• HOME
  • CATEGORIES

    • CATEGORIES

    • Application Development

      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • View All
    • Artificial Intelligence

      • AI Code Assistants (Transitioning to AI Coding Agents)
      • Generative AI Knowledge Management Apps/General Productivity
      • AI Application Development Platforms
      • Conversational AI Platforms
      • Artificial Intelligence Applications in IT Service Management (Transitioning to AI Applications in IT Service Management)
      • View All
    • Cloud Computing

      • Backup and Data Protection Platforms
      • Cloud Database Management Systems
      • Strategic Cloud Platform Services
      • Server Virtualization (Transitioning to Server Virtualization Platforms)
      • Hybrid Cloud Storage
      • View All
    • Customer Relationship Management

      • Contact Center as a Service
      • CRM Customer Engagement Center
      • Digital Experience Platforms
      • Web Content Management
      • Field Service Management
      • View All
    • Data and Analytics

      • Analytics and Business Intelligence Platforms
      • Data Science and Machine Learning Platforms (Transitioning to AI Platforms For Data Science and Machine Learning)
      • Data Integration Tools
      • Process Mining Platforms (Transitioning to Process Intelligence Platforms)
      • Augmented Data Quality Solutions
      • View All
    • Education

      • Manager and Leadership Training
      • Corporate Learning Technologies
      • eLearning Authoring Tools
      • Higher Education Student Information System Software as a Service (Transitioning to Higher Education SaaS Student Information Systems)
      • Digital Learning Content Providers
      • View All
    • Enterprise Networking and Communications

      • Unified Communications as a Service
      • Global WAN Services
      • Intranet Packaged Solutions
      • SD-WAN
      • Edge Distribution Platforms
      • View All
    • Finance

      • Expense Management Software
      • Financial Close and Consolidation Solutions
      • Financial Planning Software
      • Cloud Financial Management Tools
      • Accounts Payable Applications
      • View All
    • Healthcare and Life Sciences

      • Medical Device Security Solutions (Transitioning to Medical Device Risk Management Platforms)
      • Health Navigation Solutions
      • Claim Editor Software
      • Revenue Cycle Management Software (Transitioning to Revenue Cycle Management Solutions)
      • Digital Health Platforms (Transitioning to Healthcare Provider Industry Cloud Platforms)
      • View All
    • Human Resources

      • Employee Recognition and Reward Systems
      • Workforce Management Applications (Transitioning to Workforce Management (WFM) Technology)
      • Digital Employee Experience Management Tools
      • Talent Acquisition (Recruiting) Suites
      • Cloud HCM Suites for Regional and/or Sub-1,000 Employee Enterprises
      • View All
    • IT Infrastructure and IoT

      • Enterprise Wired and Wireless LAN Infrastructure (Transitioning to Enterprise Wired and Wireless LAN)
      • Endpoint Management Tools
      • IT Service Management Platforms
      • Container Management
      • Infrastructure Monitoring Tools
      • View All
    • IT Security

      • Endpoint Protection Platforms
      • Email Security
      • Managed Detection and Response
      • Security Information and Event Management
      • Security Awareness Computer-Based Training
      • View All
    • Legal

      • Contract Life Cycle Management
      • Electronic Signature
      • Governance, Risk and Compliance Tools, Assurance Leaders
      • Compliance Monitoring Solutions
      • Corporate Governance Services
      • View All
    • Manufacturing

      • Enterprise Asset Management Software
      • Manufacturing Execution Systems
      • Global Industrial IoT Platforms
      • PLM Software in Discrete Manufacturing Industries
      • Computer-Aided Design (CAD) Software
      • View All
    • Marketing

      • Video Editing Software
      • Email Marketing
      • Multichannel Marketing Hubs
      • Customer Data Platforms
      • Event Marketing and Management Platforms
      • View All
    • Productivity and Collaboration

