Best Security Risk Analysis Software

Products Buyer's Guide
8.8
F-Secure Endpoint Security
★★★★★

F-Secure Endpoint Security

Going beyond malware protection, F-Secure Endpoint Security provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.

Practical, sage and reliable antivirus - Max S.

Ease of use
9.2
Support
8.7
Ease of Setup
9.1
9.6
Change Tracker Gen7 R2
★★★★★

Change Tracker Gen7 R2

NNT Change Tracker Generation 7 uses either an agent-based or agentless architecture. After initial discovery, NNT-Change Tracker scans your devices and compares them to a standard policy.

Simple install and easy to see devices that are out of compliance and why - Michael S.

Ease of use
9.0
Support
9.8
Ease of Setup
9.3

Languages supported: English

9.2
Ostendio MyVCM
★★★★★

Ostendio MyVCM

Ostendios MyVCM is a cloud-based cybersecurity and information management platform that delivers an easy to use, cost-effective way for companies to demonstrate information security compliance to multiple industry standards and regulations.

Solid, evolving product in an industry NEEDING automation. - Jim N.

Ease of use
Support
Ease of Setup

Languages supported: English

9.4
Haystax Enterprise Security Solution
★★★★★

Haystax Enterprise Security Solution

A cloud-based software analytics platform that eliminates the artificial boundaries between IT, physical and personnel security integrating seamlessly into existing corporate SOC environments to provide: ‘whole-person' analysis of potential insider risk; end-to-end critical infrastructure security awareness, from single manufacturing facilities to sprawling global operations; proactive warnings of malware, fraud, sabotage and other cyber ...

Ideal software to mitigate the most powerful risks at the business level - Adolf R.

Ease of use
9.7
Support
9.3
Ease of Setup
9.4
9.2
Certa
★★★★★

Certa

Certa is a no-code workflow and integration engine. Our platform addresses the full lifecycle of direct and indirect suppliers, clients, and agents. It enables 2x faster onboarding, risk assessment, contracting, and ongoing monitoring with lesser efforts and errors.

The process it takes to take on a new customer has been cut in half. - Zelda C.

Ease of use
Support
Ease of Setup

Languages supported: Arabic, German, English, French, Hindi, Indonesian, Japanese, Korean, Malay, Portuguese, Spanish, Thai, Vietnamese, Chinese (Simplified), Chinese (Traditional)

8.6
Tenable.io
★★★★★

Tenable.io

Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.

Tenable is easy to run with a clean interface. A bit of setup is required at the beginning. - Michael N.

Ease of use
8.6
Support
8.5
Ease of Setup
9.0

Languages supported: English

9.2
Brinqa
★★★★★

Brinqa

Brinqa empowers customers to own their cyber risk with a unique, knowledge-driven approach to cybersecurity challenges. Brinqa Cyber Risk Graph - the knowledge graph for cybersecurity - connects all relevant security and business data, establishes a common risk language, and powers cybersecurity insights and outcomes. Brinqa Cyber Risk Services apply this knowledge to uniquely inform risk management strategies, standardize security data ...

Good cybersecuerity - Joren V.

Ease of use
Support
Ease of Setup

Languages supported: English

9.0
Google Cloud Security Command Center
★★★★★

Google Cloud Security Command Center

Cloud Security Command Center helps security teams gather data, identify threats, and act on them before they result in business damage or loss. It offers deep insight into application and data risk so that you can quickly mitigate threats to your cloud resources and evaluate overall health.

Google Cloud security center brings the best defense and security out there - Jes C.

Ease of use
Support
Ease of Setup
8.2
Qualys PCI
★★★★★

Qualys PCI

Qualys PCI is a PCI compliance software that makes it easy for users to secure their network and meet the PCI DSS requirements. Allows them to scan all systems and web applications, and automate compliance status reporting.

Most accurate PCI Compliance testing tool - Namratha C.

Ease of use
Support
Ease of Setup
10.0
Expanse
★★★★★

Expanse

Expanse is an automated Internet intelligence company.

Expander is the platform your program needs to provide an overall view of external health - Executive Sponsor in Commercial Real Estate

Ease of use
Support
Ease of Setup

Languages supported: English

7.6
Nexus Lifecycle
★★★★★

Nexus Lifecycle

Precise open source intelligence for your entire DevOps pipeline.

Good for Small to Medium Companies - Administrator in Consumer Services

Ease of use
Support
Ease of Setup
9.2
Apptega
★★★★★

Apptega

Manage your cybersecurity compliance frameworks and initiatives within Apptega's intuitive, cloud-based platform. Streamline your approach with automated framework crosswalk capabilities, policy and plan templates, and 24/7 access to consultants.

Apptega organizes compliance preparation in an easy to address manner - Brandon G.

Ease of use
9.2
Support
9.0
Ease of Setup
0.0

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

8.8
Netwrix Auditor
★★★★★

Netwrix Auditor

Netwrix Auditor enables auditing of the broadest variety of IT systems, including Active Directory, Exchange, file servers, SharePoint, SQL Server, VMware and Windows Server. It also supports monitoring of privileged user activity.

Bring audit data from multiple sources into one pane of glass and easily detect malicious behaviors. - Jim P.

