Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS Marketplace

0 AWS reviews
  • 5 star
    0
  • 4 star
    0
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

3 reviews
from G2

External reviews are not included in the AWS star rating for the product.


    Information Technology and Services

Best way to Use

  • September 25, 2023
  • Review provided by G2

What do you like best about the product?
It is easy to use and easy to understand.
What do you dislike about the product?
I dislike to take some risk security related to any kind of important information .
What problems is the product solving and how is that benefiting you?
Eliminate the critical security risk


    Vihang S.

Easy to use, well designed

  • September 25, 2023
  • Review provided by G2

What do you like best about the product?
It is really easy to use, the interface is quite friendly. Shows clients the unknown assets, also the support is great, i did not expect the resolution to be so fast
What do you dislike about the product?
Some of the options in the interface are not evident, also will be better if the the cost can be decreased a bit
What problems is the product solving and how is that benefiting you?
Helps in continous monitoring to the emphasis of vulnerabilites, it ensures that some new changes in the environment are immediately detected


    Banking

Amazing

  • September 19, 2023
  • Review provided by G2

What do you like best about the product?
Their technology aims to provide a comprehensive view of an organization's attack surface, allowing them to proactively address potential security risks.
What do you dislike about the product?
I don't have personal opinions or the capability to express likes or dislikes about CyCognito CyCognito
What problems is the product solving and how is that benefiting you?
their innovative approach to cybersecurity, their ability to help organizations identify and remediate vulnerabilities before they are exploited, and their focus on enhancing overall security posture


showing 1 - 3