Try our new research platform with insights from 80,000+ expert users

AttackIQ vs NinjaOne comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Ranking in Vulnerability Management
18th
Average Rating
9.6
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (3rd)
AttackIQ
Ranking in Vulnerability Management
56th
Average Rating
7.6
Reviews Sentiment
5.2
Number of Reviews
2
Ranking in other categories
Breach and Attack Simulation (BAS) (8th), Attack Surface Management (ASM) (25th), Continuous Threat Exposure Management (CTEM) (11th)
NinjaOne
Ranking in Vulnerability Management
26th
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
21
Ranking in other categories
Network Monitoring Software (24th), Server Monitoring (6th), IT Service Management (ITSM) (8th), Remote Access (14th), Mobile Device Management (MDM) (5th), IT Alerting and Incident Management (9th), Remote Monitoring and Management (RMM) (1st), Patch Management (7th), MSP Backup (2nd), Unified Endpoint Management (UEM) (6th)
 

Mindshare comparison

As of January 2026, in the Vulnerability Management category, the mindshare of Zafran Security is 1.1%, up from 0.2% compared to the previous year. The mindshare of AttackIQ is 0.6%, up from 0.1% compared to the previous year. The mindshare of NinjaOne is 0.9%, up from 0.4% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Zafran Security1.1%
NinjaOne0.9%
AttackIQ0.6%
Other97.4%
Vulnerability Management
 

Featured Reviews

Reviewer6233 - PeerSpot reviewer
Works at a healthcare company with 10,001+ employees
Has become an indispensable tool in our cybersecurity arsenal
While Zafran Security is already a powerful tool, there are areas where it could be further improved to provide even greater value. One key area for enhancement is the searching capabilities within its vulnerabilities module. By incorporating the ability to create Boolean searches, users would gain the ability to apply more complex filters and customize their search criteria. This would greatly enhance the precision and efficiency with which security teams can identify and prioritize vulnerabilities. Having such tailored search capabilities would save time and resources by narrowing down vast lists of vulnerabilities to those that meet specific parameters relevant to our unique risk environment. Additionally, integrating more robust reporting and visualization tools would be advantageous. Enhanced dashboards that offer customizable visual representations of risk configurations and threat landscapes would facilitate better communication with stakeholders, making it easier to explain vulnerabilities and the rationale behind certain security measures. This would also aid in demonstrating the improvements and value derived from existing security investments to leadership and non-technical team members.
reviewer2797743 - PeerSpot reviewer
Software Development Analyst at a tech vendor with 10,001+ employees
Continuous attack simulations have improved real-world threat detection and response skills
The best features AttackIQ offers include being a cybersecurity platform specializing in breach attack simulation and AEF validation, as it tests the organization's defenses by simulating real-world attack behavior, which are aligned with the MITRE ATT&CK framework, providing a platform where I can run real-world attack scenarios and identify and mitigate them. AttackIQ is well-aligned with the MITRE ATT&CK framework and has strong continuous validation. The platform is built to run continuous and automation tests, which helps during point-in-time checks or reduces blind spots. AttackIQ positively impacts my organization as most of my colleagues and seniors have been using it to understand real-world attack scenarios and how to cope with those situations, benefiting the company, colleagues, and team. After using AttackIQ, it has helped the team and the company improve on false positives and reduce risk, as most people are now capable of identifying how to work on detection, improving fine-tuning and all those things. It has definitely benefited the organization in terms of faster risk identification and faster response times.
Not Joseph Pearson - PeerSpot reviewer
Assistant Vice President, Tech Solutions at LPL Financials
Has simplified remote software delivery and script management but needs improved reporting flexibility and better Mac support
NinjaOne's best features include ease of use regarding enablement and deployment, a broad selection and ability of software enablement, and API deliveries. Using CrowdStrike, we are able to tie in NinjaOne's API to have these automatically deliver to endpoints upon addition of those devices to a group with that policy deployed to it. NinjaOne has positively impacted our organization by making delivery easier for our end users and improving the ability to create scripts, manage scripts, and check status of devices and their compliance. This easier delivery with NinjaOne gives us oversight on devices without having to be on the call or remoted in directly to a device.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"With Zafran Security, it integrates with your security controls, allowing you to take that risk score and reduce it based on the controls in place or increase the risk based on different factors, such as if the issue is internet reachable or if there's an exploit in the wild."
"Overall, we have seen about eighty-seven percent reduction of the number of vulnerabilities that require urgency to remediate, specifically the number of criticals."
"We saw benefits from Zafran Security almost immediately after deploying it."
"We are able to see the real risk of a vulnerability on our environment with our security tools."
"Zafran has become an indispensable tool in our cybersecurity arsenal."
"Zafran is an excellent tool."
"After using AttackIQ, it has helped the team and the company improve on false positives and reduce risk, as most people are now capable of identifying how to work on detection, improving fine-tuning and all those things."
"Overall, I've had a good experience with the product. It's worked well for me."
"It just works as advertised and serves the purpose for which we got it."
"The best feature of NinjaOne is the SLA system. Every IT person can check their performance, how long it takes to resolve an issue, and how many SLAs are breached."
"The tool's most valuable feature is third-party application updates."
"A significant feature of NinjaOne is its remote access capability, which is essential for my clients’ home office usage."
"NinjaOne has a feature where we can create custom scripts that we can run on devices remotely."
"The most valuable feature we have found currently is probably patch management."
"We can use it for remote monitoring, and it also works great as a troubleshooting tool. We are able to open up a command line or a PowerShell session remotely without having to disrupt the user. They have a limited network device monitoring capability, but for workstation servers, we have the event logs. We can do performance monitoring, system changes, software deployment, and patch management. We can also push scripts. It has a very simple web interface. There are no additional things to do there. Security is also pretty good. It does the same things that the other competitor's tools do. One of the advantages of Ninja is that they have a more capable mobile app, which allows you to see the alerts immediately. I get alerted to major critical issues."
"The software's automation tools have solved critical deployment problems for small businesses."
 

