Best Security Risk Assessment Software for Mid Size Business

Find and compare the best Security Risk Assessment software for Mid Size Business in 2024

Use the comparison tool below to compare the top Security Risk Assessment software for Mid Size Business on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Netwrix Auditor Reviews
    See Software
    Learn More
    Netwrix Auditor, a visibility platform, allows you to control changes, configurations, and access in hybrid IT environments. It also eliminates the stress associated with your next compliance audit. All changes in your cloud and on-prem systems can be monitored, including AD, Windows Servers, file storage, Exchange, VMware, and other databases. Reduce the complexity of your inventory and reporting. You can easily verify that your access and identity configurations match the known good state by reviewing them regularly.
  • 2
    Kroll Cyber Risk Reviews
    See Software
    Learn More
    Kroll's cyber risk assessments include a comprehensive review of your cybersecurity program, delivering actionable recommendations to improve security, using industry best practices & the best technology available.
  • 3
    Guardz Reviews

    Guardz

    Guardz

    $9 per month
    55 Ratings
    See Software
    Learn More
    Guardz is an AI-powered cybersecurity solution that provides MSPs with a platform to protect and insure small and growing businesses from cyberattacks. The platform provides automatic detection and response to protect users, devices, cloud directories, and data. We simplify cybersecurity management to allow businesses to focus on their growth without being bogged down by security complexity. The Guardz pricing model is scalable and cost effective and ensures comprehensive digital asset protection. It also facilitates rapid deployment and business growth.
  • 4
    TrustMAPP Reviews
    TrustMAPP® is the pioneer in Cybersecurity Performance Management.. Recognized by Gartner as a leader in Cybersecurity Performance Management and Cybersecurity Maturity Assessments, TrustMAPP is used by organizations across the globe, TrustMAPP provides information security leaders an ability to quickly measure, quantify, and communicate meaningful control performance, track improvement processes, forecast investment efforts, and quickly build narratives to executive stakeholders. TrustMAPP provides remediation guidance on individual controls based on maturity scores and provides resource effort investment and financial investments to forecast future requirements for cybersecurity funding. TrustMAPP provides decision science and forecasting necessary to elevate the cybersecurity discussion in the boardroom. Information security leaders benefit from alignment with key business objectives and dynamic analytics and report-building capabilities. Information security leaders benefit from a new language that resonates with those who know little (and care even less) about the technical aspects of cybersecurity program management.
  • 5
    Microsoft Defender for Cloud Reviews

    Microsoft Defender for Cloud

    Microsoft

    $0.02 per server per hour
    2 Ratings
    Microsoft Defender for Cloud is a cloud security posture management (CSPM), and cloud workload protection solution (CWP). It can identify weak points in your cloud environment, strengthen your overall security posture, and protect workloads across multicloud or hybrid environments from evolving threats. Continuous assessment of the security of cloud resources running on AWS, Azure, and Google Cloud. Use the built-in policies and prioritized suggestions to align with key industry and regulatory standards. Or, create custom requirements that suit your organization's specific needs. You can automate your recommendations using actionable insights. This will help you ensure that resources are securely configured and meet your compliance requirements. Microsoft Defender for Cloud allows you to protect yourself against evolving threats in multicloud and hybrid environments.
  • 6
    DomainTools Reviews
    Connect indicators from your network to nearly every active domain or IP address on the Internet. This data can be used to inform risk assessments, profile attackers, guide online fraudulent investigations, and map cyber activity to the attacker infrastructure. Get the information you need to make an informed decision about the threat level to your organization. DomainTools Iris, a proprietary threat intelligence platform and investigation platform, combines enterprise-grade domain-based and DNS-based intelligence with a simple web interface.
  • 7
    Cetbix GRC & ISMS Reviews
    You can achieve ISO 27001, NIST, GDPR, NFC, PCI-DSS, HIPAA, FERPA and more in three steps. Cetbix® ISMS empowers your certification. An integrated, comprehensive, document-driven and paperless information security management system. Other features include IT/OT/Employees asset management, document management, risk assessment and management, scada inventory, financial risk, software distribution automation, Cyber Threat Intelligence Maturity Assessment and others. More than 190 organizations worldwide rely on Cetbix® ISMS to efficiently manage information security and ensure ongoing compliance with the Data Protection Regulation and other regulations.
  • 8
    Nucleus Reviews

