IBM Security Randori Recon is a cloud-based security software that helps you understand your company's weaknesses from a hacker's perspective. It continuously scans your systems and networks to find any vulnerability that could be used to attack your business. It then prioritizes these risks, showing you which ones need immediate attention. This helps your security team focus on the most critical issues and improve your overall security posture. While Randori Recon identifies weaknesses, a separate add-on, Randori Attack Targeted, can be employed to safely simulate attacks on your systems to test their resilience.
Who is IBM Security Randori Recon best for
IBM Security Randori Recon helps large enterprises with complex IT infrastructures understand their security vulnerabilities from an attacker's perspective. It continuously scans systems and networks, prioritizing risks based on potential impact. Users praise its comprehensive attack surface discovery and risk-based prioritization, but some find integration with non-IBM products challenging and the cost high.
Best for large enterprises with complex IT infrastructures.
Suitable for various industries needing robust security.
IBM Security Randori Recon features
Type in the name of the feature or in your own words tell us what you need
Supported
Randori Recon scans infrastructure for vulnerabilities and misconfigurations, prioritizing the most critical ones.
Supported
Randori Recon performs perimeter scanning, which includes analyzing operating systems for vulnerabilities.
Supported
Randori Recon scans cloud infrastructure for vulnerabilities as part of attack surface management.
Supported
Randori Recon scans networks for vulnerabilities, focusing on external attack surface discovery.
Supported
Randori Recon prioritizes risks based on adversarial temptation and business context.
Supported
Randori Recon continuously monitors and prioritizes vulnerabilities across digital assets.
IBM Security Randori Recon reviews
We've summarised 26 IBM Security Randori Recon reviews (IBM Security Randori Recon G2 reviews) and
summarised the main points below.
Pros of IBM Security Randori Recon
Comprehensive attack surface discovery, including hidden assets.
Risk-based prioritization of vulnerabilities.
Real-time attack simulations.
Integration with IBM QRadar and SIEM.
User-friendly interface.
Cons of IBM Security Randori Recon
Difficult integration with non-IBM products.
Manual IP range entry.
Occasional glitches and insufficient error details in the portal.
Initial setup could be simpler.
High cost, especially for smaller organizations.
IBM Security Randori Recon alternatives
FortifyData Continuous Threat Exposure Management
Better for mid-sized companies seeking a centralized cybersecurity risk overview. Has fewer features and is growing slower. Lacks attack surface monitoring and vulnerability prioritization. No user reviews or ratings available.
Better for organizations of all sizes, including those with smaller IT infrastructures. Broader cloud platform support (Azure, AWS, GCP, and on-premises) compared to IBM Security Randori Recon's focus on external attack surface discovery. Has more momentum in terms of company growth.
Better for vulnerability and security policy management. Focuses on attack surface visibility and cyber risk reduction via exposure management and automated remediation. Has more momentum based on employee growth. Broader user base with more reviews.
Better for data backup and recovery, particularly for SaaS applications. Focuses on ransomware protection and compliance. Simpler to use and scale due to its cloud-native architecture. More suitable for organizations of all sizes across various industries. Excellent customer support.
Focuses on attack simulation. Better customer service, ease of use, and reliability. More established, with significantly more reviews and a larger user base.
What is IBM Security Randori Recon and what does IBM Security Randori Recon do?
What is IBM Security Randori Recon and what does IBM Security Randori Recon do?
IBM Security Randori Recon is a cloud-based attack surface management software that identifies and prioritizes security vulnerabilities from a hacker's perspective. It continuously scans systems and networks, highlighting critical weaknesses to improve your security posture. While it focuses on reconnaissance, the separate Randori Attack Targeted add-on can simulate attacks for resilience testing.
How does IBM Security Randori Recon integrate with other tools?
How does IBM Security Randori Recon integrate with other tools?
IBM Security Randori Recon integrates with IBM QRadar and SIEM tools. However, users have reported difficulties integrating with non-IBM products, suggesting limited third-party integrations. For optimal integration, consider existing IBM security infrastructure.
What the main competitors of IBM Security Randori Recon?
What the main competitors of IBM Security Randori Recon?
IBM Security Randori Recon's main competitors include other attack surface management (ASM) and penetration testing tools like Bit Discovery, CyCognito, and Censys. These alternatives offer similar capabilities for vulnerability discovery and risk prioritization.
Is IBM Security Randori Recon legit?
Is IBM Security Randori Recon legit?
IBM Security Randori Recon is a legitimate security software solution. It helps businesses identify and prioritize vulnerabilities from an attacker's perspective. However, some users find it costly and difficult to integrate with non-IBM products.
How much does IBM Security Randori Recon cost?
How much does IBM Security Randori Recon cost?
I cannot find pricing information for IBM Security Randori Recon. Contact IBM directly to determine product pricing and if it's worth the investment for your organization.
Is IBM Security Randori Recon customer service good?
Is IBM Security Randori Recon customer service good?
Customer reviews indicate positive experiences with IBM Security Randori Recon's customer support. Users appreciate the helpfulness and responsiveness of the support team in addressing their questions and resolving any integration challenges.
Reviewed by
MK
Michal Kaczor
CEO at Gralio
Michal has worked at startups for many years and writes about topics relating to software selection and IT
management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs
of any business and find solutions to its problems.
TT
Tymon Terlikiewicz
CTO at Gralio
Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech
department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX,
HR, Payroll, Marketing automation and various developer tools.