| 
                             Attribute 
                         | 
                        
                             Essential 
                         | 
                        
                             Advanced 
                         | 
                        
                             Hackmetrix 
                         | 
                    
| 
                             Focus 
                         | 
                        |||
| 
                             Extras 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        |
| 
                             Headcount 
                         | 
                        |||
| 
                             Headcount distribution 
                         | 
                        |||
| 
                             Headcount growth 
                             | 
                        |||
| 
                             Headquarters 
                         | 
                        |||
| 
                             Countries 
                         | 
                        |||
| 
                             Reputation 
                         | 
                        
                             Same 
                         | 
                        
                             No
                                    reviews
                             
                         | 
                    |
| 
                             Followers 
                         | 
                        
                             Same 
                         | 
                        ||
| 
                             Research Firms 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        
                             None
                             
                         | 
                    
| 
                             Founded 
                         | 
                        2001 | ||
| 
                             Funding 
                         | 
                        
                             Bootstrapped 
                         | 
                        
                             Same 
                         | 
                        
                             $3M
                                        USD in 6 rounds from 13
                                    investors 
                         | 
                    
| 
                             Acquisitions 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                    
| 
                             Revenue 
                         | 
                        |||
| 
                             CVE 
                         | 
                        
                             257 CVEs
                                        reported to MITRE,
                                    ranked in the top 10 CVE labs
                                        worldwide 
                         | 
                        
                             0CVEs reported to MITRE 
                         | 
                    |
| 
                             Compliance 
                         | 
                        
                             SOC 2Type
                                        II and SOC
                                    3 
                         | 
                        ||
| 
                             Bug bounty 
                         | 
                        Yes | 
                             No 
                         | 
                    |
| 
                             Visits 
                         | 
                        |||
| 
                             Authority 
                         | 
                        |||
| 
                             Vulnerability database 
                         | 
                        Same | 
                             None 
                         | 
                    |
| 
                             Content 
                         | 
                        |||
| 
                             Knowledge base 
                         | 
                        
                             13 KB sections  | 
                        
                             No 
                         | 
                    |
| 
                             Community 
                         | 
                        
                             No 
                         | 
                    ||
| 
                             Sync training 
                         | 
                        
                             1 workshop 
                         | 
                        No | |
| 
                             Async training 
                         | 
                        
                             3 product use
                                    courses, all free 
                         | 
                        
                             1 security
                                    education course (free) 
                         | 
                    |
| 
                             Distribution 
                         | 
                        
                             Same 
                         | 
                        ||
| Marketplaces | AWS | ||
| 
                             Freemium 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    
| 
                             Free trial 
                         | 
                        |||
| 
                             Demo 
                         | 
                        |||
| 
                             Open Demo 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    
| 
                             Pricing 
                         | 
                        |||
| 
                             Pricing tiers 
                         | 
                        
                             1 plan 
                         | 
                        
                             1 plan 
                         | 
                        3 plans (ISO27001 compliance, PCI DSS compliance, ethical hacking). First 2transparent | 
| 
                             Minimum term 
                         | 
                        |||
| 
                             Minimum payment period 
                         | 
                        |||
| 
                             Minimum capabilities 
                         | 
                        
                             API security testing, ASPM, binary SAST, containers, CSPM, DAST, IaC, SAST, SCA and secrets  | 
                        ||
| 
                             Minimum scope 
                         | 
                        1 group | 
                             1 author 
                         | 
                        
                             No information available 
                         | 
                    
| 
                             Pricing drivers 
                         | 
                        |||
| 
                             Minimum monthly payment 
                         | 
                        No information available | 
| 
                                 Attribute 
                             | 
                            
                                 Essential 
                             | 
                            
                                 Advanced 
                             | 
                            
                                 Hackmetrix 
                             | 
                        
| 
                                 
                                    PTaaS
                                 
                             | 
                            
                                 No 
                             | 
                            
                                 No. MPT 
                             | 
                        |
| 
                                 
                                    Reverse engineering
                                 
                             | 
                            
                                 No 
                             | 
                            No information available | |
| 
                                 
                                    Secure code review
                                 
                             | 
                            
                                 No 
                             | 
                            
                                 No information available 
                                 | 
                        |
| 
                                 
