Ratings and Reviews 1,059 Ratings
Ratings and Reviews 1 Rating
What is Wiz?
                Wiz introduces a novel strategy for cloud security by identifying critical risks and potential entry points across various multi-cloud settings. It enables the discovery of all lateral movement threats, including private keys that can access both production and development areas. Vulnerabilities and unpatched software can be scanned within your workloads for proactive security measures. Additionally, it provides a thorough inventory of all services and software operating within your cloud ecosystems, detailing their versions and packages. The platform allows you to cross-check all keys associated with your workloads against their permissions in the cloud environment. Through an exhaustive evaluation of your cloud network, even those obscured by multiple hops, you can identify which resources are exposed to the internet. Furthermore, it enables you to benchmark your configurations against industry standards and best practices for cloud infrastructure, Kubernetes, and virtual machine operating systems, ensuring a comprehensive security posture. Ultimately, this thorough analysis makes it easier to maintain robust security and compliance across all your cloud deployments.
            
        
            What is Probely?
                Probely serves as a web security scanner tailored for agile development teams, facilitating the ongoing assessment of web applications. With an intuitive web interface, it efficiently manages the lifecycle of identified vulnerabilities. Additionally, it offers straightforward guidance for remediation, including code snippets to aid developers in addressing security issues.
The platform's comprehensive API enables seamless integration into software development life cycles (SDLC) or continuous integration workflows, thereby automating security testing processes. By empowering developers to handle security independently, Probely addresses the common challenge of security teams being outnumbered by development personnel. This approach enhances the efficiency of security testing, allowing security teams to focus on higher-priority tasks that require their expertise.
In addition to covering the OWASP Top 10 vulnerabilities, Probely also addresses thousands of others and is equipped to validate specific PCI-DSS and ISO27001 compliance requirements, ensuring a robust security posture for web applications. Ultimately, by streamlining the security assessment process, Probely fosters a culture of security awareness and accountability within development teams.
            
        
            Integrations Supported
            
                
    Jira
            
            
        
        
    
        
        
            
                
    Jira Work Management
            
            
        
        
    
        
        
            
                
    Slack
            
            
        
        
    
        
        
            
                
    Amazon Web Services (AWS)
            
            
        
        
    
        
        
            
                
    Avalor
            
            
        
        
    
        
        
            
                
    Azure Marketplace
            
            
        
        
    
        
        
            
                
    Balance Theory
            
            
        
        
    
        
        
            
                
    CardinalOps
            
            
        
        
    
        
        
            
                
    Cyera
            
            
        
        
    
        
        
            
                
    DataBahn
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations Supported
            
                
    Jira
            
            
        
        
    
        
        
            
                
    Jira Work Management
            
            
        
        
    
        
        
            
                
    Slack
            
            
        
        
    
        
        
            
                
    Amazon Web Services (AWS)
            
            
        
        
    
        
        
            
                
    Avalor
            
            
        
        
    
        
        
            
                
    Azure Marketplace
            
            
        
        
    
        
        
            
                
    Balance Theory
            
            
        
        
    
        
        
            
                
    CardinalOps
            
            
        
        
    
        
        
            
                
    Cyera
            
            
        
        
    
        
        
            
                
    DataBahn
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            API Availability
            
                Has API
            
            
        
        
    
                API Availability
            
                Has API
            
            
        
        
    
                Pricing Information
        Request Pricing
        
    
    
    
        
        
            
                Free Trial Offered?
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Information
        $49.00/month
        
    
    
    
        
        
            
                Free Trial Offered?
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Supported Platforms
            
                SaaS
            
            
        
        
    
        
        
            
                Android
            
            
        
        
    
        
        
            
                iPhone
            
            
        
        
    
        
        
            
                iPad
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                On-Prem
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
                Supported Platforms
            
                SaaS
            
            
        
        
    
        
        
            
                Android
            
            
        
        
    
        
        
            
                iPhone
            
            
        
        
    
        
        
            
                iPad
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                On-Prem
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
                Customer Service / Support
            
                Standard Support
            
            
        
        
    
        
        
            
                24 Hour Support
            
            
        
        
    
        
        
            
                Web-Based Support
            
            
        
        
    
                Customer Service / Support
            
                Standard Support
            
            
        
        
    
        
        
            
                24 Hour Support
            
            
        
        
    
        
        
            
                Web-Based Support
            
            
        
        
    
                Training Options
            
                Documentation Hub
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Online Training
            
            
        
        
    
        
        
            
                On-Site Training
            
            
        
        
    
                Training Options
            
                Documentation Hub
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Online Training
            
            
        
        
    
        
        
            
                On-Site Training
            
            
        
        
    
                Company Facts
Organization Name
Wiz
Date Founded
2020
Company Location
United States
Company Website
www.wiz.io
Company Facts
Organization Name
Probely
Date Founded
2017
Company Location
Portugal
Company Website
probely.com
Categories and Features
Cloud Security
                                        Antivirus
                                        
                                    
                                    
                                    
                                        Application Security
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Management
                                        
                                    
                            
                        Cloud Workload Protection
                                        Anomaly Detection
                                        
                                    
                                    
                                    
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Cloud Gap Analysis
                                        
                                    
                                    
                                    
                                        Cloud Registry
                                        
                                    
                                    
                                    
                                        Data Loss Prevention (DLP)
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Governance
                                        
                                    
                                    
                                    
                                        Logging & Reporting
                                        
                                    
                                    
                                    
                                        Machine Learning
                                        
                                    
                                    
                                    
                                        Security Audit
                                        
                                    
                                    
                                    
                                        Workload Diversity
                                        
                                    
                            
                        Container Security
                                        Access Roles / Permissions
                                        