      • Document Management
      • Collaborative Work Management
      • Visual Collaboration Applications
      • Knowledge Management (KM) Software
      • Meeting Solutions
      • View All
    • Public Sector and Government

      • Government Budgeting and Planning Solution
      • Cloud-Based ERP for U.S. Local Government
      • Citizen Service Delivery
      • Government ERP Solutions
      • Government Contracting Software
      • View All
    • Retail

      • Digital Commerce
      • Digital Commerce Payment Vendors (Transitioning to Digital Commerce Payment Platforms)
      • Retail Assortment Management Applications: Long Life Cycle Products
      • Retail Workforce Management Applications (Transitioning to Retail Workforce Management Technology)
      • Digital Shelf Analytics
      • View All
    • Sales

      • Revenue Enablement Platforms
      • Sales Force Automation Platforms (Transitioning to CRM Sales Platforms)
      • Revenue Intelligence (Transitioning to Revenue Action Orchestration)
      • Configure, Price and Quote Applications
      • Sales Performance Management
      • View All
    • Supply Chain Management

      • Supply Chain Planning Solutions
      • Transportation Management Systems
      • Real-Time Transportation Visibility Platforms
      • Warehouse Management Systems
      • Supply Chain Strategy, Planning and Operations Consulting
      • View All
    • Utilities

      • Geospatial Information Systems for Energy and Utilities
      • Mobile Workforce Management Software for Utilities (Transitioning to Mobile Workforce Management Solutions for Power and Utilities)
      • Energy Management and Optimization Systems
      • Energy Trading and Risk Management
      • Advanced Distribution Management Systems
      • View All
    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

      • Application Development
      • Artificial Intelligence
      • Cloud Computing
      • Customer Relationship Management
      • Data and Analytics
      • Education
      • Enterprise Networking and Communications
      • Finance
      • Healthcare and Life Sciences
      • Human Resources
      • IT Infrastructure and IoT
      • IT Security
      • Legal
      • Manufacturing
      • Marketing
      • Productivity and Collaboration
      • Public Sector and Government
      • Retail
      • Sales
      • Supply Chain Management
      • Utilities
      Browse All Categories

      Application Development

      68 markets
      • Observability Platforms
      • Integrated Development Environment (IDE) Software
      • Enterprise Agile Planning Tools
      • Integration Platform as a Service
      • AI-Augmented Software Testing Tools
      • API Management
      • Enterprise Low-Code Application Platforms
      • Robotic Process Automation
      • DevOps Platforms (Transitioning to DevSecOps Platforms)
      • Business Process Automation Tools
      • Enterprise Architecture Tools
      • Business Orchestration and Automation Technologies
      • Custom Software Development Services
      • Code Review Tools
      • Digital Adoption Platforms
      • Domain Registrars
      • Public Cloud IT Transformation Services (Transitioning to Public Cloud Optimization and Transformation Services)
      • Game Engine Software
      • Website Builders
      • Developer Productivity Insight Platforms
      • AI Agents for Application Developers
      • Application Platforms (Transitioning to Cloud-Native Application Protection Platforms)
      • Feature Management
      • Application Crowdtesting Services
      • Test Data Management
      • API Generation Software
      • Prototyping Software
      • Mobile App Analytics
      • Application Testing Services, Worldwide (Transitioning to Quality Engineering Services)
      • Application Integration Platforms
      • Code Modernization Tools
      • Event Brokers
      • Virtual Reality Development Software
      • Digital Twin of an Organization Platforms
      • Green Software Engineering
      • Independent Third-Party Software Support of Megavendors
      • Microsoft 365 Implementation and Support Services
      • BPM-Platform-Based Case Management Frameworks
      • Microsoft Product Support Services
      • Application Development Life Cycle Management (Transitioning to DevOps Platforms)
      • Product Roadmapping Tools for Software Engineering
      • Multiexperience Development Platforms
      • Application Portfolio Management Tools
      • Application Composition Platform
      • Internal Developer Portals
      • Cloud Development Environments
      • AI Agent Development Platforms for Software Engineering
      • Load Testing Tools
      • Blockchain Consulting and Proof-of-Concept Development Services
      • B2B Gateway Software
      • Citizen Application Development Platforms
      • Mobile Application Testing Services
      • Mobile Development Frameworks (Transitioning to Web and Mobile Development Frameworks)
      • SAP S/4HANA Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Oracle Cloud Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • SAP Application Services, Worldwide
      • SAP SuccessFactors Service Providers (Transitioning to Cloud ERP Services)
      • Service Mesh
      • Business-Outcome-Driven Enterprise Architecture Consulting (Retired)
      • Oracle Application Services, Worldwide (Transitioning to Cloud ERP Services)
      • Rapid Mobile App Development Tools
      • SAP Selective Test Data Management Tools
      • Value Stream Management Platforms
      • Augmented Reality Development Software
      • Blockchain as a Service
      • Mobile Application Management (Transitioning to Endpoint Management Tools)
      • Mobile Back-End Services
      • R&D Outsourcing Providers
      View More
  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Cyber Asset Attack Surface Management

