Try our new research platform with insights from 80,000+ expert users

Axonius vs IBM Security Randori Recon comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Axonius
Average Rating
8.6
Reviews Sentiment
7.5
Number of Reviews
6
Ranking in other categories
IT Vendor Risk Management (6th), Cyber Asset Attack Surface Management (CAASM) (1st)
IBM Security Randori Recon
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Attack Surface Management (ASM) (19th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. Axonius is designed for Cyber Asset Attack Surface Management (CAASM) and holds a mindshare of 35.3%, down 40.3% compared to last year.
IBM Security Randori Recon, on the other hand, focuses on Attack Surface Management (ASM), holds 1.5% mindshare, down 2.4% since last year.
Cyber Asset Attack Surface Management (CAASM)
Attack Surface Management (ASM)
 

Featured Reviews

Ashok Gunnia - PeerSpot reviewer
Integrates with ServiceNow and provides alerts for deviations
The most valuable feature of Axonius is its ability to deduplicate records and identify which ones are old and stale versus those more relevant. For example, if you haven't logged in today but a system somewhere else mentions you have, Axonius can detect this through various logs like Active Directory, file logging, or Wi-Fi connections. Traditionally, someone would have to make numerous calls and spend a lot of time to find out if you are on-site or connected to a Wi-Fi network. The tool simplifies this process. From my experience, onboarding and adding connectors was pretty easy, especially when integrating with the ServiceNow environment. It worked well for my use case, but the ease of use can depend on the customer's specific needs and what they are trying to achieve.
Use IBM Security Randori Recon?
Share your opinion
report
Use our free recommendation engine to learn which Cyber Asset Attack Surface Management (CAASM) solutions are best for your needs.
850,076 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Financial Services Firm
13%
Government
10%
Computer Software Company
9%
Manufacturing Company
8%
Financial Services Firm
13%
Computer Software Company
10%
Manufacturing Company
10%
Healthcare Company
10%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Axonius?
Axonius is quite a bit cheaper compared to other solutions. And the amount of value they provide is really huge compared to other vendors. So, it’s based on the actual requirement and how you want ...
What needs improvement with Axonius?
Axonius can improve on delivering compliance-related features, like PCI DSS, and different dashboards that work with various compliances. For example, if a company follows ISO, they can create a da...
What is your primary use case for Axonius?
We use it for reporting, noncompliance reporting, and identifying gaps. We use it for API monitoring within our company. And we also use it as a CMDB. Our security team, people within the SOC team,...
Ask a question
Earn 20 points
 

Also Known As

No data available
Randori
 

Overview

 

Sample Customers

Extreme Engineering Solutions, AppsFlyer, Landmark Health, Natera
VMware, Greenhill
Find out what your peers are saying about Axonius, Armis, Qualys and others in Cyber Asset Attack Surface Management (CAASM). Updated: April 2025.
850,076 professionals have used our research since 2012.