Logo of ThreatMapper

ThreatMapper

Website LinkedIn Twitter

Last updated on

Company health

Employee growth
7% decrease in the last year
Web traffic
56% increase in the last quarter
Financing
December 2020 - $11M

Ratings

G2
4.2/5
(12)

ThreatMapper description

ThreatMapper is a security tool that scans your company's computer systems and highlights potential weaknesses. It identifies vulnerabilities in your software, settings, and infrastructure. ThreatMapper excels at reducing unimportant security alerts and helping you focus on the most critical risks to your business.


Who is ThreatMapper best for

ThreatMapper is a security tool designed for small to medium businesses. It scans systems for vulnerabilities in software, settings, and infrastructure, prioritizing critical risks. This helps security professionals focus on the most important threats by reducing alert noise.

  • Ideal for small to medium-sized businesses.

  • Suitable for various industries.


ThreatMapper features

Type the name of the feature or, in your own words, tell us what you need
Supported

ThreatMapper identifies and mitigates vulnerabilities by monitoring the attack surface and prioritizing threats.

Supported

ThreatMapper prioritizes alerts based on exploitability using ThreatGraph.

Supported

ThreatMapper continuously monitors compliance posture and integrates with Steampipe for broader checks.


ThreatMapper pricing

The commentary is based on 3 reviews from ThreatMapper G2 reviews.

ThreatMapper is open-source and available on GitHub. ThreatStryker is the commercial version. For ThreatStryker, a 14-day free trial is available, and users need to contact Deepfence for pricing.

See the ThreatMapper pricing page.

  • ThreatMapper has a free plan.

  • ThreatMapper has a free trial.


ThreatMapper alternatives

  • Logo of Microsoft Defender Vulnerability Management
    Microsoft Defender Vulnerability Management
    Has broader applicability across various organization sizes. Grows faster and boasts more user reviews with generally positive feedback.
    Read more
  • Logo of Vulners Scanner
    Vulners Scanner
    Has more momentum and offers vulnerability intelligence beyond CVSS scores.
    Read more
  • Logo of Splunk Enterprise Security
    Splunk Enterprise Security
    Better for organizations with established security operation centers handling large data volumes. More adaptable for changing security needs. However, it has higher licensing costs and a steeper learning curve. Consider this Splunk Enterprise Security alternative if simplified alert prioritization is more critical than advanced data analysis.
    Read more
  • Logo of Intruder
    Intruder
    Better for web application security and continuous monitoring. Easier to use with excellent customer service. More established, with positive user reviews and faster growth. Pricing may be higher.
    Read more
  • Logo of McAfee Vulnerability Manager for Databases
    McAfee Vulnerability Manager for Databases
    Focuses on database security and compliance. Good for users who need vulnerability reporting and compliance scanning. Rated 4.3/5 on G2. Some users find the UI clunky and training time-consuming.
    Read more
  • Logo of Microsoft Defender for Cloud
    Microsoft Defender for Cloud
    Better for organizations of all sizes managing cloud security across multiple platforms. Broader industry applicability, specifically in Healthcare, Manufacturing, Consumer Goods, Hospitality, Software/IT, and Automotive. Has more momentum based on website traffic and employee growth. Users appreciate real-time threat detection, seamless Microsoft integrations, and unified security management, although some find the pricing complex and initial setup challenging.
    Read more

ThreatMapper FAQ

  • What is ThreatMapper and what does ThreatMapper do?

    ThreatMapper is a security vulnerability scanner that identifies weaknesses in software, settings, and infrastructure. It prioritizes critical security alerts, reducing noise and enabling businesses to focus on the most important risks. It excels at continuous compliance monitoring and integrates with Steampipe.

  • How does ThreatMapper integrate with other tools?

    ThreatMapper integrates with Steampipe for extended compliance checks. It also leverages ThreatGraph for context-rich vulnerability prioritization. This combined approach streamlines security operations and strengthens your overall security posture.

  • What the main competitors of ThreatMapper?

    Top alternatives to ThreatMapper include Microsoft Defender Vulnerability Management, Vulners Scanner, and Microsoft Defender for Cloud. These tools offer similar vulnerability scanning and security posture management capabilities. Intruder and Splunk Enterprise Security are also strong competitors.

  • Is ThreatMapper legit?

    ThreatMapper is a legitimate security tool designed for cloud-native application security. It helps identify and mitigate vulnerabilities by prioritizing threats and monitoring compliance. It excels at reducing unimportant security alerts so you can focus on the most critical risks.

  • How much does ThreatMapper cost?

    There is no pricing information available for ThreatMapper. Contact Deepfence for product pricing details or to determine if ThreatMapper is worth the investment for your needs.

  • Is ThreatMapper customer service good?

    Based on a review, ThreatMapper's customer support is considered "great". The user mentions helpful support alongside the software's real-time visualization and multi-cloud application features. However, the open-source nature of the platform may limit third-party resources.


Reviewed by

MK
Michal Kaczor
CEO at Gralio

Michal has worked at startups for many years and writes about topics relating to software selection and IT management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs of any business and find solutions to its problems.

TT
Tymon Terlikiewicz
CTO at Gralio

Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX, HR, Payroll, Marketing automation and various developer tools.