Best Exposure Management Platforms

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Exposure management platforms contain software solutions that allow organizations to understand their attack surface and then enable them to address it. These platforms help continuously prevent and mitigate security risks. This suite of software solutions aims not only to prevent likely attacks but also to accurately report cyber risks to ensure there is no business interruption.

Oftentimes, exposure management products are composed of two distinct parts: attack surface management software and vulnerability scanner software. This combination of features makes exposure management platforms capable of continuously monitoring an organization’s network, assets, and cloud services while simultaneously monitoring applications and networks to identify security vulnerabilities. More often than not, exposure management platforms are packaged as a single product with these two types of software capabilities as features within it. These core software solutions for exposure management help organizations understand what cyber threats are attacking their business and what parts of the business are most vulnerable. These solutions also help companies to continuously identify, prevent, and understand attack surface threats and vulnerabilities.

Exposure management platforms sometimes offer risk-based vulnerability management functionality, which identifies and prioritizes vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning (ML) algorithms. Additionally, in some cloud environments, exposure management platforms may also include container-security features, which are used to secure multiple components of containerized applications or files, along with their infrastructure and connected networks.

To qualify for inclusion in the Exposure Management category, a product must:

Manage an organization’s exposure to potential cyber threats
Proactively identify security vulnerabilities
Monitor and identify potential security breaches continuously
Proactively block and remediate ongoing attacks
Report the above activity so the organization knows how to address potential cyber risks

Best Exposure Management Platforms At A Glance

Leader:
Highest Performer:
Best Contender:
Most Niche:
Show LessShow More
Best Contender:
Most Niche:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
33 Listings in Exposure Management Platforms Available
(702)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

    Users
    • CISO
    • Security Engineer
    Industries
    • Financial Services
    • Computer Software
    Market Segment
    • 55% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Wiz Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    100
    Features
    91
    Security
    87
    Easy Setup
    68
    Visibility
    67
    Cons
    Improvement Needed
    29
    Feature Limitations
    28
    Improvements Needed
    26
    Missing Features
    25
    Learning Curve
    24
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Wiz
    Company Website
    Year Founded
    2020
    HQ Location
    New York, US
    Twitter
    @wiz_io
    17,143 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,448 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Wiz transforms cloud security for customers – including 40% of the Fortune 100 – by enabling a new operating model. With Wiz, organizations can democratize security across the cloud lifecycle, empower

Users
  • CISO
  • Security Engineer
Industries
  • Financial Services
  • Computer Software
Market Segment
  • 55% Enterprise
  • 38% Mid-Market
Wiz Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
100
Features
91
Security
87
Easy Setup
68
Visibility
67
Cons
Improvement Needed
29
Feature Limitations
28
Improvements Needed
26
Missing Features
25
Learning Curve
24
Seller Details
Seller
Wiz
Company Website
Year Founded
2020
HQ Location
New York, US
Twitter
@wiz_io
17,143 Twitter followers
LinkedIn® Page
www.linkedin.com
2,448 employees on LinkedIn®
(130)4.9 out of 5
Optimized for quick response
1st Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

    Users
    • Security Engineer
    • Cyber Security Engineer
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 55% Enterprise
    • 43% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cymulate: Security Validation and Exposure Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    62
    Features
    38
    Security
    36
    Customer Support
    32
    Vulnerability Identification
    29
    Cons
    Improvement Needed
    10
    Integration Issues
    8
    Lack of Integration
    6
    Inefficient Alert System
    5
    Complexity
    4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cymulate
    Company Website
    Year Founded
    2016
    HQ Location
    Holon, Israel
    Twitter
    @CymulateLtd
    1,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    249 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Cymulate is a leading on-prem and cloud-based Security Validation and Exposure Management Platform leveraging the industry's most comprehensive and user-friendly Breach and Attack Simulation technolog