Ease of use
8.4
Support
8.8
Ease of Setup
8.4

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

7.2
Tripwire Enterprise
★★★★★

Tripwire Enterprise

Tripwire is a provider of advanced threat, security and compliance solutions to confidently detect, prevent and respond to cybersecurity threats

Tripwire Enterprise - Administrator in Information Technology and Services

Ease of use
6.8
Support
7.2
Ease of Setup
4.8
8.6
The Respond Analyst
★★★★★

The Respond Analyst

The Respond Analyst is trained as an expert cyber security analyst that combines human reasoning with machine power to make complex decisions with 100% consistency. The Respond Analyst works with your existing detection solutions and escalates complete, vetted security incidents that need response.

Only way to reduce alert fatigue - Aaron B.

Ease of use
Support
Ease of Setup
8.6
DomainTools
★★★★★

DomainTools

DomainTools' data and products work in harmony to enable security teams to start getting ahead of attacks, gain context and visibility into potential threats, and lower the skills barrier.

Love Their WhoIs Lookup - User in Internet

Ease of use
Support
Ease of Setup
8.6
BeyondTrust Vulnerability Management
★★★★★

BeyondTrust Vulnerability Management

Reduce risk with cross-platform vulnerability assessment and remediation, including built-in configuration compliance, patch management and compliance reporting.

Best Vulnerability tool to use in a nework - Hari K.

Ease of use
Support
Ease of Setup

Languages supported: English

10.0
Media Sonar
★★★★★

Media Sonar

Media Sonar helps the world's largest organizations gather and analyze online alternative data to better protect their people, brands and assets, everyday.

An advanced security platform for corporate businesses - Alvin T.

Ease of use
Support
Ease of Setup
10.0
Digital Defense Frontline.Cloud
★★★★★

Digital Defense Frontline.Cloud

Frontline.Cloud is the original Software as a Service (SaaS) securityplatform. Built for the cloud from the very start, Frontline.Cloudworks seamlessly and deploys easily for organizations of all sizes,and offers a variety of options all within one convenient platform:- Frontline VM™ – Vulnerability Management- Frontline WAS™ – Web Application Scanning- Frontline ATS™ – Active Threat Sweep- Frontline Pen Test™ – Online Reporting and Ethical ...

DDF is a great asset to protecting against vulnerabilities - Administrator in Media Production

Ease of use
Support
Ease of Setup
8.6
SanerNow
★★★★★

SanerNow

A platform of Tools for endpoint security and systems management needs. Saner Platform queries systems to find aberrations, and helps systems to retain normality. Saner Queries and Monitors Endpoints, Analyzes the Security Posture, and Responds to Bring Endpoints to an Approved State.

SANER NOW IS EXCELLENT PRODUCT - Dhara B.

Ease of use
8.2
Support
8.7
Ease of Setup
7.6

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 0

8.2
Azure Security Center
★★★★★

Azure Security Center

Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.

Microsoft has created a great tool that provides remarkable security. - Stephanie R.

Ease of use
9.2
Support
7.6
Ease of Setup
0.0
7.0
Symantec Network Forensics: Security Analytics
★★★★★

Symantec Network Forensics: Security Analytics

Symantec Security Analytics delivers enriched, full-packet capture for full network security visibility, advanced network forensics, anomaly detection, and real-time content inspection for all network traffic. Armed with this detailed record, you can conduct forensic investigations, respond quickly to incidents, and resolve breaches in a fraction of the time you would spend with conventional processes.

Fast & correct analysis of network traffic - User in Telecommunications

Ease of use
8.5
Support
5.6
Ease of Setup
0.0
8.8
UpGuard
★★★★★

UpGuard

Complete visibility and monitoring for enterprise risk and cyber resilience.

UpGuard - Good Third-Party (and Self) Attack Surface Management - Dave D.

Ease of use
8.5
Support
8.9
Ease of Setup
7.4

Languages supported: English

8.8
AlienVault USM (from AT&T Cybersecurity)
★★★★★

AlienVault USM (from AT&T Cybersecurity)

AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Security that is out of this world - Karl H.

Ease of use
8.2
Support
8.7
Ease of Setup
0.0

Languages supported: English

9.0
Vigilante Operative
★★★★★

Vigilante Operative

InfoArmor VigilanteATI is a feature-rich, comprehensive solution delivering actionable, targeted threat intelligence with context that alerts you to the potential impact of attacks before they become a direct or peripheral risk to your organization. We search the dark web for chatter from bad actors, analyze threat data and offer a scalable solution that keeps your business assets safe from both current and emerging threats. VigilanteATI ...

Excellent Security service - bhavik s.

Ease of use
Support
Ease of Setup
9.0
ProcessUnity
★★★★★

ProcessUnity

ProcessUnity's cloud-based solutions help organizations of all sizes automate their risk and compliance programs.

Easy to Use - User in Financial Services

Ease of use
Support
Ease of Setup
9.0
Lynis Enterprise
★★★★★

Lynis Enterprise

Lynis Enterprise is a security solution for systems that run a Unix like Linux and macOS. It helps companies to perform daily security health scans. It can discover configuration issues, including vulnerable packages, missing best practices, and weak defaults.

Perform security audits with lynis - Ana P.

Ease of use
Support
Ease of Setup
8.0
inDefend
★★★★★

inDefend

inDefend offers a mechanism designed to allow users to detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

A DLP solution for all OS type. - Ravi K.

Ease of use
Support
Ease of Setup

Languages supported: English

B2B Software Guide