Microsoft Intune is a comprehensive cloud-based service that allows you to remotely manage mobile devices and mobile applications without worrying about the security of your organization’s data. Device and app management can be used on company-owned devices as well as personal devices.
Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune.
Microsoft Intune is a cost effective choice. It is less expensive than other products on the market.
Consider the Microsoft Enterprise Mobility Suite rather than choosing specific sub-components, e.g. only Microsoft Intune.
Microsoft Intune is a cost effective choice. It is less expensive than other products on the market.
Tenable is praised for its intuitive dashboard and customizable reporting options, Prisma Cloud is commended for its competitive pricing and comprehensive security capabilities across multi-cloud environments. Users have varied opinions on setup time, user interface, integration with other tools, and customer support for both products. Overall, Tenable focuses on centralized management and monitoring, while Prisma Cloud emphasizes cost savings and advanced threat detection.
The purchasing process was easy and quick. It is a very economical solution.
Our licensing fees are $18,000 USD per year.
The purchasing process was easy and quick. It is a very economical solution.
Our licensing fees are $18,000 USD per year.
Snyk is a user-friendly security solution that enables users to safely develop and use open source code. Users can create automatic scans that allow them to keep a close eye on their code and prevent bad actors from exploiting vulnerabilities. This enables users to find and remove vulnerabilities soon after they appear.
We do have some missing licenses issues, especially with non-SPDX compliant one, but we expect this to be fixed soon
You can get a good deal with Snyk for pricing. It's a little expensive, but it is worth it.
We do have some missing licenses issues, especially with non-SPDX compliant one, but we expect this to be fixed soon
You can get a good deal with Snyk for pricing. It's a little expensive, but it is worth it.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing.
I wish the pricing was more transparent.
Microsoft Defender for Cloud is a comprehensive security solution that provides advanced threat protection for cloud workloads. It offers real-time visibility into the security posture of cloud environments, enabling organizations to quickly identify and respond to potential threats. With its advanced machine learning capabilities, Microsoft Defender for Cloud can detect and block sophisticated attacks, including zero-day exploits and fileless malware.
I'm not privy to that information, but I know it's probably close to a million dollars a year.
We are using the free version of the Azure Security Center.
I'm not privy to that information, but I know it's probably close to a million dollars a year.
We are using the free version of the Azure Security Center.
Cisco ISE is an all-in-one solution that streamlines security policy management and reduces operating costs. Cisco ISE delivers visibility and access control over users and devices across wired, wireless, and VPN connections.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
There are three levels of pricing: basic, plus, and apex. Basic satisfied our needs.
If you go directly with Cisco for the implementation it's very, very expensive.
With VMDR, enterprises are empowered with visibility and insight into cyber risk exposure - making it easy to prioritize vulnerabilities, assets, or groups of assets based on business risk. Security teams can take action to mitigate risk, helping the business measure its true risk, and track risk reduction over time.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Usually every implementation is different and the quote is in function of number of assets.
When you want to cover yourself for scalability, you will be charged for the number you place on the scan itself.
Tenable Nessus is a vulnerability management solution that aims to empower organizations to be aware of threats that both they and their customers face. It is the most deployed scanner in the vulnerability management industry. Organizations that use this product have access to the largest continuously updated global library of vulnerability and configuration checks. They can stay ahead of threats that Tenable Nessus’s competitors may be unable to spot. Additionally, Tenable Nessus supports a greater number of technologies than its competitors.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
The pricing is much more manageable versus other products.
The price of Tenable Nessus is much more competitive versus other solutions on the market.
Aruba ClearPass is a network access control (NAC) solution that provides a range of security and access management capabilities for wired, wireless, and VPN networks. ClearPass enables organizations to secure their networks and devices, enforce security policies, and provide secure access to network resources.
Licensing and pricing are extremely straightforward.
Cost is important. I switched because Aruba's costs were well below Cisco's.
Licensing and pricing are extremely straightforward.
Cost is important. I switched because Aruba's costs were well below Cisco's.
