Threatspy is a cloud-based security software that helps businesses find and fix vulnerabilities in their websites and applications. It uses a unique method to uncover both known and unknown weaknesses, ranking their importance based on potential risk. Threatspy guides teams through fixing these issues and even automates some tasks. This saves time and strengthens a company's overall security.
Who is Threatspy best for
Threatspy is a cloud-based security solution ideal for small and medium-sized businesses in regulated industries like finance, healthcare, and government. It helps developers and security engineers find and fix website and application vulnerabilities. Users praise Threatspy's ease of use, automated remediation, and fast threat detection. Some users mention occasional false positives and resource-intensive scans.
Ideal for small to mid-sized businesses needing robust security solutions.
Strong fit for BFSI, Healthcare, Retail, Manufacturing, and Government.
Threatspy features
Type in the name of the feature or in your own words tell us what you need
Supported
Threatspy automatically scans web applications for security vulnerabilities.
Supported
Threatspy supports API scanning for vulnerabilities.
Supported
Threatspy integrates with CI/CD pipelines for automated vulnerability scanning.
Supported
Threatspy automates vulnerability remediation using playbooks and DevSecOps integrations.
Supported
Threatspy assesses and reports on the severity and potential impact of vulnerabilities.
Qualities
We evaluate the sentiment that users express about non-functional aspects of the
software
Value and Pricing Transparency
Strongly positive
+1
Customer Service
Strongly positive
+0.78
Ease of Use
Strongly positive
+1
Reliability and Performance
Rather positive
+0.68
Ease of Implementation
Strongly positive
+0.83
Threatspy reviews
We've summarised 26 Threatspy reviews (Threatspy G2 reviews) and
summarised the main points below.
Pros of Threatspy
Effectively detects and eliminates known and unknown threats.
Easy to use and implement, with scheduled scans.
Fast threat detection and response.
Provides remediation suggestions and automates some tasks.
Excellent customer support.
Cons of Threatspy
Occasional false positives, flagging legitimate applications as threats.
Limited customization for in-depth scans and reporting.
Can be resource-intensive during scans, sometimes causing system slowdowns.
On-premise installation option not available.
Threatspy pricing
The commentary is based on 8 reviews from Threatspy G2 reviews.
Users generally find Threatspy to be worth the investment and a valuable tool for vulnerability management and threat detection. They highlight its cost-saving benefits in preventing security breaches and system attacks. While some mention minor performance issues, overall the pricing sentiment is positive.
Better for managing cloud infrastructure security across multiple cloud platforms. Broader industry fit, including manufacturing, consumer goods and hospitality. Has more momentum based on employee growth. A Microsoft Defender for Cloud alternative.
More established and recognized by analysts. Lower rated by users, with some reporting higher cost and slower performance. Offers more deployment flexibility.
Better suited for medium and large businesses. Focuses on cloud security management and integrates with various security platforms. Has strong customer reviews and is rapidly growing.
Better for compliance automation and a stronger fit for small businesses. Has more momentum but some users report issues with outdated instructions and excessive alerts.
Better for endpoint management, patching, and remote access to Windows machines. Focuses on IT management and security updates rather than application vulnerability scanning. Has more momentum, but lacks Linux support and some remote desktop features.
Better fit for enterprise security posture management and attack surface management. Focuses on network and infrastructure scanning, including cloud infrastructure. Has more momentum.
Threatspy is a cloud-based security software designed to identify and remediate vulnerabilities in websites and applications. It detects both known and unknown weaknesses, assesses their risk, and guides teams through the fixing process, automating some tasks for efficiency and improved security posture. It's ideal for developers and security engineers, especially in sectors like BFSI and Healthcare.
How does Threatspy integrate with other tools?
How does Threatspy integrate with other tools?
Threatspy integrates with CI/CD pipelines for automated vulnerability scanning and remediation using playbooks and DevSecOps integrations. This streamlines development workflows and strengthens security posture.
What the main competitors of Threatspy?
What the main competitors of Threatspy?
Alternatives to Threatspy include Microsoft Defender for Cloud, OpenText Fortify On Demand, and Wiz. These competitors offer similar vulnerability scanning and security assessment features for web applications and APIs. They also cater to various company sizes and industries.
Is Threatspy legit?
Is Threatspy legit?
Threatspy is a legitimate security solution with positive reviews on G2, praising its ease of use and effective threat detection. While some users report occasional false positives and resource-intensive scans, Threatspy is generally considered safe and effective for vulnerability management.
How much does Threatspy cost?
How much does Threatspy cost?
Threatspy does not publicly list pricing for its plans. A 14-day free trial is available. Contact Threatspy for pricing details regarding its Starter, Pro, and Enterprise plans.
Is Threatspy customer service good?
Is Threatspy customer service good?
Threatspy's customer service receives positive feedback overall. Users highlight the helpful and responsive support team, contributing to a generally positive experience. While one review mentioned initial concerns, they ultimately found the service worthwhile.
Reviewed by
MK
Michal Kaczor
CEO at Gralio
Michal has worked at startups for many years and writes about topics relating to software selection and IT
management. As a former consultant for Bain, a business advisory company, he also knows how to understand needs
of any business and find solutions to its problems.
TT
Tymon Terlikiewicz
CTO at Gralio
Tymon is a seasoned CTO who loves finding the perfect tools for any task. He recently headed up the tech
department at Batmaid, a well-known Swiss company, where he managed about 60 software purchases, including CX,
HR, Payroll, Marketing automation and various developer tools.