Cyber Asset Attack Surface Management (CAASM) Reviews and Ratings

What is Cyber Asset Attack Surface Management?

Cyber asset attack surface management (CAASM) is focused on enabling security teams to overcome asset visibility and exposure challenges. It enables organizations to see all assets (internal and external), primarily through API integrations with existing tools, query consolidated data, identify the scope of vulnerabilities and gaps in security controls. These tools then continuously monitor and analyze detected vulnerabilities to drill down the most critical threats to the business and prioritize necessary remediation and mitigation actions for improved cyber security.

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Breeze Platform
Breeze Platform
Logo of ALVAO Asset Management
ALVAO Asset Management
Logo of runZero
runZero
For 50M-1B USD Companies
Logo of OctoXLabs CAASM Platform
OctoXLabs CAASM Platform
Logo of Breeze Platform
Breeze Platform
Logo of runZero
runZero
For Europe, Middle East and Africa
Logo of OctoXLabs CAASM Platform
OctoXLabs CAASM Platform
Logo of Breeze Platform
Breeze Platform
Logo of ThreatAware
ThreatAware
Integration & Deployment
Logo of OctoXLabs CAASM Platform
OctoXLabs CAASM Platform
Logo of ThreatAware
ThreatAware
Logo of Breeze Platform
Breeze Platform

Product Listings

Filter by

Products 1 - 20 of 55
Sort by
Logo of OctoXLabs CAASM Platform

OctoXLabs CAASM Platform

By OctoXLabs

4.9
(89 Ratings)

OctoXLabs CAASM Platform is a software designed to enhance cyber asset visibility, management, and security for organizations. The software aggregates data from various IT, cloud, and security tools to provide a centralized view of cyber assets, including hardware, software, users, and associated risks. It supports automated data correlation and identifies gaps in asset inventories, access controls, and vulnerability exposures. The software enables security teams to streamline asset-related workflows, monitor configuration compliance, manage incident response, and remediate risks effectively. Its architecture assists businesses in addressing challenges related to asset discovery, risk prioritization, and continuous security posture improvement within complex hybrid environments.

Show More Details
Logo of Qualys CyberSecurity Asset Management

Qualys CyberSecurity Asset Management

By Qualys

4.3
(83 Ratings)

Qualys CyberSecurity Asset Management software provides automated discovery, inventory, and classification of IT, cloud, and internet-connected assets within an organization. The software identifies devices across the environment, associates context such as asset ownership and location, and tracks changes to configurations and vulnerabilities. It integrates asset data with security monitoring and compliance workflows to help organizations prioritize remediation efforts and reduce risk exposure. The software delivers visibility into unmanaged or unauthorized assets, supports policy enforcement, and enhances the response to potential cyber threats by allowing organizations to continuously monitor the security posture of their asset landscape.