Managed in the cloud and powered by Tenable Nessus, Tenable Vulnerability Management (formerly Tenable.io) provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your organization. Built-in prioritization, threat intelligence and real-time insight help you understand your exposures and proactively prioritize remediations.
There are additional features that can be licensed for an additional cost.
The solution is not too expensive.
There are additional features that can be licensed for an additional cost.
The solution is not too expensive.
Rapid7 InsightVM is a comprehensive vulnerability management platform that protects your systems from attackers and is easy to scale. The solution provides easy access to vulnerability management, application security, detection and response, external threat intelligence, orchestration and automation, and more. Rapid7 InsightVM is ideal for security, IT, and DevOps teams, helping them reduce risk by enabling them to detect and respond to attacks quickly.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
The price of the solution is less than the competitors.
I do not have experience with the pricing of the solution.
Tanium Endpoint Platform reduces security risk, improves agility & increases efficiency, a fundamentally new approach to endpoint security's threat detection, indicent response, vulnerability assessment and configuration compliance & with management's software distribution, asset utilization, asset inventory and patch management.
There is an annual license required to use this solution.
It's an expensive solution. It would be nice if the cost were lower.
There is an annual license required to use this solution.
It's an expensive solution. It would be nice if the cost were lower.
Forescout Platform provides today’s busy enterprise organizations with policy and protocol management, workflow coordination, streamlining, and complete device and infrastructure visibility to improve overall network security. The solution also provides concise real-time intelligence of all devices and users on the network. Policy and protocols are delineated using gathered intelligence to facilitate the appropriate levels of remediation, compliance, network access, and all service operations. Forescout Platform is very flexible, integrates well with most of today’s leading network security products, and is a very cost-effective solution.
Devices with multiple IP's count multiple times against your license count.
The ROI is priceless.
Devices with multiple IP's count multiple times against your license count.
The ROI is priceless.
AWS Security Hub is a comprehensive security service that provides a centralized view of security alerts and compliance status across an AWS environment. It collects data from various AWS services, partner solutions, and AWS Marketplace products to provide a holistic view of security posture. With Security Hub, users can quickly identify and prioritize security issues, automate compliance checks, and streamline remediation efforts.
The price of the solution is not very competitive but it is reasonable.
The price of AWS Security Hub is average compared to other solutions.
The price of the solution is not very competitive but it is reasonable.
The price of AWS Security Hub is average compared to other solutions.
At Orca Security, we’re on a mission to make it fast, easy, and cost effective for organizations to address critical cloud security issues so they can operate in the cloud with confidence.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
The most expensive solution is Palo Alto. They claim to be very robust. The next most expensive is Wiz, followed by Orca and all the rest.
Overall, the pricing is reasonable and the discounts have been acceptable.
Acunetix Web Vulnerability Scanner is an automated web application security testing tool that audits your web applications by checking for vulnerabilities like SQL Injection, Cross site scripting, and other exploitable vulnerabilities.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
The costs aren't very expensive. It costs around $3000 or $4000.
Acunetix was around the same price as all the other vendors we looked at, nothing special.
The costs aren't very expensive. It costs around $3000 or $4000.
Pentera is the category leader for Automated Security Validation, allowing every organization to evaluate its security readiness, to know its real security risk at any given moment. Test all cybersecurity layers across the attack surface – inside and out – by safely emulating attacks & prioritize patching with a risk-based remediation roadmap.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info visit: pentera.io
We have to pay a yearly licensing cost for Pentera.
It's not that expensive, but it could be more cost-effective.
We have to pay a yearly licensing cost for Pentera.
It's not that expensive, but it could be more cost-effective.
Recorded Future is a powerful and effective cyber threat intelligence (CTI) platform that aims to empower administrators to protect their organizations from threats, both known and unknown. The machine learning engine that Recorded Future utilizes can process the same amount of data that 9,000 analysts working five days a week, eight hours a day for an entire year can process. It simplifies threat detection and remediation so that organizations can focus on other tasks.
There appear to be up to five different levels, with the most expensive version costing around $95,000 to $105,000 a year for subscription services.
The price of the solution is worth it. The overall performance of the solution outweighs the cost.
