Snyk is a user-friendly security solution that enables users to safely develop and use open source code. Users can create automatic scans that allow them to keep a close eye on their code and prevent bad actors from exploiting vulnerabilities. This enables users to find and remove vulnerabilities soon after they appear.
We do have some missing licenses issues, especially with non-SPDX compliant one, but we expect this to be fixed soon
You can get a good deal with Snyk for pricing. It's a little expensive, but it is worth it.
We do have some missing licenses issues, especially with non-SPDX compliant one, but we expect this to be fixed soon
You can get a good deal with Snyk for pricing. It's a little expensive, but it is worth it.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Get a risk-based view of your IT, security and compliance posture so you can quickly identify, investigate and prioritize your most critical assets and vulnerabilities.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
It is slightly more expensive than other solutions in the same sphere.
The licensing costs for this solution are approximately $100,000 US, and I think that covers everything.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address critical cloud security issues so they can operate in the cloud with confidence.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
Acunetix Web Vulnerability Scanner is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting, and other exploitable vulnerabilities.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
The costs aren't very expensive. It costs around $3000 or $4000.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
The costs aren't very expensive. It costs around $3000 or $4000.
JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime. The world’s top brands such as Amazon, Facebook, Google, Netflix, Uber, VMware, and Spotify are among the 4500 companies that already depend on JFrog to manage binaries for their mission-critical applications. JFrog is a privately-held, global company, and is a proud sponsor of the Cloud Native Computing Foundation [CNCF].
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
Facing growing threats and a rapidly expanding attack surface, understaffed and alert-fatigued organizations need more efficient ways to eliminate their exposure to vulnerabilities. Automox is a modern cyber hygiene platform that closes the aperture of attack by more than 80% with just half the effort of traditional solutions.
We are on the premium licensing, which is the one that has the API capability that we use.
The product is a great value.
We are on the premium licensing, which is the one that has the API capability that we use.
The product is a great value.
Funded by world-class investors including Evolution Equity Partners, Silver Lake Partners, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings with more than 12 million companies continuously rated. Founded in 2013 by security and risk experts Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, cyber insurance underwriting, and regulatory oversight. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees and vendors. Every organization has the universal right to their trusted and transparent Instant SecurityScorecard rating. For more information, visit securityscorecard.com or connect with us on LinkedIn.
Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
The product’s pricing is medium.
The licensing model follows a per-user per-month structure.
The product’s pricing is medium.
The licensing model follows a per-user per-month structure.
We are the fusion of former US Special Operations cyber operators, startup engineers, and frustrated cybersecurity practitioners. We see the world for what it is - bloated security tools, alert fatigue, reports filled with false positives, "checkbox" security culture, and consultants trying to pitch their "expertise".
Armis eliminates the IoT security blind spot, letting enterprises instantly see and control unmanaged or rogue devices and networks.
Burp Suite Enterprise Edition is an automated web vulnerability scanner, designed to enable enterprises to scale security across their web portfolios and achieve DevSecOps. Automate trusted Burp scans, integrate web security testing with development, and free your application security to support software development.
PortSwigger Burp Suite Enterprise Edition is expensive compared to other solutions.
PortSwigger Burp Suite Enterprise Edition is expensive compared to other solutions.
Cisco Vulnerability Management equips you with the contextual insight and threat intelligence needed to intercept the next exploit and respond with precision.
I think the pricing is based on the number of endpoints, so it's more subscription-based.
I think the pricing is based on the number of endpoints, so it's more subscription-based.
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API.
It's priced according to market standards for its services.
It's priced according to market standards for its services.
Delivered by security experts - Concierge Security® Team; the Arctic Wolf® Managed Risk solution enables you to define and contextualize your attack surface coverage across your networks, endpoints, and cloud environments; provides you with the risk priorities in your environment; and advises you on your remediation actions to ensure that you are benchmarking against configuration best practices and continually hardening your security posture.
It depends on the company size quite a bit.
The price of Arctic Wolf Managed Risk is reasonable compared to the competition.
It depends on the company size quite a bit.
The price of Arctic Wolf Managed Risk is reasonable compared to the competition.
Nucleus is a Risk Based Vulnerability Management (RBVM) solution that automates vulnerability management processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the resources that it takes to perform these tasks today.
Threats are as vast as the internet. Defending your attack surface is a challenge of continuous change and global scale. RiskIQ Illuminate Internet Intelligence shows cyber threats relevant to your critical assets through connected digital relationships. It is the only security intelligence solution with tailored attack surface intelligence to uncover exposures, risks, and threats against your unique digital footprint, pinpointing what’s relevant to you—all in one place.
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges.
One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing.
One thing not advantageous for it was that it was a little bit more expensive. I would rate it one out of five in terms of pricing.
The Balbix breach avoidance platform, BreachControl, is the industry’s first system to leverage specialized artificial intelligence (AI) to provide comprehensive and continuous predictive assessment of breach risk.
Automate vulnerability management with a cloud-based, machine learning-powered solution. Intelligently prioritize remediation efforts based on actionable recommendations that reflect the context of your environment.
Singularity Identity, a component of the Singularity platform, provides threat detection & response (ITDR) capabilities to defend Active Directory and domain-joined endpoints in real-time from adversaries aiming to gain persistent, elevated privilege and move covertly. Singularity Identity provides actionable, high-fidelity insight as attacks emerge from managed and unmanaged devices. It detects identity misuse and reconnaissance activity happening within endpoint processes targeting critical domain servers, service accounts, local credentials, local data, network data, and cloud data. On-agent cloaking and deception techniques slow the adversary down while providing situational awareness and halting adversarial attempts at lateral movement. Singularity Identity helps you detect and respond to identity-based attacks, providing early warning while misdirecting them away from production assets.
The price is affordable.
SentinelOne seemed to offer more while being priced lower than its competitors.
The price is affordable.
SentinelOne seemed to offer more while being priced lower than its competitors.
Shut the window of opportunity for cybercriminals. Track down vulnerable software across Windows, Mac OSx and Linux systems. Prioritize the most critical security patches. Integrate with WSUS and SCCM to patch Non-Microsoft applications. With Flexera Software Vulnerability Manager (formerly CSI), you optimize your work and leave no room for incidents.
WithSecure Elements Vulnerability Management is an easy-to-deploy, cloud-based vulnerability scanner that covers your network, assets, the deep web and compliance. And it automatically reports activities like brand violations, third-party scams and phishing sites. Manage WithSecure Elements Vulnerability Management in the cloud or use as a fully-outsourced managed service from one of our certified partners.
Unmatched real-time visibility into the devices, users and applications in your network.
Leverage a powerful and affordable vulnerability management solution. Get continuous monitoring to enhance your security, threat prioritization based on your specific organization, and measurable reporting to track your remediation efforts.
Our data fabric architecture integrates disparate data sources from legacy systems, data lakes, data warehouses, sql databases, and apps, providing a holistic view of business performance.
Automation, 2-way sync, alerts, and analytics live on top of the platform, powered by the data fabric.
All security functions benefit from fast, reliable, and precise analysis of enterprise data including asset coverage, compliance reporting, ROSI analysis, vulnerability management, and more.