Show More Details
Logo of Lansweeper

Lansweeper

By Lansweeper

4.4
(75 Ratings)

Lansweeper helps organizations see, understand, and make confident decisions about their technology estate across IT, OT, IoT, and Cloud. Lansweeper automatically discovers and inventories every asset: hardware, software, and user, then connects that data to insights about usage, lifecycle, and risk. This is to create what the vendor describes as Technology Asset Intelligence (TAI): a trusted foundation of knowledge that turns raw inventory data into clear, actionable understanding.

Show More Details
Logo of Armis Centrix

Armis Centrix

By Armis

4.4
(73 Ratings)

Armis Centrix for Asset Management and Security is a solution that helps organizations manage and secure their connected assets across IT, OT, IoT, medical device environments whether they are physical, virtual or a combination. It provides capabilities for asset discovery, classification, and tracking to improve visibility and support informed decision-making. The solution includes analytics and security features for real-time monitoring, threat detection, and response, helping organizations reduce cyber risks and maintain operational efficiency. It integrates with existing IT and security systems to support comprehensive asset governance and risk management.

Show More Details
Logo of Axonius Asset Cloud

Axonius Asset Cloud

By Axonius

4.4
(47 Ratings)

Axonius Platform is a software designed to provide comprehensive asset management and cybersecurity functionality for organizations. The software aggregates data from various sources across devices, cloud services, and network infrastructure to deliver a centralized view of assets. It automates the detection of security gaps by correlating asset inventory with policy enforcement and compliance requirements. Axonius Platform assists organizations in managing software and hardware assets, uncovering unmanaged devices, and facilitating response to vulnerabilities. Its features include integration with multiple data sources, customizable policies, and reporting capabilities to support IT and security teams in streamlining asset visibility and operational workflows.

Show More Details
Logo of JupiterOne

JupiterOne

By JupiterOne

4.4
(44 Ratings)

JupiterOne is a cyber asset management software designed to assist organizations in gaining visibility and control over their digital environment. This software enables users to centralize and analyze data regarding their assets, including cloud infrastructure, devices, identities, applications, and network resources. JupiterOne provides automated relationship mapping among assets, facilitating security operations, compliance initiatives, and risk assessments. It supports asset inventory, policy monitoring, and incident response capabilities. The software aims to address challenges in security data aggregation, enabling teams to quickly identify gaps, monitor changes, and enforce security policies across complex technology landscapes.

Show More Details
Logo of Splunk Asset and Risk Intelligence

Splunk Asset and Risk Intelligence

By Cisco Systems (Splunk)

4.4
(42 Ratings)

Splunk Asset and Risk Intelligence software focuses on asset visibility and risk management within enterprise environments. It aggregates and normalizes data related to physical and digital assets, delivering insights into inventory, asset health, and associated risk exposure. The software provides features for continuous monitoring of critical assets, assessment of asset vulnerabilities, and automated compliance reporting. Using advanced analytics, it identifies risk factors linked to asset configuration and behavior, assisting organizations in maintaining regulatory compliance and reducing operational and security risks. The software integrates with various data sources to offer centralized dashboards that support informed decision-making for risk mitigation and asset management.

Show More Details
Logo of runZero

runZero

By runZero

4.6
(38 Ratings)

runZero is a software designed for asset discovery and inventory management within enterprise networks. It provides comprehensive visibility into connected devices by scanning and identifying hardware, software, and network attributes without requiring credentials or agents. runZero helps organizations locate unmanaged, unknown, or rogue assets and maps connections across networks for security and operational oversight. The software integrates with various security and IT management tools, enabling correlation and normalization of asset data. This facilitates the detection of vulnerabilities, misconfigurations, and compliance gaps. By automating asset inventory and network mapping, the software addresses challenges of shadow IT and asset sprawl in complex environments.