There appear to be up to five different levels, with the most expensive version costing around $95,000 to $105,000 a year for subscription services.
The price of the solution is worth it. The overall performance of the solution outweighs the cost.
The Skybox Security Suite platform combines firewall and network device data with vulnerability and threat intelligence, prioritizing security issues in the context of your unique environment. Powerful attack vector analytics reduce response times and risks, bringing firewall, vulnerability and threat management processes for complex networks under control.
The pricing is high, and the licensing model needs more flexibility.
The pricing has increased exorbitantly in the last few years, so now it is questionable. Now, it makes me want to review other products.
The pricing is high, and the licensing model needs more flexibility.
The pricing has increased exorbitantly in the last few years, so now it is questionable. Now, it makes me want to review other products.
Skyhigh Security protects organizations with cloud-based Zero Trust security solutions that are both data-aware and simple to use. Skyhigh’s Security Service Edge portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security, while providing the visibility and control required to monitor and mitigate security risks.
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
The biggest thing to watch for is the difference in price per monitored user for the different API integrations.
Skyhigh provided a FedRAMP solution, tokenization, a better shadow IT capability, and lower cost.
The biggest thing to watch for is the difference in price per monitored user for the different API integrations.
Trend Vision One- Cloud Security is a cloud security solution that offers comprehensive threat protection, monitoring, and visibility for cloud environments. Users appreciate its ability to centralize security management across multiple platforms, ensuring compliance and reducing the risk of data breaches. With advanced features like data encryption, network security, and data loss prevention, Trend Vision One- Cloud Security offers strong performance and ease of use. This solution has helped companies improve efficiency, streamline processes, and enhance productivity.
It's a slightly expensive product.
We make use of the full licensing version.
It's a slightly expensive product.
We make use of the full licensing version.
Claroty Secure Remote Access minimizes the risks remote users, including employees and 3rd parties, introduce to OT networks. It provides a single, manageable interface that all external users connect through, prior to performing software upgrades, periodic maintenance, and other support activities on assets within industrial control system networks.
Check Point CloudGuard CNAPP is a robust cloud security solution, offering comprehensive protection for cloud workloads and applications against cyberattacks. This platform encompasses cloud security posture management, threat prevention, and efficient incident response, providing organizations with a unified defense against threats. Key features include continuous visibility and remediation of misconfigurations, threat prevention through various techniques like intrusion prevention and malware detection, and rapid, cost-effective incident response. With CloudGuard CNAPP, you can safeguard cloud-native applications, cloud infrastructure, and sensitive data, enhancing your overall cloud security posture. This solution is a powerful asset for organizations seeking to fortify their cloud environments against a range of cyber threats.
It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution.
Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges.
It is a very straightforward licensing model that is based on the number of assets you are discovering and managing with the solution.
Licensing and costs are straightforward, as they have a baseline of 100 workloads within one license and no additional charges.
Cisco SecureX is an integrated security platform that connects the breadth of Cisco's integrated security portfolio and the customer's infrastructure to create a consistent experience. The solution unifies visibility, enables automation, and strengthens your security across network, endpoints, cloud, and applications. Cisco SecureX is embedded within every Cisco Security product and supports integrations with SIEM and SOAR, so customers will not need to replace any solution or worry about layering on new technology.
For the value you get, the pricing of the solution is excellent.
It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco.
For the value you get, the pricing of the solution is excellent.
It would be nice if they had a different pricing model. Most of our budget for projects goes towards Cisco.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
SUSE NeuVector is a full lifecycle container security solution that helps your organization secure its container infrastructures, manage Kubernetes security risks, and block threats. The NeuVector continuous container security and compliance platform simplifies data protection from pipeline to production, enforces compliance, and provides complete visibility and automated controls for protection against known and unknown threats. In addition, NeuVector is the only Kubernetes-native container security solution that offers a comprehensive risk profile of known vulnerabilities and also delivers immediate protection from all vulnerabilities.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Licensing fees are paid yearly.
The solution's pricing could be better. The cost of a subscription is calculated on the basis of work.
