GoCD, from ThoughtWorks in Chicago, is an application lifecycle management and development tool.
N/A
Vulcan Cyber (discontinued)
Score 7.7 out of 10
Mid-Size Companies (51-1,000 employees)
Vulcan Cyber was an exposure and vulnerability risk mitigation platform, acquired by Tenable in early 2025. The product is no longer available for sale, and functionality has been integrated into the Tenable One Exposure Management platform's vulnerability solution.
N/A
Pricing
GoCD
Vulcan Cyber (discontinued)
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
GoCD
Vulcan Cyber (discontinued)
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
—
More Pricing Information
Community Pulse
GoCD
Vulcan Cyber (discontinued)
Features
GoCD
Vulcan Cyber (discontinued)
Threat Intelligence
Comparison of Threat Intelligence features of Product A and Product B
GoCD
-
Ratings
Vulcan Cyber (discontinued)
7.8
11 Ratings
3% below category average
Network Analytics
00 Ratings
7.77 Ratings
Vulnerability Classification
00 Ratings
8.210 Ratings
Automated Alerts and Reporting
00 Ratings
7.311 Ratings
Threat Analysis
00 Ratings
8.05 Ratings
Automated Threat Identification
00 Ratings
7.911 Ratings
Vulnerability Management Tools
Comparison of Vulnerability Management Tools features of Product A and Product B
Previously, our team used Jenkins. However, since it's a shared deployment resource we don't have admin access. We tried GoCD as it's open source and we really like. We set up our deployment pipeline to run whenever codes are merged to master, run the unit test and revert back if it doesn't pass. Once it's deployed to the staging environment, we can simply do 1-click to deploy the appropriate version to production. We use this to deploy to an on-prem server and also AWS. Some deployment pipelines use custom Powershell script for.Net application, some others use Bash script to execute the docker push and cloud formation template to build elastic beanstalk.
It's really challenging at times to contend with multiple vulnerabilities on a daily basis, and having a way to make sense of what actually needs to be prioritized and what can be shifted further down the task list is extremely helpful. Because the solution suggests what your next step should be in mitigating a specific vulnerability, it helps us save time and research by enabling us to immediately take action after being informed about an issue.
Pipeline-as-Code works really well. All our pipelines are defined in yml files, which are checked into SCM.
The ability to link multiple pipelines together is really cool. Later pipelines can declare a dependency to pick up the build artifacts of earlier ones.
Agents definition is really great. We can define multiple different kinds of environments to best suit our diverse build systems.
GoCD is easier to setup, but harder to customize at runtime. There's no way to trigger a pipeline with custom parameters.
Jenkins is more flexible at runtime. You can define multiple user-provided parameters so when user needs to trigger a build, there's a form for him/her to input the parameters.
I wasn't here at the time when the company compared different vulnerability management platforms so I'm not sure on the reasoning and difference between the 2. It could be that the team went through different choices and found Vulcan to be the best fit. It's hard for me to say why Vulcan was specifically chosen
Settings.xml need to be backed up periodically. It contains all the settings for your pipelines! We accidentally deleted before and we have to restore and re-create several missing pipelines
More straight forward use of API and allows filtering e.g., pull all pipelines triggered after this date
Allows much better prioritizing of which assets are most vulnerable
Allow a better understanding of what assets are actually under real threat vs. what is assumed to be vulnerable, but the real world fact is the system would be hard to reach internally, so it's not as vulnerable.