No more typing reviews! Try our Samantha, our new voice AI agent.

Cycode vs Seeker Interactive comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Cortex Cloud by Palo Alto N...
Sponsored
Average Rating
8.6
Reviews Sentiment
5.7
Number of Reviews
11
Ranking in other categories
Vulnerability Management (28th), Cloud Workload Protection Platforms (CWPP) (11th), Cloud Security Posture Management (CSPM) (16th), Cloud-Native Application Protection Platforms (CNAPP) (11th), Data Security Posture Management (DSPM) (11th), Software Supply Chain Security (6th), Cloud Infrastructure Entitlement Management (CIEM) (6th), Application Security Posture Management (ASPM) (6th), Cloud Detection and Response (CDR) (4th)
Cycode
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Static Application Security Testing (SAST) (29th), Software Composition Analysis (SCA) (24th), Software Supply Chain Security (14th), Application Security Posture Management (ASPM) (11th)
Seeker Interactive
Average Rating
7.0
Reviews Sentiment
7.3
Number of Reviews
1
Ranking in other categories
Internet Security (15th), Mobile Threat Defense (14th), API Security (18th)
 

Mindshare comparison

Application Security Posture Management (ASPM) Mindshare Distribution
ProductMindshare (%)
Cycode5.1%
Snyk15.9%
Veracode11.3%
Other67.7%
Application Security Posture Management (ASPM)
Internet Security Mindshare Distribution
ProductMindshare (%)
Seeker Interactive1.1%
Cisco Umbrella27.9%
Zscaler Internet Access27.3%
Other43.7%
Internet Security
 

Featured Reviews

SJ
Technical Solutions Architect at IBM
Cloud security has improved as AI-driven runtime protection detects threats and reduces incidents
In my opinion, Cortex Cloud by Palo Alto Networks could be improved or enhanced in various ways. I don't have an idea about that yet because for that you actually need to use two or three different other tools to make a basic comparison. If you ask me how good the tool is, I would fairly rate it quite high. The tool is very popular, and customers can already see that it is one of the cloud leaders in the security space. The platform had a very good feature which provides documentation links about how to use a specific feature on the UI. It takes you to the proper documentation page where it suggests what to do and tells you about the steps that need to be done for a resource deployment. My thoughts about improving the product which I believe could greatly aid vendors is that it used to be a very user-friendly tool, but now they have incorporated everything under one umbrella. It has XDR, XSOAR, and Cortex Cloud by Palo Alto Networks. Before, we used to have separate modules and separate environments for each of these capabilities or features. Right now, it is a little complex and users would take their own time to know the tool better. This is something that would have been way better, but I would say there would be different opinions on this. Talking about user-friendliness, it has decreased now.
Use Cycode?
Leave a review
San K - PeerSpot reviewer
Senior Group Leader at Infosys
More effective than dynamic scanners, but is missing useful learning capabilities
One area that Seeker can improve is to make it more customizable. All security scanning tools have a defined set of rules that are based on certain criteria which they will use to detect issues. However, the criteria that you set initially is not something that all applications are going to need. The purposes for which applications are designed may differ in practice in the industry, and because of this, there will always be tools that sometimes report false positives. Thus, there should be some means with which I can customize the way that Seeker learns about our applications, possibly by using some kind of AI / ML capability within the tool that will automatically reduce the number of false positives that we get as we use the tool over time. Obviously, when we first start using the scanning tool there will be false positives, but as it keeps going and as I keep using the tool, there should be a period of time where either the application can learn how to ignore false positives, or I can customize it do so. Adding this type of functionality would definitely prevent future issues when it comes to reporting false positives, and this is a key area that we have already asked the vendor to improve on, in general. On a different note, there is one feature that isn't completely available right now where you can integrate Seeker with an open-source vulnerability scanner or composition analysis tool such as Black Duck. I would very much like this capability to be available to us out-of-the-box, so that we can easily integrate with tools like Black Duck in such a way that any open source components that are used in the front-end are easily identified. I think this would be a huge plus for Seeker. Another feature within Seeker which could benefit from improvement is active verification, which lets you actively verify a vulnerability. This feature currently doesn't work in certain applications, particularly in scenarios where you have requested tokens. When we bought the tool, we didn't realize this and we were not told about it by the vendor, so initially it was a big challenge for us to overcome it and properly begin our deployment.
report
Use our free recommendation engine to learn which Application Security Posture Management (ASPM) solutions are best for your needs.
886,349 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Construction Company
14%
Financial Services Firm
9%
Manufacturing Company
7%
Performing Arts
6%
Financial Services Firm
16%
Manufacturing Company
14%
Computer Software Company
8%
University
8%
Financial Services Firm
22%
Government
16%
Comms Service Provider
9%
Retailer
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business7
Midsize Enterprise1
Large Enterprise4
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Cortex Cloud by Palo Alto Networks?
I am not fully aware of the pricing and licensing of Cortex Cloud by Palo Alto Networks. The pricing is also based on...
What needs improvement with Cortex Cloud by Palo Alto Networks?
In my opinion, Cortex Cloud by Palo Alto Networks could be improved or enhanced in various ways. I don't have an idea...
What is your primary use case for Cortex Cloud by Palo Alto Networks?
The usual use cases for Cortex Cloud by Palo Alto Networks that I have been working with mostly are as simple as dete...
Ask a question
Earn 20 points
Ask a question
Earn 20 points
 

Overview

 

Sample Customers

Information Not Available
Information Not Available
El Al Airlines and Société Française du Radiotelephone
Find out what your peers are saying about Veracode, Snyk, Checkmarx and others in Application Security Posture Management (ASPM). Updated: March 2026.
886,349 professionals have used our research since 2012.