Show More Details
Logo of ThreatAware

ThreatAware

By ThreatAware

4.7
(24 Ratings)

ThreatAware is a software designed to help organizations monitor and manage their cybersecurity posture by providing central visibility of critical assets, people, and processes. The software integrates with existing security solutions to surface gaps, such as missing patches or policy failures, ensuring that compliance and security measures remain effective. ThreatAware automates the discovery and reporting of vulnerabilities and compliance issues, allowing businesses to identify risks and coordinate responses efficiently. The software supports the consolidation of data from multiple tools to create a single view, aiding security teams in reducing manual effort and improving incident detection and resolution. It is used to enhance oversight and control in cybersecurity management, helping organizations maintain robust protection for their digital infrastructure.

Show More Details
Logo of Surface Command

Surface Command

By Rapid7

4.4
(22 Ratings)

Surface Command is a software developed by Rapid7 designed to support organizations in managing and minimizing exposure to cybersecurity threats. The software provides visibility into external digital assets and monitors changes in attack surfaces, helping teams identify potential vulnerabilities and areas for improvement. It enables continuous inventory and assessment of internet-facing assets, prioritizes risks based on context, and streamlines workflows for remediation. The software addresses the business challenge of maintaining a secure external footprint, reducing the risk of intrusion and supporting compliance efforts by offering timely insights and actionable data for security teams.

Show More Details
Logo of Breeze Platform

Breeze Platform

By Breeze Security

4.8
(19 Ratings)
Show More Details
Logo of ALVAO Asset Management

ALVAO Asset Management

By ALVAO

4.9
(14 Ratings)

ALVAO IT Asset Management (ITAM) gives organizations full lifecycle visibility and control of IT hardware and software, cutting down manual work with an intuitive tree-structured interface. With real‑time discovery via network monitoring systems, Agent, SNMP, Intune, and SCCM integration, it simplifies audits, optimizes licenses (including Microsoft 365), and supports compliance with Cyber Essentials, NIST, NIS2, and DORA. A visual CMDB maps dependencies for faster incident resolution and change planning, helping IT teams stay efficient, compliant, and cost-effective.

Show More Details
Logo of Balbix

Balbix

By Safe Security

4.1
(11 Ratings)

The Balbix product has been absorbed into the SAFE One Platform, an AI-native SaaS platform developed by SAFE Security to measure, manage, and mitigate cyber risk across an organization's digital landscape. The platform unifies Cyber Risk Quantification (CRQ), Continuous Threat Exposure Management (CTEM), and Third-Party Risk Management (TPRM) into a single data model, enabling organizations to prioritize remediation efforts and align security investments with business impact. Using autonomous agentic workflows and over 150 API integrations, SAFE One ingests real-time telemetry from existing security tools and external feeds to provide a continuous view of risk in financial terms. Aligned with industry-accepted open standards, FAIR, MITRE ATT&CK, and STIX, SAFE One helps businesses prioritize remediation efforts through actionable intelligence based on quantified business impact rather than technical severity alone.

Show More Details
Logo of AllSecureX

AllSecureX

By AllSecureX

4.4
(9 Ratings)

AllSecureX is a software designed to provide comprehensive cybersecurity management for organizations. The software offers features such as asset inventory, vulnerability management, compliance tracking, and threat intelligence integration. AllSecureX enables users to monitor their networks, identify potential security risks, and manage remediation actions through a centralized platform. The software supports various integrations to streamline workflow and enhances incident detection and response capabilities. By consolidating security operations, it aims to simplify risk identification and mitigation while ensuring regulatory compliance for businesses seeking to strengthen their information security posture.

Show More Details
Logo of Argos99

Argos99

By Fenix24

4.6
(9 Ratings)

appNovi is a software designed to provide organizations with visibility into hybrid and multi-cloud environments by mapping network topology and dependencies. The software enables users to analyze and visualize network traffic flows, discover assets, and track application dependencies. appNovi supports incident response, vulnerability management, and segmentation projects by delivering insights into relationships between applications, workloads, and network infrastructure. It is equipped with features that facilitate network modeling, risk identification, and policy planning, aiming to help organizations optimize network security posture and streamline IT operations.

