Try our new research platform with insights from 80,000+ expert users

Debricked Security vs ESET Cloud Apps Protection comparison

Sponsored
 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Zafran Security
Sponsored
Ranking in Vulnerability Management
27th
Average Rating
9.6
Reviews Sentiment
8.1
Number of Reviews
3
Ranking in other categories
Continuous Threat Exposure Management (CTEM) (3rd)
Debricked Security
Ranking in Vulnerability Management
109th
Average Rating
0.0
Reviews Sentiment
8.4
Number of Reviews
1
Ranking in other categories
Software Composition Analysis (SCA) (23rd)
ESET Cloud Apps Protection
Ranking in Vulnerability Management
39th
Average Rating
9.6
Reviews Sentiment
7.4
Number of Reviews
2
Ranking in other categories
Email Security (28th), Patch Management (22nd)
 

Mindshare comparison

As of May 2025, in the Vulnerability Management category, the mindshare of Zafran Security is 0.6%, up from 0.0% compared to the previous year. The mindshare of Debricked Security is 0.0%, down from 0.0% compared to the previous year. The mindshare of ESET Cloud Apps Protection is 0.1%, up from 0.1% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Vulnerability Management
 

Featured Reviews

Israel Cavazos Landini - PeerSpot reviewer
Weekly insights and risk analysis facilitate informed security decisions
I appreciate the weekly insights Zafran provides, which include critical topics for networks and IT security, allowing us to evaluate which insights apply to our environment. The organization score feature is valuable to keep the leadership team updated on how our infrastructure fares security-wise. The applicable risk level versus base risk level feature is beneficial because prior to Zafran, we only used the base risk level, but now understand that risk depends on the asset itself. Zafran is an excellent tool.
Jonathan Steyn - PeerSpot reviewer
Allows for organizations and projects to manage open source vulnerabilities in an efficient, smooth and secure way
Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that Debricked can understand. While the conversion isn't difficult, it is pretty technical and could be challenging for non-technical users. Apart from that, all software features work seamlessly. The integration with endpoints took less than fifteen minutes, and everything from security conventions to automation rules works perfectly. As for AI, Debricked Security uses it effectively, reducing manual work and unnecessary analysis. It enhances data analysis, making it much easier for customers, which I appreciate about the tool.
LA
Great protection, good privacy, and helpful support
The only thing I would like is a way to open the email that is going to quarantine. Based on the level of security, they cannot open the email to check the message. Even for the administrator, you have to create a security copy to be sent, which will lock the log support. It's not easy for an admin to check and decide if the email is good or not. That is the only thing that I'm seeing could be improved. Basically, ESET doesn't have the ability to let the administrator release an email showing the message on the email. It's not possible. If you want to have an email review, you have to select an option to send a copy. In the way that they designed the system, for security, they are not letting anyone even have the admin privileges to make this happen. Privacy is at a really high level.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Zafran is an excellent tool."
"Zafran has become an indispensable tool in our cybersecurity arsenal."
"We are able to see the real risk of a vulnerability on our environment with our security tools."
"One of the most valuable features of Debricked Security is its ability to integrate with other tools like the Software Security Center and Fortify on Demand. This integration allows users to make comparisons and generate detailed reports based on the data that Debricked Security populates or aggregates. While this feature may not be unique, it is highly effective for detecting vulnerabilities and providing comprehensive insights."
"We are close to having 99% or 98% detection."
"The most valuable features are the precision of detection and the level of customization of the policy."
 

Cons

"Initially, we were somewhat concerned about the scalability of Zafran due to our large asset count and the substantial amount of information we needed to process."
"Debricked Security has already implemented several improvements, which are great. One area that could be improved is simplifying the process of converting other SBOM data formats into files that Debricked can understand. While the conversion isn't difficult, it is pretty technical and could be challenging for non-technical users. Apart from that, all software features work seamlessly. The integration with endpoints took less than fifteen minutes, and everything from security conventions to automation rules works perfectly. As for AI, Debricked Security uses it effectively, reducing manual work and unnecessary analysis. It enhances data analysis, making it much easier for customers, which I appreciate about the tool."
"It's not easy for an admin to check and decide if the email is good or not."
"The specific domain file for Apache needs to be well-defined."
 

Pricing and Cost Advice

Information not available
"Regarding the cost, in my country, I would say it is expensive. However, I’m not directly involved in the sales process, so I don't have the exact license costs."
"The solution provides affordable pricing for medium sized industries."
report
Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
851,451 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Financial Services Firm
12%
Manufacturing Company
7%
Government
6%
Computer Software Company
18%
Comms Service Provider
12%
Financial Services Firm
8%
University
6%
Computer Software Company
15%
Comms Service Provider
12%
Media Company
7%
Consumer Goods Company
6%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
No data available
 

Questions from the Community

What is your experience regarding pricing and costs for Zafran Security?
I find that the pricing for Zafran aligns well with the comprehensive features it offers. The asset and user-based li...
What needs improvement with Zafran Security?
Zafran is a new startup. Features are continuously being added or improved. 1) Continued integrations with existing (...
What is your primary use case for Zafran Security?
We connect this to our vulnerability scanner as input, our security tools to better determine risk, and our change ma...
What is your experience regarding pricing and costs for Debricked Security?
Regarding the cost, in my country, I would say it is expensive. However, I’m not directly involved in the sales proce...
What needs improvement with Debricked Security?
Debricked Security has already implemented several improvements, which are great. One area that could be improved is ...
What is your primary use case for Debricked Security?
I initially did proof of value or concept walkthroughs of Debricked Security for the customer. I demonstrated the val...
What do you like most about ESET Mail Security?
The most valuable features are the precision of detection and the level of customization of the policy.
What is your experience regarding pricing and costs for ESET Mail Security?
The solution provides affordable pricing for medium sized industries.
What needs improvement with ESET Mail Security?
The specific domain file for Apache needs to be well-defined.
 

Also Known As

No data available
No data available
ESET Mail Security
 

Overview

Find out what your peers are saying about Wiz, Qualys, Tenable and others in Vulnerability Management. Updated: May 2025.
851,451 professionals have used our research since 2012.