                                    
                                    
                                    
                                        Application Performance Tracking
                                        
                                    
                                    
                                    
                                        Centralized Policy Management
                                        
                                    
                                    
                                    
                                        Container Stack Scanning
                                        
                                    
                                    
                                    
                                        Image Vulnerability Detection
                                        
                                    
                                    
                                    
                                        Reporting
                                        
                                    
                                    
                                    
                                        Testing
                                        
                                    
                                    
                                    
                                        View Container Metadata
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        Identity Management
                                        Access Certification
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Multifactor Authentication
                                        
                                    
                                    
                                    
                                        Password Management
                                        
                                    
                                    
                                    
                                        Privileged Account Management
                                        
                                    
                                    
                                    
                                        Self-Service Access Request
                                        
                                    
                                    
                                    
                                        Single Sign On
                                        
                                    
                                    
                                    
                                        User Activity Monitoring
                                        
                                    
                                    
                                    
                                        User Provisioning
                                        
                                    
                            
                        IT Security
                                        Anti Spam
                                        
                                    
                                    
                                    
                                        Anti Virus
                                        
                                    
                                    
                                    
                                        Email Attachment Protection
                                        
                                    
                                    
                                    
                                        Event Tracking
                                        
                                    
                                    
                                    
                                        IP Protection
                                        
                                    
                                    
                                    
                                        Internet Usage Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Spyware Removal
                                        
                                    
                                    
                                    
                                        Two-Factor Authentication
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Web Threat Management
                                        
                                    
                                    
                                    
                                        Web Traffic Reporting
                                        
                                    
                            
                        Patch Management
                                        Alerts/Notifications
                                        
                                    
                                    
                                    
                                        Automatic Approval
                                        
                                    
                                    
                                    
                                        Automatic Patch Deployment
                                        
                                    
                                    
                                    
                                        Automatic Scans
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Custom Patches
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Network Wide Management
                                        
                                    
                                    
                                    
                                        Patch Prioritization
                                        
                                    
                                    
                                    
                                        Patch Testing
                                        
                                    
                                    
                                    
                                        Remote Access/Control
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                        Vulnerability Scanners
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Black Box Scanning
                                        
                                    
                                    
                                    
                                        Compliance Monitoring
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Defect Tracking
                                        
                                    
                                    
                                    
                                        Interactive Scanning
                                        
                                    
                                    
                                    
                                        Logging and Reporting
                                        
                                    
                                    
                                    
                                        Network Mapping
                                        
                                    
                                    
                                    
                                        Perimeter Scanning
                                        
                                    
                                    
                                    
                                        Risk Analysis
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Web Inspection
                                        
                                    
                            
                        Categories and Features
Audit
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Audit Planning
                                        
                                    
                                    
                                    
                                        Compliance Management
                                        
                                    
                                    
                                    
                                        Dashboard
                                        
                                    
                                    
                                    
                                        Exceptions Management
                                        
                                    
                                    
                                    
                                        Forms Management
                                        
                                    
                                    
                                    
                                        Issue Management
                                        
                                    
                                    
                                    
                                        Mobile Access
                                        
                                    
                                    
                                    
                                        Multi-Year Planning
                                        
                                    
                                    
                                    
                                        Risk Assessment
                                        
                                    
                                    
                                    
                                        Workflow Management
                                        
                                    
                            
                        Automated Testing
                                        Hierarchical View
                                        
                                    
                                    
                                    
                                        Move & Copy
                                        
                                    
                                    
                                    
                                        Parameterized Testing
                                        
                                    
                                    
                                    
                                        Requirements-Based Testing
                                        
                                    
                                    
                                    
                                        Security Testing
                                        
                                    
                                    
                                    
                                        Supports  Parallel Execution
                                        
                                    
                                    
                                    
                                        Test Script Reviews
                                        
                                    
                                    
                                    
                                        Unicode Compliance
                                        
                                    
                            
                        Cybersecurity
                                        AI / Machine Learning
                                        
                                    
                                    
                                    
                                        Behavioral Analytics
                                        
                                    
                                    
                                    
                                        Endpoint Management
                                        
                                    
                                    
                                    
                                        IOC Verification
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Tokenization
                                        
                                    
                                    
                                    
                                        Vulnerability Scanning
                                        
                                    
                                    
                                    
                                        Whitelisting / Blacklisting
                                        
                                    
                            
                        HIPAA Compliance
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Documentation Management
                                        
                                    
                                    
                                    
                                        For Healthcare
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Policy Training
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vendor Management
                                        
                                    
                            
                        Vulnerability Management
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Asset Tagging
                                        
                                    
                                    
                                    
                                        Network Scanning
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Prioritization
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vulnerability Assessment
                                        
                                    
                                    
                                    
                                        Web Scanning
                                        
                                    
                            
                        Vulnerability Scanners
                                        Asset Discovery
                                        
                                    
                                    
                                    
                                        Black Box Scanning
                                        
                                    
                                    
                                    
                                        Compliance Monitoring
                                        
                                    
                                    
                                    
                                        Continuous Monitoring
                                        
                                    
                                    
                                    
                                        Defect Tracking
                                        
                                    
                                    
                                    
                                        Interactive Scanning
                                        
                                    
                                    
                                    
                                        Logging and Reporting
                                        
                                    
                                    
                                    
                                        Network Mapping
                                        
                                    
                                    
                                    
                                        Perimeter Scanning
                                        
                                    
                                    
                                    
                                        Risk Analysis
                                        
                                    
                                    
                                    
                                        Threat Intelligence
                                        
                                    
                                    
                                    
                                        Web Inspection
                                        
                                    
                            
                         
         
         
         
         
        