Try our new research platform with insights from 80,000+ expert users

IONIX vs ThreatMate comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Scalability Issues

Sentiment score
8.7
IONIX enhances scalability with AWS and Jira integration, supports efficient task assignment, and continuously improves for seamless system integration.
No sentiment score available
 

Room For Improvement

Sentiment score
5.0
IONIX struggles with integration and usability, requiring better roadmaps, support, RBAC flexibility, and enhanced detection for sensitive data exposure.
No sentiment score available
 

Stability Issues

Sentiment score
9.0
Users highly rate IONIX for its stability and reliability, noting minimal issues that don't affect functionality.
No sentiment score available
 

Customer Service

No sentiment score available
IONIX's customer service is praised for collaboration but critiqued for response speed and detailed expertise in technical support.
No sentiment score available
 

Valuable Features

Sentiment score
8.3
IONIX provides seamless integration, advanced threat detection, and actionable insights, enhancing security effectiveness with automated resolution and timely reporting.
No sentiment score available
 

Setup Cost

No sentiment score available
IONIX pricing is fair and competitive, with early adopters benefiting, while new customer terms remain uncertain.
No sentiment score available
 

Categories and Ranking

IONIX
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Attack Surface Management (ASM) (6th)
ThreatMate
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Cyber Asset Attack Surface Management (CAASM) (15th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. IONIX is designed for Attack Surface Management (ASM) and holds a mindshare of 2.4%, up 1.6% compared to last year.
ThreatMate, on the other hand, focuses on Cyber Asset Attack Surface Management (CAASM), holds 0.5% mindshare, up 0.4% since last year.
Attack Surface Management (ASM)
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

reviewer2394492 - PeerSpot reviewer
Helps us prioritize our security fixes, reduce our false positives, and improve our security posture
Our team is always looking for ways to improve the product. Although we understand we are not the only client, the company has been very receptive to our suggestions. They work with the development team to implement our requests, and most of the time, they do. However, we are currently facing a challenge with the RBAC system. Our view on how it should function differs slightly from theirs. While we understand their position, more flexibility in controlling the system would be beneficial. Due to the sensitive nature of our data, we need to limit access to specific user information within IONIX. Although we have implemented some user feedback for improvement, other areas require changes to IONIX's RBAC model. We understand their reasons for the current model, but we believe modifications are necessary. Unfortunately, achieving those changes seems unlikely.
Use ThreatMate?
Share your opinion
report
Use our free recommendation engine to learn which Attack Surface Management (ASM) solutions are best for your needs.
816,406 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
14%
Insurance Company
13%
Financial Services Firm
12%
Retailer
11%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about IONIX?
The most valuable feature of IONIX is the effortless setup.
What needs improvement with IONIX?
I don't have anything that I don't like, but there is a feature that IONIX can also consider. We're a heavy user of IONIX services and have a very, very good partnership. However, IONIX only looks ...
What is your primary use case for IONIX?
We use IONIX to identify and monitor any vulnerabilities or issues within the attack surface. It is also used to validate the remediation actions.
Ask a question
Earn 20 points
 

Comparisons

No data available
 

Also Known As

Cyberpion
No data available
 

Learn More

Video not available
 

Overview

 

Sample Customers

Warner Music Group, Lexmark, Infosys, The Telegraph, Grand Canyon Education, E.ON
Information Not Available
Find out what your peers are saying about CrowdStrike, Trend Micro, Darktrace and others in Attack Surface Management (ASM). Updated: October 2024.
816,406 professionals have used our research since 2012.