    Nucleus

    Nucleus

    $10 per user per year
    1 Rating
    Nucleus is changing the definition of vulnerability management software. It is now the single source of all assets, vulnerabilities and associated data. By unifying people, processes, technology, and vulnerability management, Nucleus unlocks the value that you are not getting from existing tools. Nucleus gives you unrivalled visibility into your program, and a suite that offers functionality that cannot be duplicated in any other manner. Nucleus is the only tool that unifies security and development operations. It unlocks the value that you are not getting from your existing tools and sets you on the path of unifying people, processes, technology, and people involved in addressing vulnerabilities or code weaknesses. Nucleus offers unrivaled pipeline integration, tracking and triage capabilities, as well as a suite of functional tools.
  • 9
    Swascan Reviews
    It scans web sites and web apps to identify and analyze security vulnerabilities. Network Scanner identifies and assists in fixing network vulnerabilities. It analyzes the source code to identify and fix security flaws and weak points. This online tool allows you to evaluate your company's compliance with GDPR. Your employees will benefit from this unique learning opportunity and you can avoid the increasing number of phishing attacks. Consulting activity to assist companies with management, control, and risk evaluation.
  • 10
    Qualys VMDR Reviews
    The industry's most flexible, extensible and scalable solution for vulnerability management. Qualys' VMDR is fully cloud-based and provides global visibility into your IT assets and how to protect them. Enterprises are empowered with visibility into cyber risk exposure and can use it to prioritize assets, vulnerabilities, or groups of assets according to business risk. Security teams can take steps to reduce risk. This helps businesses measure their true risk and track the progress of risk reduction. You can identify, assess, prioritize, patch and fix critical vulnerabilities in real-time across your global hybrid IT, OT and IoT landscape. Qualys TruRisk™, which measures risk across assets, vulnerabilities, and groups, can help you organization prevent risk exposure and track the risk reduction over time.
  • 11
    Digital Defense Reviews
    It doesn't mean following the latest trends blindly to provide best-in-class cybersecurity. It means a commitment to core technology, and meaningful innovation. You will see how our threat management and vulnerability solutions provide organizations like yours the security foundation they need to protect their most important assets. Even though some companies believe it is difficult to eliminate network vulnerabilities, it doesn't need to be. It is possible to create a powerful and effective cybersecurity program that is both affordable and easy-to-use. A solid security foundation is all you need. Digital Defense understands that cyber threats are a reality for every business. We have a reputation for developing innovative technology in threat and vulnerability management software. This has been achieved over 20 years.
  • 12
    Centraleyes Reviews
    Centraleyes provides organizations with unparalleled capabilities to achieve and sustain cyber resilience, compliance and compliance through a single pane. Our solutions can quantify, mitigate, and visualize cyber risks. This saves time and resources, so you can concentrate on what is really important: Business success. Cyber attacks are increasing in complexity and number every year, affecting all industries. Cyber risk management and compliance management are critical to protecting organizations from financial, repeated and legal damage. Cyber defense is only possible when you can analyze, quantify, and mitigate internal risk while also complying with applicable standards and regulations. Inefficient solutions such as spreadsheets and outdated GRC systems make it difficult for cyber teams to effectively defend their organizations.
  • 13
    Nessus Reviews
    Top Pick
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 14
    SanerNow Reviews

    SanerNow

    SecPod Technologies

    $50/year/device
    4 Ratings
    SecPod SanerNow, the best unified endpoint security and management platform in the world, powers IT/Security Teams to automate cyber hygiene practices. It uses an intelligent agent-server architecture to ensure endpoint security and management. It provides accurate vulnerability management including scanning, detection, assessment and prioritization. SanerNow can be used on-premise or cloud. It integrates with patch management to automate patching across all major OSs, including Windows, MAC, Linux and a large number of 3rd-party software patches. What makes it different? It now offers other important features such as security compliance management and IT asset management. You can also access software deployment, device control, endpoint threat detection, and response. These tasks can be remotely performed and automated with SanerNow to protect your systems from the new wave of cyberattacks.
  • 15
    Reflectiz Reviews

    Reflectiz

    Reflectiz

    $5000/year
    Reflectiz solution monitors and detects all 1st, 3rd, and 4th-party app vulnerabilities in your online ecosystem, enabling complete visibility over your threat surface. It then effectively prioritizes and remediates risks and compliance issues. The Reflectiz solution is executed remotely with no installation required
  • 16
    HIPAA One Reviews

    HIPAA One

    Intraprise Health

    $99.99 per month
    This new suite of integrated products allows healthcare organizations of all sizes to address security risk management and HIPAA compliance throughout their entire health system or network. Combining HIPAA One's automated Security Risk Assessment platform with Intraprise Health’s existing cybersecurity capabilities gives our customers a complete security solution. This increases our commitment to protecting our customers' data. Visit our new Intraprise Health home to learn more about our suite of software and services. To stay current, automate compliance, and protect your client's data, make us part of your team. We are completely healthcare-focused and offer cybersecurity advisory services and cloud-based solutions to meet your information security needs now and in the future.
  • 17
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 18
    CyberStrong Reviews