Show More Details
Logo of Essential 8 Auditor

Essential 8 Auditor

By Huntsman Security

4.4
(7 Ratings)

Essential 8 Auditor delivers on-demand Threat Exposure Management, and ACSC compliance and maturity level reporting on cyber security control effectiveness, enabling organisations to quickly identify and prioritise security, compliance and resilience mitigations.

It connects to security management and control configurations (e.g. Active Directory/Azure, patch managers, vulnerability scanners) to derive the status of policies, controls and configurations. It uses no agents or additional scanning, making it easy to install and operate in organisations of all sizes.

Clear status and maturity reports are generated for each security control providing visibility of cyber risks and operational resilience. It identifies systems, user accounts or settings that need reconfiguration, informing technical security teams on issues and executive teams on protection levels.

Show More Details
Logo of HivePro Uni5 Xposure

HivePro Uni5 Xposure

By Hive Pro

4.8
(6 Ratings)

Uni5 Xposure is an end-to-end Threat Exposure Management platform. Embedded are both Adversarial Exposue Validation (AEV) and Exposure Assessment (EA). EA specifically identifies where your organization is exposed to real-world threats, tests security controls against potential exploitation, and guides teams in eliminating high-priority risks before they’re breached. It unifies CAASM and EASM to deliver complete, real-time asset visibility across internal and external surfaces, uses embedded agentless scanners for frictionless coverage, and integrates threat, vulnerability, and patch intelligence from HiveForce Labs to drive accurate, risk-based prioritization. Built-in breach and attack simulation validates control effectiveness under real-world conditions, while dynamic exposure scoring adapts continuously based on exploitability, asset criticality, and business impact. The result: fewer blind spots, faster mitigation, and smarter, risk-aligned decisions, all from a single platform.

Show More Details
Logo of Panaseer Platform

Panaseer Platform

By Panaseer

4.2
(6 Ratings)

Panaseer Platform is a software designed for cybersecurity and risk management, enabling organizations to automatically aggregate and analyze data from various security tools and IT assets. The software provides visibility into security controls coverage, identifies gaps, and supports compliance reporting by integrating disparate data sources into a unified dashboard. It helps organizations measure security posture, prioritize remediation activities, and generate reports for stakeholders. The software addresses the challenge of manual and fragmented security measurement processes, facilitating data-driven decision making and continuous monitoring of security controls within complex enterprise environments.

Show More Details
Logo of Sevco Platform

Sevco Platform

By Sevco Security

5
(6 Ratings)

The Sevco Exposure Assessment Platform (EAP) helps enterprises manage Continuous Threat Exposure Management (CTEM) programs by scoping the attack surface, prioritizing exposures, and enabling remediation. The Sevco EAP unifies data from siloed security tools, monitors critical risk, and proactively strengthens security posture. Gain visibility across the entire attack surface: internal, external, cloud, end users. Prioritize exposures: misconfigurations, vulnerabilities, controls gaps. Streamline cross-functional remediation: automated actions, workflows, resolution tracking. CISOs trust Sevco to reduce detection and response times for more effective exposure management.

Show More Details
Logo of CYRISMA

CYRISMA

By Cyrisma

4.4
(5 Ratings)

Cyrisma is a unified platform to continuously identify and mitigate cyber risk. The software combines vulnerability management, data and asset discovery, compliance tracking, secure configuration, and dark web monitoring into one continuous experience - enabling organizations to identify, prioritize, and remediate cyber risk efficiently.

Show More Details

Gartner Research

Gartner Peer Insights 'Voice of the Customer': Cyber Asset Attack Surface Management

Top Trending Products

Breeze Platform

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.