Funded by world-class investors including Evolution Equity Partners, Silver Lake Partners, Sequoia Capital, GV, Riverwood Capital, and others, SecurityScorecard is the global leader in cybersecurity ratings with more than 12 million companies continuously rated. Founded in 2013 by security and risk experts Dr. Aleksandr Yampolskiy and Sam Kassoumeh, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for enterprise risk management, third-party risk management, board reporting, due diligence, cyber insurance underwriting, and regulatory oversight. SecurityScorecard continues to make the world a safer place by transforming the way companies understand, improve and communicate cybersecurity risk to their boards, employees and vendors. Every organization has the universal right to their trusted and transparent Instant SecurityScorecard rating. For more information, visit securityscorecard.com or connect with us on LinkedIn.
XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our attack path management platform continuously uncovers hidden attack paths to your critical assets across cloud and on-prem environments, so you can cut them off at key junctures and eradicate risk with a fraction of the effort. This overcomes the big disconnect that security teams experience when they’re presented with endless alerts, yet can’t see which exposures impact risk the most, how they come together to be exploited by an attacker, or how to efficiently eliminate them. This approach is a complete game-changer, which is why some of the world’s largest, most complex organizations choose XM Cyber to help eradicate risk. Founded by top executives from the Israeli cyber intelligence community, XM Cyber has offices in North America, Europe, and Israel.
We have to pay standard licensing fees.
We have to pay standard licensing fees.
Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk.
The product’s pricing is medium.
The licensing model follows a per-user per-month structure.
The product’s pricing is medium.
The licensing model follows a per-user per-month structure.
Take control of your cloud security program with Tenable Cloud Security (formerly Tenable.cs) low-impact cloud agentless scanning, automated threat detection and risk prioritization. Developed by the leader in vulnerability management, Tenable Cloud Security enables security teams to continuously assess the security posture of cloud environments, offering full visibility across multi-cloud environments and helping you prioritize efforts based on business risk.
The tool's pricing is fair.
The tool's pricing is fair.
We are the fusion of former US Special Operations cyber operators, startup engineers, and frustrated cybersecurity practitioners. We see the world for what it is - bloated security tools, alert fatigue, reports filled with false positives, "checkbox" security culture, and consultants trying to pitch their "expertise".
Portnox CORE provides 100% actionable visibility of all devices that are connected to your network. As the first software-based NAC platform, Portnox CORE's patented solution allows you to manage the security and compliance challenges your organization faces in a smart and simple way.
Pricing is not cheap. It is based on licenses per port. After licensing is purchased, you only pay for support.
We pay for port licensing and support on a yearly basis, and it's not cheap.
Pricing is not cheap. It is based on licenses per port. After licensing is purchased, you only pay for support.
We pay for port licensing and support on a yearly basis, and it's not cheap.
Armis eliminates the IoT security blind spot, letting enterprises instantly see and control unmanaged or rogue devices and networks.
Cisco Vulnerability Management equips you with the contextual insight and threat intelligence needed to intercept the next exploit and respond with precision.
I think the pricing is based on the number of endpoints, so it's more subscription-based.
I think the pricing is based on the number of endpoints, so it's more subscription-based.
Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats. Organizations can suffer regulatory fines, loss of intellectual property, and reputational damage when digital risk is left unmanaged. Digital Shadows SearchLight™ helps you minimize these risks by detecting data loss, securing your online brand, and reducing your attack surface. To learn more and get free access to SearchLight, visit www.digitalshadows.com.
Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. Amazon Inspector automatically assesses applications for exposure, vulnerabilities, and deviations from best practices. After performing an assessment, Amazon Inspector produces a detailed list of security findings prioritized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via the Amazon Inspector console or API.
It's priced according to market standards for its services.
It's priced according to market standards for its services.
Singularity Hologram, a component of the SentinelOne Singularity platform, leverages advanced, high-interaction deception and decoy technology to lure in-network attackers and insider threat actors into engaging and revealing themselves. By mimicking production IT, IoT, and OT OSes, applications, data, native cloud technologies, and more, Singularity Hologram uncovers covert adversary activity, collects high-fidelity telemetry, and garners actionable intelligence to help you strengthen your defenses. Singularity Hologram decoys appear indistinguishable from production assets and are designed to engage and misdirect attackers away from real systems and data. All decoys encompass a breadth of form factors, adapting to a variety of business & organizational needs.