                                    Pivoting
                                 
                             | 
                            
                                 No 
                             | 
                            
                                 No information available 
                             | 
                        |
| 
                                 
                                    Exploitation
                                 
                             | 
                            
                                 No 
                             | 
                            ||
| 
                                 Manual reattacks 
                             | 
                            
                                 Not applicable 
                             | 
                            1 reattack | |
| 
                                 Zero-day
                                        vulnerabilities
                                 
                             | 
                            
                                 None 
                             | 
                            
                                 Continuous zero-day vulnerability research
                                 
                             | 
                            
                                 None 
                             | 
                        
| 
                                 
                                    SLA
                                 
                             | 
                            No | ||
| 
                                 Min availability 
                             | 
                            
                                 >=99.95%
                                    per minute LTM 
                             | 
                            
                                 None 
                             | 
                        |
| 
                                 After-sale guarantees
                                     
                                 | 
                            
                                 No 
                             | 
                            
                                 Yes 
                             | 
                            
                                 No 
                             | 
                        
| 
                                 
                                    Accreditations
                                 
                             | 
                            
                                 None 
                             | 
                        ||
| 
                                 
                                    Hacker certifications
                                 
                             | 
                            
                                 Not applicable 
                                 | 
                            ||
| 
                                 
                                    Type of contract
                                 
                             | 
                            
                                 Employee 
                             | 
                            
                                 Same 
                             | 
                            |
| 
                                 Endpoint control 
                             | 
                            
                                 Not applicable 
                             | 
                            
                                 Total 
                             | 
                            
                                 No 
                             | 
                        
| 
                                 Channel control 
                             | 
                            
                                 Not applicable 
                             | 
                            
                                 Total 
                             | 
                            
                                 No 
                             | 
                        
| 
                                 
                                    Standards
                                 
                             | 
                            
                                 Some requirements from 67 standards,
                                        7 in common and 60 additional 
                             | 
                            
                                 All requirements from the same standards
                                 
                             | 
                            
                                 10 standards,
                                    7 in common and 3additional 
                             | 
                        
| 
                                 
                                        Detection method
                                     
                                 | 
                            |||
| 
                                 
                                    Remediation
                                 
                             | 
                            
                                 5,
                                    1 in common and 4 additional 
                             | 
                            
                                 Same, plus 1
                                 
                             | 
                            
                                 1 in common
                                 
                             | 
                        
| 
                                 
                                    Outputs
                                 
                             | 
                            
                                 5,
                                        1 in common and 4 additional 
                                 | 
                            
                                 Same, plus 2
                                 
                             | 
                            
                                 1 in
                                    common 
                             | 
                        
| 
                             Attribute 
                         | 
                        Essential | 
                             Advanced 
                         | 
                        
                             Hackmetrix 
                         | 
                    
| 
                             
                                ASPM
                             
                         | 
                        
                             No 
                         | 
                    ||
| 
                             API 
                         | 
                        
                             Yes. No
                                    information available 
                         | 
                    ||
| 
                             
                                IDE
                             
                         | 
                        
                             Same, plus
                                1 functionality 
                         | 
                        
                             No 
                         | 
                    |
| 
                             
                                CLI
                             
                         | 
                        
                             No
                             
                         | 
                    ||
| 
                             
                                CI/CD
                             
                         | 
                        
                             Does not break the build 
                         | 
                    ||
| 
                             Vulnerability sources 
                         | 
                        
                             4 sources
                             
                         | 
                        
                             None 
                         | 
                    |
| 
                             Threat model alignment 
                         | 
                        
                             No 
                         | 
                    ||
| 
                             Priority criteria 
                         | 
                        |||
| 
                             Custom prioritization 
                         | 
                        Same | 
                             No 
                         | 
                    |
| 
                             Scanner origin 
                         | 
                        
                             None 
                         | 
                    ||
| 
                             
                                SCA
                             
                         | 
                        
                             No
                             
                         | 
                    ||
| 
                             AI security 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    |
| 
                             
                                Reachability
                             
                         | 
                        
                             12 languages
                             
                         | 
                        
                             No 
                             | 
                    |
| 
                             Reachability type 
                         | 
                        
