Cyber Asset Attack Surface Management (CAASM) Reviews and Ratings

What is Cyber Asset Attack Surface Management?

Cyber asset attack surface management (CAASM) is focused on enabling security teams to overcome asset visibility and exposure challenges. It enables organizations to see all assets (internal and external), primarily through API integrations with existing tools, query consolidated data, identify the scope of vulnerabilities and gaps in security controls. These tools then continuously monitor and analyze detected vulnerabilities to drill down the most critical threats to the business and prioritize necessary remediation and mitigation actions for improved cyber security.

Products In Cyber Asset Attack Surface Management (CAASM) Category

"Robust yet Simple Asset Management Tool with Accurate Network Scanning"

It is a great asset management tool, very robust yet simple to use.

Read reviews

"Great asset to find all your assets."

Product is useful in finding all company assets. I recommend this product.

Read reviews

"Shows every asset's last status without any agent"

They stay behind their product and they also help and support us every time we need. We are so relieved as admins and users because it helped a lot to our maintenance processes.

Read reviews

"Armis: Effective Partner with User-Friendly Integrations"

Armis has been a good partner. The tool works well. Integrations with COTS software is easy.

Read reviews

"Taking the Time to Master the Tool is Well Worth it."

Good company to work with. From a technical standpoint they prioritize customer engagement and support, their knowledge base is top notch, and they provide great services for deployment.

Read reviews

"JupiterOne: A Robust Addition to Security Toolkit"

JupiterOne has been a valuable addition to our security toolkit. Its search capabilities are robust and the integration with our other security tools has been seamless.

Read reviews

"ThreatAware Streamlines Security and Device Management"

Having used this product for well over a year now I can safely say it's been a positive experience. ThreatAware has enabled us to move away from agent-based reporting that often left us with out of date or incomplete inventories by syncing up with our APIs. This ensures we always have visibility over our environment from a security perspective but also means we can efficiently manage/decommission devices saving us both time and money.

Read reviews

"Good tool to defence your infrastructure."

Its an good security management tool and has capability to auto discover asset inventory and track updates on assets.

Read reviews

"A great product for IT asset tracking and visibility "

It has really helped us to get a comprehensive visibility into all of our organization assets. Additionally, we also get real-time as well as recorded history of the assets over time. With this product, we are assured of a continued cloud-powered asset security and a better understanding on how the assets change in the dynamic environment.

Read reviews

"Excellent cybersecurity analytics and metrics solution to improve overall cybersecurity"

This is a great platform to integrates with various security technologies such as vulnerability scanners, SIEM system, endpoint protection tools to monitoring security risk and help organization establish and track key security metric.

Read reviews

"It helps our organization to be more secure. "

It was easy to navigate and very transparent. Also offering an innovative way to fix the cyber problem.

Read reviews

"One of the Best GRC tools in space with excellent Support."

Scrut CAASM helps you gain visibility of all your cyber assets, empowering IT and security teams to overcome cybersecurity vulnerability challenges and build a strong foundation for all security activities.

Read reviews

"Smooth Integration and Helpful Support: A Look into the Product"

Nice and smooth integration, helpful support team in regards to customizations and integrations.

Read reviews
Competitors and Alternatives

Competitor or alternative data is currently unavailable

See All Alternatives

"easy and simple, protect you network, details in reports "

intuitive software , easy to use and very helpful support, report rich in details

Read reviews

"Otorio: Advanced OT Security Solution"

The Service and Team provides a very good product and services on top.

Read reviews
Competitors and Alternatives
OTORIO vs ArmisSee All Alternatives

"Cyber society made better"

Great and seamlessly integrated into current architecture

Read reviews
Products 1 - 17