We performed a comparison between Horizon3.ai and Pentera based on real PeerSpot user reviews.
Find out what your peers are saying about Tenable, Wiz, Check Point Software Technologies and others in Vulnerability Management."Penetration testing and scans are useful features."
"The product is easy to use."
"The most valuable feature of Pentera is that you can do continuous vulnerability assessment, which is automated."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
"Maybe there are some remediation steps on the website, we can mask sensitive information on the website better."
"What I like the most about Pentera is its solution-oriented approach."
"The reports are quite useless."
"There is room for improvement in virtualization compatibility."
"Pentera's general dashboards could be improved and made more specific in terms of vulnerabilities that I'm discovering."
"Maybe scalability. I know that the Pentera right now is high level in order to scan big deals over 500 IPs and not less, and not less. That can be more granular. This will be useful."
"The price could be improved."
"The vulnerability scanner, exploit achievements, and remediation actions are all great."
Horizon3.ai is ranked 32nd in Vulnerability Management with 1 review while Pentera is ranked 15th in Vulnerability Management with 5 reviews. Horizon3.ai is rated 1.0, while Pentera is rated 8.2. The top reviewer of Horizon3.ai writes "Doesn’t identify threats and vulnerabilities, and the reports are quite useless". On the other hand, the top reviewer of Pentera writes "A stable solution that can be used to do continuous and automated vulnerability assessments". Horizon3.ai is most compared with Tenable Security Center, vPentest, Tenable Vulnerability Management, Rapid7 Metasploit and AttackIQ, whereas Pentera is most compared with Cymulate, Tenable Nessus, Picus Security, Qualys VMDR and XM Cyber.
See our list of best Vulnerability Management vendors, best Penetration Testing Services vendors, and best Breach and Attack Simulation (BAS) vendors.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.