Veracode is a leading application security platform that helps organizations to develop and deliver secure software. Veracode's solution provides comprehensive capabilities for static analysis, dynamic analysis, software composition analysis, and manual penetration testing.
Its complexity makes it quite expensive, but it’s all worth it, with all the engineering in the background.
The pricing is pretty high.
Its complexity makes it quite expensive, but it’s all worth it, with all the engineering in the background.
The pricing is pretty high.
With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
There are additional features that can be licensed for an additional cost.
The solution is not too expensive.
There are additional features that can be licensed for an additional cost.
The solution is not too expensive.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address critical cloud security issues so they can operate in the cloud with confidence.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
Acunetix Web Vulnerability Scanner is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting, and other exploitable vulnerabilities.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
The costs aren't very expensive. It costs around $3000 or $4000.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
The costs aren't very expensive. It costs around $3000 or $4000.
Akamai Guardicore Segmentation is a software-based microsegmentation solution that provides the simplest, fastest, and most intuitive way to enforce Zero Trust principles. It enables you to prevent malicious lateral movement in your network through precise segmentation policies, visuals of activity within your IT environment, and network security alerts. Akamai Guardicore Segmentation works across your data centers, multicloud environments, and endpoints. It is faster to deploy than infrastructure segmentation approaches and provides you with unparalleled visibility and control of your network.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
Compared to the pricing we were seeing from both Illumio and Edgewise, Guardicore was very competitive.
Guardicore Centra provides better value for money than NSX, was the other solution that we looked at, which was too expensive for what it does.
The Skybox Security Suite platform combines firewall and network device data with vulnerability and threat intelligence, prioritizing security issues in the context of your unique environment. Powerful attack vector analytics reduce response times and risks, bringing firewall, vulnerability and threat management processes for complex networks under control.
The pricing is high, and the licensing model needs more flexibility.
The pricing has increased exorbitantly in the last few years, so now it is questionable. Now, it makes me want to review other products.
The pricing is high, and the licensing model needs more flexibility.
The pricing has increased exorbitantly in the last few years, so now it is questionable. Now, it makes me want to review other products.
For companies that want to manage their security posture against the evolving threat landscape: Cymulate SaaS-based Extended Security Posture Management (XSPM) deploys within an hour, enabling security professionals to continuously challenge, validate and optimize their cyber-security posture end-to-end across the MITRE ATT&CK framework.
Cymulate's services are expensive.
The product is affordable.
Cymulate's services are expensive.
The product is affordable.
Cisco SecureX is an integrated security platform that connects the breadth of Cisco's integrated security portfolio and the customer's infrastructure to create a consistent experience. The solution unifies visibility, enables automation, and strengthens your security across network, endpoints, cloud, and applications. Cisco SecureX is embedded within every Cisco Security product and supports integrations with SIEM and SOAR, so customers will not need to replace any solution or worry about layering on new technology.
For the value you get, the pricing of the solution is excellent.
It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco.
For the value you get, the pricing of the solution is excellent.
It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our attack path management platform continuously uncovers hidden attack paths to your critical assets across cloud and on-prem environments, so you can cut them off at key junctures and eradicate risk with a fraction of the effort. This overcomes the big disconnect that security teams experience when they’re presented with endless alerts, yet can’t see which exposures impact risk the most, how they come together to be exploited by an attacker, or how to efficiently eliminate them. This approach is a complete game-changer, which is why some of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
We have to pay standard licensing fees.
We have to pay standard licensing fees.
Independent from any vendor or technology, the unparalleled Picus Platform is designed to continuously measure the effectiveness of security defenses by using emerging threat samples in production environments. Created by a team that’s been working together more than 10 years already and has proven their expertise in enterprise cybersecurity, Picus is trusted by many large multinational corporations and government agencies.
They have certain price ranges for their products, depending upon the use cases, and the number of applications the customer wants to try.
There is a yearly license according to the number of vectors. The pricing is moderate.
They have certain price ranges for their products, depending upon the use cases, and the number of applications the customer wants to try.
There is a yearly license according to the number of vectors. The pricing is moderate.
We are the fusion of former US Special Operations cyber operators, startup engineers, and frustrated cybersecurity practitioners. We see the world for what it is - bloated security tools, alert fatigue, reports filled with false positives, "checkbox" security culture, and consultants trying to pitch their "expertise".
The AttackIQ platform enables continuous validation that your security controls, processes and people are working as intended and delivering ROI. It seamlessly integrates into any existing network, delivering immediate visibility into your security program so you can uncover gaps in coverage, identify misconfigurations, and quickly prioritize remediation efforts.
SafeBreach is the world's most widely used continuous security validation platform in enterprise companies. The company's patented platform empowers CISOs and their teams to validate security controls, maximize their effectiveness, and drive down risk.
The price starts from about $140,000 so this solution is expensive in my opinion. Maintenance and support is included in the license cost.
