Skip to main content
TrustRadius
Hackuity

Hackuity

Overview

What is Hackuity?

Hackuity is a vulnerability management platform provided by Hackuity.io. According to the vendor, the platform aims to provide organizations of all sizes with a comprehensive view of their cyber exposure depth and the necessary tools to interpret it. It caters to various professions and industries, including...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Risk Management Software and Solutions

Be the first one in your network to review Hackuity, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Rapid7 InsightVM?

InsightVM is presented as the next evolution of Nexpose, by Rapid7. This Insight cloud-based solution features everything included in Nexpose, such as Adaptive Security and the proprietary Real Risk score, and extends visibility into cloud and containerized infrastructure. InsightVM also offers…

What is Donesafe?

Donesafe is Health, Safety and Environment software that connects a management system from workers in the field to the management team in the boardroom, Donesafe was acquired by Health & Safety Institute (HSI) in February 2020.

Return to navigation

Product Details

What is Hackuity?

Hackuity is a vulnerability management platform provided by Hackuity.io. According to the vendor, the platform aims to provide organizations of all sizes with a comprehensive view of their cyber exposure depth and the necessary tools to interpret it. It caters to various professions and industries, including IT security professionals, CISOs, security analysts, risk managers, and managed security service providers (MSSPs). The platform is designed to serve organizations in the financial services, healthcare, technology, government, and manufacturing sectors.

Key Features

According to the vendor, Hackuity offers the following key features:

Cyber Asset management: The platform provides organizations with a centralized view of all assets, enabling them to effectively adapt their security posture. It achieves this by combining information from CMDB repositories with data from various security solutions, integrating asset management into the overall cyber security cycle.

Risk Based Vulnerability Management: Hackuity's platform automates the vulnerability management cycle by aggregating and standardizing threat assessment practices. It offers automated vulnerability scoring based on the organization's specific context, enabling risk-based prioritization.

Managed Security Services: The platform's multi-tenancy model allows managed security service providers (MSSPs) to efficiently manage the vulnerability management cycle for multiple customers from a single console. It integrates with various security tools, automates data collection and reporting, and reduces security risk.

Smart Exposure Explorer: Hackuity's Smart Exposure Explorer (SmartEx²) provides a comprehensive analysis of the real threats posed by each known CVE (Common Vulnerabilities and Exposures). It automates the aggregation of vulnerability and exposure intelligence from public and non-public sources, streamlining the process and enabling security teams to focus on securing the organization.

Connectors: Hackuity offers over 70 connectors to unify vulnerability management practices and ensure consistency of vulnerability data. These connectors cover various areas such as application security, asset inventory, cloud, collaboration tools, and vulnerability intelligence.

Cloud Deployment: Hackuity provides a Cloud deployment model that offers fast and efficient deployment, leveraging the full power of the Cloud for managing vulnerability processes.

Hybrid Deployment: The platform supports a Hybrid deployment model, allowing organizations to separate data and encryption keys. This model enables organizations to keep encryption keys local while leveraging the Cloud for Hackuity services.

On-Prem Deployment: For organizations with compliance requirements, Hackuity offers an On-Prem deployment model. This model allows organizations to keep all security data inside their network or private Cloud, ensuring compliance and data privacy.

Hackuity Features

  • Supported: Alerts/Notifications
  • Supported: Compliance Management
  • Supported: IT Risk Management
  • Supported: Risk Assessment
  • Supported: Access Controls/Permissions
  • Supported: Real Time Monitoring
  • Supported: Reporting/Analytics
  • Supported: Vulnerability Scanning
  • Supported: Activity Dashboard
  • Supported: Asset Discovery
  • Supported: Asset Tagging
  • Supported: Monitoring
  • Supported: Risk Management
  • Supported: Vulnerability Assessment

Hackuity Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWeb-Based, Windows, Linux
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation