4.4 out of 5
11th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
Entry Level Price:$22 /asset*
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 52% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • InsightVM (Nexpose) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    4
    Asset Management
    3
    Automation
    3
    Automated Scanning
    2
    Detection
    2
    Cons
    Complexity
    2
    Resource Limitations
    2
    Resource Management
    2
    Time-Consumption
    2
    Alert Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • InsightVM (Nexpose) features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.3
    8.4
    Reporting
    Average: 8.7
    9.1
    Vulnerability Intelligence
    Average: 8.7
    8.9
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Rapid7
    Year Founded
    2000
    HQ Location
    Boston, MA
    Twitter
    @rapid7
    123,335 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,157 employees on LinkedIn®
    Ownership
    NASDAQ:RPD
Product Description
How are these determined?Information
This description is provided by the seller.

InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 52% Enterprise
  • 31% Mid-Market
InsightVM (Nexpose) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
4
Asset Management
3
Automation
3
Automated Scanning
2
Detection
2
Cons
Complexity
2
Resource Limitations
2
Resource Management
2
Time-Consumption
2
Alert Issues
1
InsightVM (Nexpose) features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.3
8.4
Reporting
Average: 8.7
9.1
Vulnerability Intelligence
Average: 8.7
8.9
Risk-Prioritization
Average: 8.7
Seller Details
Seller
Rapid7
Year Founded
2000
HQ Location
Boston, MA
Twitter
@rapid7
123,335 Twitter followers
LinkedIn® Page
www.linkedin.com
3,157 employees on LinkedIn®
Ownership
NASDAQ:RPD
(25)4.8 out of 5
8th Easiest To Use in Risk-Based Vulnerability Management software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    YesWeHack is a leading global Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organizations worldwide with hundreds of thousands of trusted sec

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • YesWeHack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    Features
    7
    Customer Support
    6
    User Interface
    6
    Clear Interface
    4
    Cons
    Expensive
    3
    Poor Customer Support
    2
    Poor Interface Design
    2
    Pricing Issues
    2
    Bug Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • YesWeHack features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.3
    9.6
    Reporting
    Average: 8.7
    8.8
    Vulnerability Intelligence
    Average: 8.7
    9.3
    Risk-Prioritization
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    YesWeHack
    Company Website
    Year Founded
    2015
    HQ Location
    Paris, France
    LinkedIn® Page
    www.linkedin.com
    468 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

YesWeHack is a leading global Bug Bounty and Vulnerability Management Platform. Founded by ethical hackers in 2015, YesWeHack connects organizations worldwide with hundreds of thousands of trusted sec

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 36% Small-Business
YesWeHack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
Features
7
Customer Support
6
User Interface
6
Clear Interface
4
Cons
Expensive
3
Poor Customer Support
2
Poor Interface Design
2
Pricing Issues
2
Bug Management
1
YesWeHack features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.3
9.6
Reporting
Average: 8.7
8.8
Vulnerability Intelligence
Average: 8.7
9.3
Risk-Prioritization
Average: 8.7
Seller Details
Seller
YesWeHack
Company Website
Year Founded
2015
HQ Location
Paris, France
LinkedIn® Page
www.linkedin.com
468 employees on LinkedIn®