Users
  • Security Engineer
  • Cyber Security Engineer
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 55% Enterprise
  • 43% Mid-Market
Cymulate: Security Validation and Exposure Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
62
Features
38
Security
36
Customer Support
32
Vulnerability Identification
29
Cons
Improvement Needed
10
Integration Issues
8
Lack of Integration
6
Inefficient Alert System
5
Complexity
4
Seller Details
Seller
Cymulate
Company Website
Year Founded
2016
HQ Location
Holon, Israel
Twitter
@CymulateLtd
1,085 Twitter followers
LinkedIn® Page
www.linkedin.com
249 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(138)4.5 out of 5
Optimized for quick response
5th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 52% Enterprise
    • 38% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Pentera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    45
    Security
    44
    Ease of Use
    43
    Automation
    32
    Vulnerability Detection
    32
    Cons
    Expensive
    12
    Limited Scope
    12
    Technical Issues
    12
    Limited Features
    10
    Inadequate Reporting
    9
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Pentera
    Company Website
    Year Founded
    2015
    HQ Location
    Boston, MA
    Twitter
    @penterasec
    3,327 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    410 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 52% Enterprise
  • 38% Mid-Market
Pentera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
45
Security
44
Ease of Use
43
Automation
32
Vulnerability Detection
32
Cons
Expensive
12
Limited Scope
12
Technical Issues
12
Limited Features
10
Inadequate Reporting
9
Seller Details
Seller
Pentera
Company Website
Year Founded
2015
HQ Location
Boston, MA
Twitter
@penterasec
3,327 Twitter followers
LinkedIn® Page
www.linkedin.com
410 employees on LinkedIn®
(107)4.9 out of 5
4th Easiest To Use in Exposure Management Platforms software
View top Consulting Services for SentinelOne Singularity Cloud Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 60% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Cloud Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    61
    Ease of Use
    37
    Vulnerability Detection
    37
    Cloud Management
    36
    Vulnerability Identification
    32
    Cons
    Learning Curve
    4
    Missing Features
    4
    Asset Management
    3
    Delayed Detection
    3
    Improvement Needed
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    55,072 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,888 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Cloud Security is SentinelOne’s comprehensive, cloud-native application protection platform (CNAPP). It combines the best of agentless insights with AI-powered threat protection, to secure

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 60% Mid-Market
  • 31% Enterprise
SentinelOne Singularity Cloud Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
61
Ease of Use
37
Vulnerability Detection
37
Cloud Management
36
Vulnerability Identification
32
Cons
Learning Curve
4
Missing Features
4
Asset Management
3
Delayed Detection
3
Improvement Needed
3
Seller Details
Company Website
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
55,072 Twitter followers
LinkedIn® Page
www.linkedin.com
2,888 employees on LinkedIn®
(171)4.8 out of 5
Optimized for quick response
3rd Easiest To Use in Exposure Management Platforms software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 60% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    7
    Security
    7
    Vulnerability Detection
    7
    Customer Support
    6
    Scanning Efficiency
    6
    Cons
    Slow Scanning
    3
    Expensive
    2
    High Licensing Costs
    2
    Inadequate Reporting
    2
    Limited Features
    2
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    948 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    77 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 60% Small-Business
  • 35% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
7
Security
7
Vulnerability Detection
7
Customer Support
6
Scanning Efficiency
6
Cons
Slow Scanning
3
Expensive
2
High Licensing Costs
2
Inadequate Reporting
2
Limited Features
2
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
948 Twitter followers
LinkedIn® Page
www.linkedin.com
77 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Design
    Market Segment
    • 66% Mid-Market
    • 32% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RiskProfiler - External Threat Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Risk Management
    19
    Ease of Use
    6
    Customer Support
    5
    Easy Integrations
    5
    Efficiency
    5
    Cons
    Difficult Learning
    7
    Learning Curve
    7
    Learning Difficulty
    6
    Limited Features
    4
    Information Overload
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Rock Hill , US
    Twitter
    @riskprofilerio
    177 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RiskProfiler offers a comprehensive suite of products for Continuous Threat Exposure Management, addressing an organization's external attack surface. These include the Cyber RiskProfiler for cyber ri

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Design
Market Segment
  • 66% Mid-Market
  • 32% Small-Business
RiskProfiler - External Threat Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Risk Management
19
Ease of Use
6
Customer Support
5
Easy Integrations
5
Efficiency
5
Cons
Difficult Learning
7
Learning Curve
7
Learning Difficulty
6
Limited Features
4
Information Overload
3
Seller Details
Year Founded
2019
HQ Location
Rock Hill , US
Twitter
@riskprofilerio
177 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
(77)4.5 out of 5
6th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 55% Small-Business
    • 44% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • RidgeBot Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    40
    Automation
    23
    Vulnerability Identification
    23
    Automation Testing
    19
    Features
    16
    Cons
    Limited Scope
    8
    Missing Features
    8
    Limited Features
    7
    Complexity
    6
    Expensive
    6
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2020
    HQ Location
    Santa Clara, California
    Twitter
    @RidgeSecurityAI
    1,278 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

RidgeBot by Ridge Security is a leading AI Powered Security Validation Platform to reduce cyber risks through continuous threat exposure management. It conducts extensive AI-powered automated penetrat