The pricing is more expensive than other options on the market today.
The price starts from about $140,000 so this solution is expensive in my opinion. Maintenance and support is included in the license cost.
The pricing is more expensive than other options on the market today.
Burp Suite Enterprise Edition is an automated web vulnerability scanner, designed to enable enterprises to scale security across their web portfolios and achieve DevSecOps. Automate trusted Burp scans, integrate web security testing with development, and free your application security to support software development.
PortSwigger Burp Suite Enterprise Edition is expensive compared to other solutions.
PortSwigger Burp Suite Enterprise Edition is expensive compared to other solutions.
The pricing is fair.
The pricing is fair.
Equipped with FireEye frontline intelligence, the Verodin platform will measure and test security environments against both known and newly discovered threats, empowering organizations to identify risks in their security controls before a breach occurs, and rapidly adapt their defenses to the evolving threat landscape.
Legacy security testing approaches may help security teams find and remediate risks on-premises and directly managed infrastructure. But, they are no match for the rapidly expanding attack surface caused by modern, highly distributed IT ecosystems.
The SecPoint Penetrator is a vulnerability scanning device that simulates how a hacker could penetrate a given system (hence the term) and reports vulnerabilities, which should then help strengthen security measures against online outlaws, virtual villains, cyber criminals, techno terrorists, and other nefarious elements of the Worldwide Web at large.
Dazz is an innovative product that revolutionizes data analysis and visualization. Its primary use case is to enable organizations to make informed decisions based on complex data sets. With its intuitive interface and powerful features, Dazz helps users gain valuable insights and uncover patterns in their data.
The most valuable functionality of Dazz is its ability to transform raw data into visually stunning and interactive visualizations. Users can easily create charts, graphs, and dashboards that present data in a meaningful way. The drag-and-drop interface makes it simple to manipulate and analyze data, even for non-technical users.
Dazz helps organizations by simplifying data analysis processes and enhancing decision-making. It eliminates the need for manual data manipulation and coding, saving time and effort. The visualizations produced by Dazz make it easier for stakeholders to understand complex data and identify trends and outliers. This leads to more informed decision-making and improved business outcomes.
Furthermore, Dazz offers seamless integration with various data sources, allowing organizations to consolidate and analyze data from multiple systems. Its advanced data modeling capabilities enable users to perform complex calculations and create custom metrics. With its collaborative features, teams can easily share and collaborate on data analysis projects, fostering a data-driven culture within organizations.
In summary, Dazz is a powerful data analysis and visualization tool that simplifies complex data sets, enhances decision-making, and promotes collaboration within organizations. Its intuitive interface, versatile functionality, and ability to transform raw data into visually appealing visualizations make it an invaluable asset for any organization.
Unmatched real-time visibility into the devices, users and applications in your network.
Automated and full-scale penetration testing platform that makes network penetration testing more affordable, accurate, faster, consistent, and not prone to human error.
In security as in life, the hardest weaknesses to pinpoint are your own. Fortunately, we have no problem thoroughly documenting all of your flaws. In fact, it’s kind of our job. And that’s a good thing: Knowing your vulnerabilities—and the ways in which attackers could exploit them—is one of the greatest insights you can get in improving your security program. With that in mind, Rapid7’s Penetration Testing Services team will simulate a real-world attack on your networks, applications, devices, and/or people to demonstrate the security level of your key systems and infrastructure and show you what it will take to strengthen it. Much like your mom, we don't highlight your failings because it bothers you—we do it because we care.
A penetration test will help companies determine the weaknesses in their network, computer systems and applications. Penetration testing is a critical part of every company’s security program. As the recognized leader in information security training, we put that experience to work for you, delivering a quality of product impossible to obtain elsewhere.
Traditional pen testing simply can’t keep pace with today’s continuous delivery (CD) software model. Instead, companies are tapping into the global community of trusted hackers and pentesters to stay secure while they continuously innovate. With HackerOne’s global community, you benefit from the diversity of skills, “on-tap” availability, and cost-effectiveness you need.
This comprehensive cloud-based GRC software by SureCloud empowers businesses of all sizes to streamline their risk and compliance processes effortlessly. With its user-friendly interface and adaptable features, it accommodates diverse industry needs. SureCloud's GRC software offers robust functionalities, including risk assessment and management, compliance adherence to regulations like SOC 2, ISO 27001, and GDPR, vendor risk assessment and monitoring, data privacy compliance, and cyber risk management. It's the go-to solution for organizations seeking a holistic and user-friendly approach to Governance, Risk, and Compliance.
Resolver has introduced the first closed-loop system for threat and vulnerability management, security operations automation, and incident response. By simplifying and automating the complex process of vulnerability management, your IT team can prioritize vulnerabilities based on risk score and business criticality to ensure better decision-making and immediate remediation.