Cons

"The dashboarding and reporting functionality of Zafran Security is an area that definitely could use some improvements."
"I think the ability to have some enhanced reporting capabilities is something they can improve on, as they have good reports but we have asked for some specific reporting enhancements."
"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"The initial setup was quite difficult and took a long time."
"The solution could improve by optimizing the internet connection being used."
"The ability to not have a NinjaOne agent or multiple NinjaOne agents on a singular device is a big pain point for the device, and secondly, the macOS support is also what keeps it from being a higher score."
"NinjaOne's pricing and user interface needs improvement."
"The inclusion of XENServer and Proxmox as virtual platforms in NinjaOne is currently missing."
"NinjaOne's reporting module is cumbersome."
"It can have more integrations with third-party providers, such as Deep Instinct. They do partner with certain antivirus or remote access tool partners, but they can increase their portfolio to have more choices."
"NinjaOne's dashboard could be easier to use."
"I want NinjaOne to improve the reports."
 

Pricing and Cost Advice

Information not available
Information not available
"It roughly costs $400 a month. It provides a good value because of the number of tools that you get in the solution. I would rate it a four out of five in terms of pricing. There are no additional costs other than the standard licensing fees."
"I rate the solution’s pricing a five out of ten, where one is the lowest and ten is the most expensive."
"NinjaOne is a little expensive but is still cheaper than competitors like Acronis or Veeam."
"We currently pay $1.20 per device on a monthly basis."
"The pricing is reasonable and cheaper than ConnectWise."
"The product's pricing depends on the number of PCs or devices."
"NinjaOne's price is fine since my workplace is an educational institution, so we get the product at a really good price considering that we do not pay taxes, making the prices very fair and worth the product."
"NinjaRMM uses a subscription model."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
881,114 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
11%
Manufacturing Company
8%
Computer Software Company
8%
Outsourcing Company
6%
Financial Services Firm
18%
Manufacturing Company
10%
Government
8%
Computer Software Company
8%
Computer Software Company
12%
Government
8%
Manufacturing Company
7%
Financial Services Firm
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
By reviewers
Company SizeCount
Small Business17
Midsize Enterprise3
Large Enterprise2
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
Since we stood Zafran Security up in our private cloud, we handle the maintenance on our side. As we opted not to use...
What needs improvement with Zafran Security?
In terms of areas for improvement, Zafran Security is doing a really great job as a new and emerging company. Oftenti...
What is your primary use case for Zafran Security?
My use cases for Zafran Security revolve around two primary areas. One is around vulnerability management and priorit...
Ask a question
Earn 20 points
What is your experience regarding pricing and costs for NinjaOne?
My experience with pricing, setup cost, and licensing for NinjaOne is fairly cheap and easy.
What needs improvement with NinjaOne?
One challenge I face with NinjaOne is that when remoting in, sometimes the end user has a resolution with very tiny t...
What is your primary use case for NinjaOne?
My main use case for NinjaOne is ticketing. I use NinjaOne for ticketing in my daily work to keep track of all the co...
 

Comparisons

 

Also Known As

No data available
DeepSurface
No data available
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
Status Pros, Mitchell and Company
Find out what your peers are saying about Wiz, Tenable, Qualys and others in Vulnerability Management. Updated: January 2026.
881,114 professionals have used our research since 2012.