Try our new research platform with insights from 80,000+ expert users

IONIX vs ThreatMate comparison

 

Comparison Buyer's Guide

Executive Summary
 

Categories and Ranking

IONIX
Average Rating
9.0
Reviews Sentiment
7.8
Number of Reviews
6
Ranking in other categories
Attack Surface Management (ASM) (6th)
ThreatMate
Average Rating
0.0
Number of Reviews
0
Ranking in other categories
Cyber Asset Attack Surface Management (CAASM) (14th)
 

Mindshare comparison

While both are Security Software solutions, they serve different purposes. IONIX is designed for Attack Surface Management (ASM) and holds a mindshare of 2.7%, up 1.4% compared to last year.
ThreatMate, on the other hand, focuses on Cyber Asset Attack Surface Management (CAASM), holds 0.6% mindshare, up 0.5% since last year.
Attack Surface Management (ASM)
Cyber Asset Attack Surface Management (CAASM)
 

Featured Reviews

reviewer2394492 - PeerSpot reviewer
Helps us prioritize our security fixes, reduce our false positives, and improve our security posture
Our team is always looking for ways to improve the product. Although we understand we are not the only client, the company has been very receptive to our suggestions. They work with the development team to implement our requests, and most of the time, they do. However, we are currently facing a challenge with the RBAC system. Our view on how it should function differs slightly from theirs. While we understand their position, more flexibility in controlling the system would be beneficial. Due to the sensitive nature of our data, we need to limit access to specific user information within IONIX. Although we have implemented some user feedback for improvement, other areas require changes to IONIX's RBAC model. We understand their reasons for the current model, but we believe modifications are necessary. Unfortunately, achieving those changes seems unlikely.
Use ThreatMate?
Share your opinion
report
Use our free recommendation engine to learn which Attack Surface Management (ASM) solutions are best for your needs.
824,067 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
13%
Insurance Company
12%
Financial Services Firm
11%
Retailer
10%
No data available
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
No data available
 

Questions from the Community

What do you like most about IONIX?
The most valuable feature of IONIX is the effortless setup.
What needs improvement with IONIX?
I don't have anything that I don't like, but there is a feature that IONIX can also consider. We're a heavy user of IONIX services and have a very, very good partnership. However, IONIX only looks ...
What is your primary use case for IONIX?
We use IONIX to identify and monitor any vulnerabilities or issues within the attack surface. It is also used to validate the remediation actions.
Ask a question
Earn 20 points
 

Comparisons

No data available
 

Also Known As

Cyberpion
No data available
 

Learn More

Video not available
 

Overview

 

Sample Customers

Warner Music Group, Lexmark, Infosys, The Telegraph, Grand Canyon Education, E.ON
Information Not Available
Find out what your peers are saying about CrowdStrike, Trend Micro, Darktrace and others in Attack Surface Management (ASM). Updated: November 2024.
824,067 professionals have used our research since 2012.