                             Not applicable 
                         | 
                    ||
| 
                             
                                SBOM
                             
                         | 
                        No | ||
| 
                             Malware detection 
                         | 
                        
                             Yes 
                         | 
                        
                             Yes 
                         | 
                        
                             No 
                         | 
                    
| 
                             Autofix on components 
                         | 
                        
                             No 
                         | 
                        No | 
                             No 
                         | 
                    
| 
                             
                                Containers
                             
                         | 
                        
                             No 
                             | 
                    ||
| 
                             
                                Source SAST 
                            
                                (languages)
                                 
                         | 
                        
                             No
                             
                         | 
                    ||
| 
                             Source SAST  
                            frameworks) 
                         | 
                        
                             No
                             
                         | 
                    ||
| 
                             Custom rules 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    
| 
                             IaC 
                         | 
                        
                             No 
                         | 
                    ||
| 
                             
                                Binary SAST
                             
                         | 
                        
                             1 type
                                    of binary
                             
                         | 
                        
                             Same,
                                plus 2 types of binaries 
                         | 
                        
                             No
                             
                         | 
                    
| 
                             
                                DAST
                             
                         | 
                        
                             No  | 
                    ||
| 
                             API security testing 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    |
| 
                             
                                IAST
                             
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    
| 
                             
                                CSPM
                             
                         | 
                        Yes | 
                             No 
                         | 
                    |
| 
                             ASM 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                        
                             No 
                         | 
                    
| 
                             
                                Secrets
                             
                         | 
                        
                             Same,
                                    plus verify other attack vectors and secrets exploitability 
                         | 
                        
                             No 
                         | 
                    |
| 
                             
                                AI
                             
                         | 
                        No | ||
| 
                             MCP 
                         | 
                        Yes | 
                             No 
                         | 
                    |
| 
                             
                                    Open source
                                 
                             | 
                        
                             Not applicable 
                         | 
                        
                             No 
                         | 
                    |
| 
                             Provisioning as Code 
                         | 
                        
                             No 
                         | 
                    ||
| 
                             
                                Deployment
                             
                         | 
                        |||
| Regions | 
                             No
                                    information available 
                         | 
                    ||
| 
                             
                                Status
                             
                         | 
                        
                             No 
                         | 
                    ||
| 
                             
                                Incidents
                             
                         | 
                        
                             No information available 
                         | 
                    
| 
                             Attribute 
                         | 
                        
                             Essential 
                         | 
                        
                             Advanced 
                         | 
                        
                             Hackmetrix 
                         | 
                    
| 
                             
                                SCM
                             
                         | 
                        
                             None 
                         | 
                    ||
| 
                             
                                Binary repositories
                             
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                    
| 
                             
                                Ticketing
                             
                         | 
                        
                             3,
                                1 in common
                                and 2 additional 
                         | 
                        
                             1 in common  | 
                    |
| 
                             
                                ChatOps
                             
                         | 
                        None | 
                             None 
                         | 
                        |
| 
                             
                                IDE
                             
                         | 
                        
                             None  | 
                    ||
| 
                             
                                CI/CD
                             
                         | 
                        
                             None 
                             | 
                    ||
| 
                             
                                SCA
                             
                         | 
                        
                             None  | 
                    ||
| 
                             
                                Container
                             
                         | 
                        
                             None  | 
                    ||
| 
                             SAST
                             
                         | 
                        
                             None  | 
                    ||
| 
                             
                                DAST
                             
                         | 
                        
                             None  | 
                    ||
| 
                             
                                IAST
                             
                         | 
                        None | 
                             None 
                         | 
                        
                             None 
                         | 
                    
| 
                             
                                Cloud
                             
                         | 
                        
                             None 
                         | 
                    ||
| 
                             
                                CSPM
                             
                         | 
                        None | ||
| 
                             
                                Secrets
                             
                         | 
                        
                             None  | 
                    ||
| 
                             Remediation 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                    
| 
                             Bug bounty 
                         | 
                        None | 
                             None 
                         | 
                        
                             None 
                         | 
                    
| 
                             Vulnerability management 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                    
| 
                             
                                Compliance
                             
                         | 
                        
                             None 
                         | 
                        
                             None 
                         | 
                        
                             None 
                         |