Hackuity vs RedSeal comparison


Comparison Buyer's Guide

Executive Summary

Categories and Ranking

Ranking in Risk-Based Vulnerability Management
Average Rating
Number of Reviews
Ranking in other categories
No ranking in other categories
Ranking in Risk-Based Vulnerability Management
Average Rating
Number of Reviews
Ranking in other categories
No ranking in other categories

Featured Reviews

Use Hackuity?
Share your opinion
Sajid Mukhtar - PeerSpot reviewer
Apr 3, 2021
Provides a graphical overview of our network and is easy to deploy, but needs a user-friendly interface and a feature for compliance audit policy
Sometimes, it required us to refresh the configuration. When we integrated any of the configurations into the device, sometimes, it could not detect the exact picture of that device. So, we had to reset the device to see that if it was giving true-positive results or false-positive results. In some cases, we were not able to get true-positive results. There was some kind of bug in that version. Its interface is not user-friendly and needs to be improved. It takes time to understand the interface and various options. Skybox has quite a user-friendly interface. They could provide a feature for compliance audit policy if it is already not there. A compliance audit policy ensures that all configurations are based on the best practices standards, such as CIS benchmarks standard or other similar standards. It provides visibility about whether your device configuration is based on best practices or not. Usually, such a feature is provided by other solutions such as Meteor or Tenable Nessus.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice

Information not available
"The pricing is based on the number of endpoints and devices, and we have seen it range from mid-five figures to low six figures."
Use our free recommendation engine to learn which Risk-Based Vulnerability Management solutions are best for your needs.
792,621 professionals have used our research since 2012.

Top Industries

By visitors reading reviews
No data available
Computer Software Company
Financial Services Firm
Healthcare Company

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available



Learn More




Sample Customers

1. Atlassian 2. Cisco 3. Google 4. IBM 5. Intel 6. Microsoft 7. Oracle 8. PayPal 9. SAP 10. Siemens 11. VMware 12. Accenture 13. Booz Allen Hamilton 14. Deloitte 15. EY 16. KPMG 17. PwC 18. Accenture Security 19. BAE Systems 20. FireEye 23. FSecure 24. Gartner 25.Intel Security 26. McAfee
United States Postal Service, Pacific Gas and Electric Co., Interval International
Find out what your peers are saying about Tenable, Qualys, Rapid7 and others in Risk-Based Vulnerability Management. Updated: June 2024.
792,621 professionals have used our research since 2012.