Try our new research platform with insights from 80,000+ expert users

Rezonate vs Vulcan Cyber comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Rezonate
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Non-Human Identity Management (NHIM) (15th)
Vulcan Cyber
Average Rating
7.4
Reviews Sentiment
7.1
Number of Reviews
11
Ranking in other categories
Vulnerability Management (25th), Risk-Based Vulnerability Management (9th), Cloud Security Remediation (2nd)
 

Mindshare comparison

Rezonate and Vulcan Cyber aren’t in the same category and serve different purposes. Rezonate is designed for Non-Human Identity Management (NHIM) and holds a mindshare of 1.2%, down 1.5% compared to last year.
Vulcan Cyber, on the other hand, focuses on Vulnerability Management, holds 0.6% mindshare, up 0.6% since last year.
Non-Human Identity Management (NHIM) Market Share Distribution
ProductMarket Share (%)
Rezonate1.2%
Astrix20.7%
Oasis17.6%
Other60.5%
Non-Human Identity Management (NHIM)
Vulnerability Management Market Share Distribution
ProductMarket Share (%)
Vulcan Cyber0.6%
Wiz7.5%
Tenable Nessus5.2%
Other86.7%
Vulnerability Management
 

Featured Reviews

Use Rezonate?
Leave a review
reviewer2649297 - PeerSpot reviewer
Technical Architect at a manufacturing company with 10,001+ employees
Streamlines prioritization but reporting needs enhancement
There are several areas needing improvement. The product helps, but the reporting relies heavily on Power BI. It is limited to graphical views and requires additional filtering, posing operational challenges. The inability to download specific asset details directly from the Power BI portal is a drawback, particularly for non-technical users, though it provides high-level executive summaries. The reporting model should be enhanced so that we have the flexibility to download. We have requested a few features, and they are open to accepting those requests. It needs ITSM improvements. It has out-of-the-box integration with ServiceNow, but the customer is using BMC Helix ITSM. We would like an integration with BMC Helix ITSM. When uploading CSV files without an out-of-the-box connector, duplicate entries for assets occur. We have already reported this to them, but we are not sure when they will fix it. It will significantly benefit if we can directly upload business context information from CMDB without manual merging efforts. It can also have automatic remediation capabilities through SCCM or something else.
report
Use our free recommendation engine to learn which Non-Human Identity Management (NHIM) solutions are best for your needs.
879,425 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Computer Software Company
29%
Manufacturing Company
8%
Financial Services Firm
8%
Insurance Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business1
Large Enterprise10
 

Questions from the Community

Ask a question
Earn 20 points
What is your experience regarding pricing and costs for Vulcan Cyber?
I don't deal with the pricing of the solution. I'm not a part of that department.
What needs improvement with Vulcan Cyber?
One area for improvement is clarity in the results column of vulnerability reports. Currently, the path where the vulnerability lies is not clear, so Vulcan needs to work on specifying the correct ...
What is your primary use case for Vulcan Cyber?
I have been using the solution for more than six months. Essentially, any reporting I do for our internal Internet assets involves using Vulcan. The primary use of Vulcan is extracting the reports,...
 

Interactive Demo

 

Overview

 

Sample Customers

Information Not Available
Stitch Fix, Mandiant, Wealthsimple, Entrust, Anaplan, Deloitte, Origami Risk, Verana Health
Find out what your peers are saying about Entro Security, GitGuardian, One Identity and others in Non-Human Identity Management (NHIM). Updated: December 2025.
879,425 professionals have used our research since 2012.