Bridgecrew is a comprehensive cloud security platform that helps organizations automate security and compliance across their cloud infrastructure. With its powerful capabilities, Bridgecrew enables teams to identify and remediate security issues in real-time, ensuring a secure and compliant cloud environment.
One of Bridgecrew's key features is its ability to continuously scan cloud infrastructure for misconfigurations, vulnerabilities, and compliance violations. It provides a centralized dashboard that displays the security posture of the entire cloud environment, allowing teams to quickly identify and prioritize security issues.
Bridgecrew also offers automated remediation capabilities, allowing teams to fix security issues with just a few clicks. It provides step-by-step instructions on how to remediate each issue, making it easy for even non-security experts to address vulnerabilities and misconfigurations.
Another notable feature of Bridgecrew is its integration with popular DevOps tools like GitHub, GitLab, and Jira. This allows teams to seamlessly incorporate security into their existing workflows, enabling them to catch and fix security issues early in the development process.
Bridgecrew also provides detailed reports and compliance documentation, making it easier for organizations to demonstrate their adherence to industry standards and regulations. It also offers continuous monitoring and alerting, ensuring that any new security issues are promptly detected and addressed.
Bridgecrew is a powerful cloud security platform that automates security and compliance across cloud infrastructure. With its continuous scanning, automated remediation, and integration capabilities, Bridgecrew helps organizations maintain a secure and compliant cloud environment.
Zscaler CSPM automates visibility into the status of more than 1,500 security policies and 14 compliance frameworks across AWS, Azure and Office365. The product also allows organizations to create their own private benchmarks, supports large-scale application environments and allows rapid adoption of DevSecOps.
When comparing it to other security solutions, it offers effective protection at a lower cost.
In the long run, cloud services are not inherently costly.
When comparing it to other security solutions, it offers effective protection at a lower cost.
In the long run, cloud services are not inherently costly.
Automate your third party risk assessment workflows, and get instant notifications about your vendors’ security, all in one centralized dashboard with UpGuard’s Vendor Risk.
Tripwire IP360 is a comprehensive vulnerability management solution that helps organizations identify and prioritize security risks within their network.
With its powerful scanning capabilities, users can quickly pinpoint vulnerabilities across a wide range of devices and applications. The software is not only effective for improving overall security posture but also for ensuring compliance with regulatory requirements.
Additionally, Tripwire IP360 assists with risk management by providing insights into potential security threats and helping organizations proactively mitigate risks. Users have praised the user-friendly interface and reporting functionality, which streamlines the process of identifying and remediating vulnerabilities.
The seamless integration with other security tools also enhances the overall network security management process.
I believe the price compares well within the market.
The product was expensive for us.
I believe the price compares well within the market.
The product was expensive for us.
Automate vulnerability management with a cloud-based, machine learning-powered solution. Intelligently prioritize remediation efforts based on actionable recommendations that reflect the context of your environment.
The SecPoint Penetrator is a vulnerability scanning device that simulates how a hacker could penetrate a given system (hence the term) and reports vulnerabilities, which should then help strengthen security measures against online outlaws, virtual villains, cyber criminals, techno terrorists, and other nefarious elements of the Worldwide Web at large.
Shut the window of opportunity for cybercriminals. Track down vulnerable software across Windows, Mac OSx and Linux systems. Prioritize the most critical security patches. Integrate with WSUS and SCCM to patch Non-Microsoft applications. With Flexera Software Vulnerability Manager (formerly CSI), you optimize your work and leave no room for incidents.
Helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.
Our data fabric architecture integrates disparate data sources from legacy systems, data lakes, data warehouses, sql databases, and apps, providing a holistic view of business performance.
Automation, 2-way sync, alerts, and analytics live on top of the platform, powered by the data fabric.
All security functions benefit from fast, reliable, and precise analysis of enterprise data including asset coverage, compliance reporting, ROSI analysis, vulnerability management, and more.