• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • No categories available

      Browse All Categories

      Select a category to view markets

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
strikeone
4.9
3 Reviews (All time)
Review weighting


Browse StrikeOne Reviews

StrikeOne is present in 2 markets with 2 products. StrikeOne has 3 reviews with an overall average rating of 4.9.

Application Security Testing

Gartner defines the application security testing (AST) market as consisting of providers of products that enable organizations to assess applications for the presence and management of risk. These products identify risk by evaluating source code, performing runtime tests and inspecting supply chain components. AST products can be integrated throughout development workflows for continuous assessment or be used to perform ad hoc evaluations. They enable organizations to manage application risks by providing an integrated set of capabilities for risk identification, prioritization and triage, policy evaluation and enforcement, and remediation assistance. Market offerings are available in on-premises, SaaS and hybrid delivery models. Organizations leverage AST products to assess applications for the presence of security vulnerabilities and other risks (e.g., legal and operational) throughout their life cycle. These assessments are used to measure and manage the risks within individual applications, application components or groups of applications in the context of their business criticality and other key attributes (e.g., environment, sensitive data handling, etc.). AST products further enable organizations to evaluate software for compliance with internal policies as well as regulatory requirements established by governments or authoritative industry groups.

StrikeOne has 1 product in Application Security Testing market
  • StrikeOne
    4.0
    1 Review

External Attack Surface Management

External Attack Surface Management (EASM) market refers to solutions that continuously discover, inventory, and monitor an organization’s internet‑facing digital assets from an attacker’s perspective. These platforms identify unknown or unmanaged assets, exposed services, misconfigurations, and vulnerabilities across cloud, SaaS, on‑premises, and third‑party environments. EASM solutions contextualize external exposures with risk scoring, threat intelligence, and business relevance to help organizations prioritize remediation efforts. The market exists to help cybersecurity teams proactively reduce exposure by maintaining visibility of their internet-facing assets. Who are the target users of External Attack Surface Management (EASM) Software? Typical users include cybersecurity teams, vulnerability management professionals, risk managers, and IT security leaders in organizations of all sizes. EASM solutions are especially valuable for enterprises with complex, distributed environments, frequent cloud adoption, or multiple subsidiaries and third-party relationships. Executives responsible for organizational risk and compliance also benefit from the enhanced visibility and reporting capabilities these platforms provide. What are the core capabilities of External Attack Surface Management (EASM) Software? Asset Discovery and Inventory: Identification of internet‑facing infrastructure (e.g., domains, subdomains, IPs, cloud assets, SaaS, APIs, certificates, shadow IT) Asset Attribution & Ownership Mapping Technology Fingerprinting (e.g., frameworks, CMS, web servers, open‑source components) Third‑Party and Subsidiary Mapping Continuous Monitoring & Change Detection: Change Detection (new services, DNS changes, IP reassignments, open ports) Asset Lifecycle Tracking (new, modified, decommissioned assets) Certificate Monitoring (expiration, weak cryptography, unauthorized issuance) Exposure & Vulnerability Identification: Open Port and Service Enumeration Configuration and Security Misconfiguration Detection Known Vulnerability Mapping (CVE/CWE) Insecure Protocol and Cipher Detection Unprotected Cloud Storage & APIs Expired or Weak Certificates Exposed Secrets (tokens, API keys) Risk Prioritization & Contextual Analysis Risk Scoring (asset‑level and organization‑level) Business Context Mapping (e.g., production vs dev, internet‑facing criticality) Exploitability Context Attack Path Visualization Integration with Threat Intelligence Feeds Attacker‑View Asset Mapping Known Attacker Techniques mapping (MITRE ATT&CK alignment) Remediation & Workflow Enablement Remediation Guidance (e.g., automated attack surface reduction suggestions) Integration with Ticketing Systems (e.g., ServiceNow, Jira) Security Tool Integrations (e.g., SIEM, SOAR, vulnerability scanners) Ownership Assignment & SLA Tracking Evidence and Verification of Fixes Reporting & Visualization Executive Dashboards Technical Analyst Views Asset and Risk Heatmaps Exposure Trends Over Time Custom Report Builder What are the benefits of External Attack Surface Management (EASM) Software? EASM software helps organizations proactively reduce their cyber risk by maintaining comprehensive visibility of all internet-facing assets and exposures. Security teams benefit from automated discovery, prioritized remediation, and streamlined workflows, enabling faster and more effective risk reduction. Executives and risk leaders gain confidence through real-time dashboards, trend analysis, and clear evidence of remediation, supporting stronger governance, compliance, and organizational resilience against external threats.

StrikeOne has 1 product in External Attack Surface Management market
  • StrikeOne
    5.0
    2 Reviews
Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.
This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply.
  • Community Guidelines
  • Listing Guidelines
  • Browse Vendors
  • Rules of Engagement
  • FAQ
  • Privacy
  • Terms of Service
©
 
©