Cybersecurity Tool Comparisons

Discussions center on comparing a featured cybersecurity tool for vulnerability scanning, threat detection, and management to alternatives like AlienVault, Synack, Tanium, Threatcare, SIEMs, and others such as Wazuh and CrowdStrike.

➡️ Stable 0.7x Security
3,476
Comments
20
Years Active
5
Top Authors
#986
Topic ID

Activity Over Time

2007
1
2008
6
2009
20
2010
32
2011
37
2012
38
2013
62
2014
94
2015
144
2016
181
2017
210
2018
168
2019
226
2020
335
2021
300
2022
344
2023
370
2024
412
2025
456
2026
40

Keywords

e.g RMM PCAP FDE tirreno.com AKAM IR GoDaddy PR AICPA security tools tool vulnerabilities cybersecurity startups detection vulnerability crowdstrike fix

Sample Comments

jusmakingapost Sep 23, 2020 View on HN

Why not use something like alienvault? What are the perks of using this over other services?

phoneyphone Apr 21, 2017 View on HN

There's a service called Synack that does something similar to what you describe

taaron Mar 3, 2022 View on HN

Interesting tool...how does this compare to other CSPM tools?

nfriedly Mar 27, 2018 View on HN

Check out Tanium, you'd fit right in

ryanmerket Jun 26, 2017 View on HN

Check out Threatcare, it's a SaaS version of what most pentesters do.

secopsstephen Nov 30, 2021 View on HN

Resources to help people detect threats in logs. Most resources available are terrible SIEM vendor listicles. This aims to be better.

CyberBank Aug 8, 2019 View on HN

A combo of in house tools for creating findings from "non-standard" tools, (standard tools being nessus, app scan, etc.) Such as pen tests, responsible disclosure, red teamings, etc. We partner with Kenna Security pretty heavily in terms of tracking and consolidating our vulnerabilities, along with remediation prioritization and strategy

miravmehta Nov 8, 2025 View on HN

I would like to see more API, Secrets, IaC findings.

rolph May 11, 2025 View on HN

AI opsec wingman, that will advise regarding cumulative settings, practices and installed system components that will enable/disable compromise

LarkaUZ_ May 18, 2017 View on HN

We aggregate data from multiple web vulnerability scanners, and provide a unified and simplified report about the vulnerabilities detected.