    CyberStrong

    CyberSaint Security

    CyberSaint's CyberStrong platform is used by Fortune 500 CISOs to manage IT and cyber risk and ensure compliance from assessment to Boardroom. CyberStrong uses intuitive workflows and executive reports to increase cyber resilience and communication. Patented AI/ML automation reduces manual effort, which saves enterprises millions of dollars annually. The platform combines cyber and business risk to enable faster and more informed decision-making. CyberStrong is a competitive advantage for enterprises. It automates assessments across multiple frameworks and mitigates even the most extreme risks. CyberSaint is a Gartner Cool vendor for Cyber & IT Risk Management. He is listed in Gartner’s Security Operations, Cyber & IT Risk Management and Legal & Compliance Hype cycles. He has won numerous awards, including the 2021 Cybersecurity Excellence Gold winner, 2021 Cyberdefense Magazine Global InfoSec Awards Winner and 2021 Cyber Defense Magazine Emerging Vendor.
  • 19
    Vanta Reviews
    Vanta is the leading trust management platform that helps simplify and centralize security for organizations of all sizes. Thousands of companies rely on Vanta to build, maintain and demonstrate trust in a way that's real-time and transparent. Founded in 2018, Vanta has customers in 58 countries with offices in Dublin, New York, San Francisco and Sydney.
  • 20
    ASPIA Reviews
    ASPIA's security orchestration automation includes data collecting, alerting, reporting, and ticketing in order to provide intelligent security and vulnerability management. ASPIA can assist you in improving business security by giving a comprehensive view of security status. ASPIA simplifies human data processing by merging asset and vulnerability data from scanning technologies. ASPIA consolidates assets, correlates vulnerabilities, and deduplicates data, cutting risk management costs and providing valuable insights into your organization's security posture. Using ASPIA's management dashboard, users can review, prioritize, and manage corporate security measures. The platform provides near-real-time information on an organization's security state.
  • 21
    UpGuard Reviews

    UpGuard

    UpGuard

    $5,249 per year
    The new standard for third-party risk management and attack surface management. UpGuard is the best platform to protect your organization's sensitive information. Our security rating engine monitors millions upon millions of companies and billions upon billions of data points each day. Monitor your vendors and automate security questionnaires to reduce third- and fourth-party risk. Monitor your attack surface, detect leaked credentials, and protect customer information. UpGuard analysts can help you scale your third-party risk management program and monitor your organization and vendors for potential data leaks. UpGuard creates the most flexible and powerful tools for cybersecurity. UpGuard's platform is unmatched in its ability to protect your most sensitive data. Many of the most data-conscious companies in the world are growing faster and more securely.
  • 22
    Ostendio Reviews
    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio is the only security platform perfected for more than a decade by security industry leaders and visionaries. We know the daily challenges businesses face, from increasing external threats to complex organizational issues. Ostendio is designed to give you the power of smart security and compliance that grows with you and around you, allowing you to demonstrate trust with customers and excellence with auditors. Ostendio is a HITRUST Readiness Licensee.
  • 23
    Lynis Enterprise Reviews
    Lynis Enterprise provides security scanning for Linux, macOS and Unix systems. It allows you to quickly identify and resolve issues so that you can refocus on your business and projects. It is quite unusual for a company only to focus on a few operating system. We are a specialist in Linux and Unix security, in a field that offers so many software and services. Lynis' primary goal is to perform a system health check. It can also detect vulnerabilities and weaknesses in configuration management. Lynis Enterprise allows you to perform security auditing and compliance testing. It also helps to apply system hardening. It includes Lynis Enterprise in its core and focuses on Unix-based environments such as Linux, macOS or other Unix-based systems.
  • 24
    Centraleyezer Reviews

    Centraleyezer

    Sandline

    $599 per month
    Integrates and correlates vulnerability scanner data and multiple exploit feeds with business and IT factors to prioritize cyber security risk. Red Teams, CISOs, and Vulnerability Assessment Teams can reduce time-to fix, prioritize, and report risks. This tool is used by Governments, Military and E-Commerce businesses.
  • 25
    Runecast  Reviews

    Runecast

    Runecast Solutions

    Runecast is an enterprise IT platform that saves your Security and Operations teams time and resources by enabling a proactive approach to ITOM, CSPM, and compliance. Your team can do more with less via a single platform that checks all your cloud infrastructure, for increased visibility, security, and time-saving. Security teams benefit from simplified vulnerability management and regulatory compliance, across multiple standards and technologies. Operations teams are able to reduce operational overheads and increase clarity, enabling you to be proactive and return to the valuable work you want to be doing.
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next