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 55% Small-Business
  • 44% Mid-Market
RidgeBot Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
40
Automation
23
Vulnerability Identification
23
Automation Testing
19
Features
16
Cons
Limited Scope
8
Missing Features
8
Limited Features
7
Complexity
6
Expensive
6
Seller Details
Company Website
Year Founded
2020
HQ Location
Santa Clara, California
Twitter
@RidgeSecurityAI
1,278 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
(15)4.3 out of 5
12th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tanium Autonomous Endpoint Management (AEM) offers the most comprehensive solution for intelligently managing endpoints across industries, providing capabilities for asset discovery and inventory, end

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tanium Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Features
    3
    Security
    3
    Asset Management
    2
    Flexibility
    2
    Cons
    Complexity
    2
    Learning Curve
    2
    Difficult Learning
    1
    Inaccurate Information
    1
    Limited Features
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tanium
    Year Founded
    2007
    HQ Location
    Seattle area, WA
    Twitter
    @Tanium
    7,171 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,178 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tanium Autonomous Endpoint Management (AEM) offers the most comprehensive solution for intelligently managing endpoints across industries, providing capabilities for asset discovery and inventory, end

Users
No information available
Industries
No information available
Market Segment
  • 40% Enterprise
  • 40% Mid-Market
Tanium Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Features
3
Security
3
Asset Management
2
Flexibility
2
Cons
Complexity
2
Learning Curve
2
Difficult Learning
1
Inaccurate Information
1
Limited Features
1
Seller Details
Seller
Tanium
Year Founded
2007
HQ Location
Seattle area, WA
Twitter
@Tanium
7,171 Twitter followers
LinkedIn® Page
www.linkedin.com
2,178 employees on LinkedIn®
(37)4.7 out of 5
9th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 19% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Darwin Attack Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Vulnerability Identification
    8
    Customer Support
    6
    Remediation Efficiency
    6
    Remediation Solutions
    6
    Cons
    Login Issues
    2
    Poor Notifications
    2
    Technical Issues
    2
    Authentication Issues
    1
    Difficult Navigation
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Chicago, Illinois
    Twitter
    @theevolvesec
    803 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    73 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evolve Security's patent pending Darwin Attack® platform is a comprehensive collaboration and management tool designed to help organizations manage their cybersecurity services and reduce risks of suc

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 19% Small-Business
Darwin Attack Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Vulnerability Identification
8
Customer Support
6
Remediation Efficiency
6
Remediation Solutions
6
Cons
Login Issues
2
Poor Notifications
2
Technical Issues
2
Authentication Issues
1
Difficult Navigation
1
Seller Details
Year Founded
2016
HQ Location
Chicago, Illinois
Twitter
@theevolvesec
803 Twitter followers
LinkedIn® Page
www.linkedin.com
73 employees on LinkedIn®
(72)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 40% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SanerNow Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    20
    Security
    16
    Features
    13
    Customer Support
    11
    Patch Management
    11
    Cons
    Expensive
    7
    Missing Features
    6
    Integration Issues
    5
    Learning Curve
    5
    Difficult Learning
    4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SanerNow
    Company Website
    Year Founded
    2008
    HQ Location
    Redwood City, California
    Twitter
    @secpod
    551 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    139 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SecPod SanerNow Cyberhygiene platform is a continuous vulnerability and exposure management solution built for the modern IT security landscape. IT and Security teams of small, mid-size, and large ent

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 40% Small-Business
  • 39% Mid-Market
SanerNow Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
20
Security
16
Features
13
Customer Support
11
Patch Management
11
Cons
Expensive
7
Missing Features
6
Integration Issues
5
Learning Curve
5
Difficult Learning
4
Seller Details
Seller
SanerNow
Company Website
Year Founded
2008
HQ Location
Redwood City, California
Twitter
@secpod
551 Twitter followers
LinkedIn® Page
www.linkedin.com
139 employees on LinkedIn®
(20)4.9 out of 5
10th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Edgescan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    3
    Security
    3
    Ease of Use
    2
    Expertise
    2
    Features
    2
    Cons
    Access Restrictions
    1
    Bugs
    1
    Integration Issues
    1
    Lack of Integration
    1
    Limited Access
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Edgescan
    Company Website
    Year Founded
    2011
    HQ Location
    Dublin, Dublin
    Twitter
    @edgescan
    2,305 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    96 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Edgescan is a comprehensive platform for continuous security testing, exposure management, and Penetration Testing as a Service (PTaaS). It is designed to assist organizations in gaining a thorough un

Users
No information available
Industries
No information available
Market Segment
  • 35% Enterprise
  • 35% Mid-Market
Edgescan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
3
Security
3
Ease of Use
2
Expertise
2
Features
2
Cons
Access Restrictions
1
Bugs
1
Integration Issues
1
Lack of Integration
1
Limited Access
1
Seller Details
Seller
Edgescan
Company Website
Year Founded
2011
HQ Location
Dublin, Dublin
Twitter
@edgescan
2,305 Twitter followers
LinkedIn® Page
www.linkedin.com
96 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 47% Mid-Market
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ResilientX Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    11
    Security
    10
    Vulnerability Identification
    9
    Ease of Use
    7
    Monitoring
    7
    Cons
    Cloud Dependency
    1
    Complex Setup
    1
    Difficult Customization
    1
    Difficult Initial Setup
    1
    Inefficient Alert System
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    London
    Twitter
    @ResilientXcyber
    33 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ResilientX Unified Exposure Management Platform is the leading platform that unifies Attack Surface Management, Web Application Security Testing, Network Security Testing, Cloud Security Posture Manag

Users
No information available
Industries
No information available
Market Segment
  • 47% Mid-Market
  • 35% Small-Business
ResilientX Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
11
Security
10
Vulnerability Identification
9
Ease of Use
7
Monitoring
7
Cons
Cloud Dependency
1
Complex Setup
1
Difficult Customization
1
Difficult Initial Setup
1
Inefficient Alert System
1
Seller Details
Year Founded
2022
HQ Location
London
Twitter
@ResilientXcyber
33 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
(26)4.3 out of 5
11th Easiest To Use in Exposure Management Platforms software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 35% Enterprise
    • 35% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Security Randori Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Features
    10
    Threat Detection
    10
    Vulnerability Identification
    10
    Easy Integrations
    9
    Cons
    Integration Issues
    7
    Lack of Integration
    6
    Difficult Setup
    3
    Expensive
    3
    Lack of Detail
    3
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2018
    HQ Location
    Waltham, Massachusetts
    LinkedIn® Page
    www.linkedin.com
    32 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Security® Randori Recon is external attack surface management (ASM) software as a service (SaaS) that provides continuous asset discovery and risk prioritization from an attacker's perspective. Th

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 35% Enterprise
  • 35% Small-Business
IBM Security Randori Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Features
10
Threat Detection
10
Vulnerability Identification
10
Easy Integrations
9
Cons
Integration Issues
7
Lack of Integration
6
Difficult Setup
3
Expensive
3
Lack of Detail
3
Seller Details
Year Founded
2018
HQ Location
Waltham, Massachusetts
LinkedIn® Page
www.linkedin.com
32 employees on LinkedIn®
(51)4.5 out of 5
13th Easiest To Use in Exposure Management Platforms software
Save to My Lists
Entry Level Price:Starting at €82.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Detectify Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automation
    3
    Automation Testing
    3
    Automated Scanning
    2
    Customizability
    2
    Features
    2
    Cons
    Expensive
    2
    Complexity
    1
    Complex Queries
    1
    Complex Setup
    1
    Inaccuracy
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Detectify
    Year Founded
    2013
    HQ Location
    Stockholm, Sweden
    Twitter
    @detectify
    11,395 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    101 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Detectify sets a new standard for advanced application security testing, challenging traditional DAST by providing evolving coverage of each and every exposed asset across the changing attack surface.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Small-Business
  • 35% Mid-Market
Detectify Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automation
3
Automation Testing
3
Automated Scanning
2
Customizability
2
Features
2
Cons
Expensive
2
Complexity
1
Complex Queries
1
Complex Setup
1
Inaccuracy
1
Seller Details
Seller
Detectify
Year Founded
2013
HQ Location
Stockholm, Sweden
Twitter
@detectify
11,395 Twitter followers
LinkedIn® Page
www.linkedin.com
101 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CrowdStrike Falcon Exposure Management gives complete attack-surface visibility and AI-powered vulnerability management to shut down adversary opportunities.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 63% Mid-Market
    • 38% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Exposure Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    6
    Risk Management
    3
    Ease of Use
    2
    Easy Integrations
    2
    Visibility
    2
    Cons
    Complex Setup
    2
    Complexity
    1
    Expensive
    1
    False Positives
    1
    Poor UI Design
    1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    106,846 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,101 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

CrowdStrike Falcon Exposure Management gives complete attack-surface visibility and AI-powered vulnerability management to shut down adversary opportunities.

Users
No information available
Industries
No information available
Market Segment
  • 63% Mid-Market
  • 38% Enterprise
CrowdStrike Falcon Exposure Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
6
Risk Management
3
Ease of Use
2
Easy Integrations
2
Visibility
2
Cons
Complex Setup
2
Complexity
1
Expensive
1
False Positives
1
Poor UI Design
1
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
106,846 Twitter followers
LinkedIn® Page
www.linkedin.com
10,101 employees on LinkedIn®
Ownership
NASDAQ: CRWD