Skip to main content
TrustRadius
Vulcan Cyber

Vulcan Cyber

Overview

What is Vulcan Cyber?

Vulcan Cyber is an exposure and vulnerability risk mitigation platform that coordinates teams, tools and tasks to eliminate the most-critical exposure risk to the business. Vulcan Cyber first correlates risk signals from scanners, cyber asset and threat intelligence tools. Risk…

Read more
Recent Reviews
Read all reviews

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Pricing

View all pricing

Vulcan Free

$0

Cloud
Vulnerability prioritization technology available for small organizations with less than 1,000 secured assets, one user and up to three integrated Vulcan Connectors.

Vulcan Enterprise

Custom licensing terms

Cloud
Vulcan Enterprise is designed for large organizations with hyper-scale vulnerability and exposure risk management requirements. Custom pricing and licensing terms. Vulcan Enterprise offers scalable user licensing to help secure 5,000+ assets and unlimited integrations.

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://vulcan.io/pricing

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Getting Started with Vulcan Cyber risk management

YouTube

Mitigate cyber risk at scale with vulnerability clusters [A Vulcan Cyber demo]

YouTube

Managing cyber risk in financial services (overview and demo)

YouTube

Vulcan Cyber vulnerability remediation orchestration [demo]

YouTube

Vulnerability risk prioritization, orchestration and mitigation [A Vulcan Cyber demo]

YouTube

A Demo of Data-Driven Cyber Risk Measurement, Management & Mitigation in Action [Vulcan Cyber demo]

YouTube
Return to navigation

Product Details

What is Vulcan Cyber?

Vulcan Cyber is an exposure and vulnerability risk mitigation platform that coordinates teams, tools and tasks to eliminate the most-critical exposure risk to the business. Vulcan Cyber first correlates risk signals from scanners, cyber asset and threat intelligence tools. Risk data from infrastructure, cloud, application and code projects is aggregated into the Vulcan Cyber data lake. Normalized risk data is then used to automate the prioritization and orchestration of risk mitigation campaigns, ultimately validating remediation outcomes.


Vulcan Cyber provides its customers with these vulnerability risk management lifecycle operational capabilities:
  • Risk data normalization and correlation for all scan and asset data sources;
  • Risk and security posture visibility across all attack surfaces;
  • Risk prioritization based on business context and enriched threat intelligence.
  • Collaboration between security teams and remediation owners using orchestrated mitigation campaigns, task automation, and vulnerability remediation best practices.
  • Customizable dashboards and reports measure compliance and risk mitigation efficacy with advanced exposure analytics.


Vulcan Cyber goes beyond vulnerability risk management to help mitigate cyber risk through continuous threat exposure management (CTEM), cyber asset and attack surface management (CAASM), and application (ASPM) and cloud security posture management (CSPM) at enterprise scale.

Vulcan Cyber Features

Vulnerability Management Tools Features

  • Supported: IT Asset Realization
  • Supported: Vulnerability Intelligence

Threat Intelligence Features

  • Supported: Network Analytics
  • Supported: Vulnerability Classification
  • Supported: Automated Alerts and Reporting
  • Supported: Threat Analysis
  • Supported: Automated Threat Identification

Vulcan Cyber Videos

Vulcan Cyber ExposureOS platform highlights
Vulcan Cyber - Own Cyber Risk

Vulcan Cyber Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Supported CountriesGlobal
Supported LanguagesEnglish

Vulcan Cyber Downloadables

Frequently Asked Questions

Vulcan Cyber starts at $0.

Nucleus Security, Cisco Vulnerability Management, and Qualys VMDR are common alternatives for Vulcan Cyber.

Reviewers rate Vulnerability Intelligence highest, with a score of 8.4.

The most common users of Vulcan Cyber are from Enterprises (1,001+ employees).

Vulcan Cyber Customer Size Distribution

Consumers0%
Small Businesses (1-50 employees)0%
Mid-Size Companies (51-500 employees)60%
Enterprises (more than 500 employees)40%
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(13)

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We use it a single pane for all our vulnerability data as well as an orchestration tool for ticketing. We also can customize risk priority based on internal and external methods.
Previously, different vulnerability scanners had different methods to create tickets to teams, but mostly we used excel files and didn't prioritize what a team needed to fix first.
  • Single Pane of Vulnerability Data
  • Ticketing Automations
  • Role Based User Access through SSO
  • Flexibility in Reporting, creating custom reports
  • QA on their integrations prior to public release
Well suited when a customer doesn't have a solid process to organize vulnerabilities across multiple tools.

Not well suited for large organizations who don't have the manpower to do intensive role based management, user setup, or perform extra QA testing on features.
Vulnerability Management Tools (3)
86.66666666666666%
8.7
IT Asset Realization
70%
7.0
Configuration Monitoring
90%
9.0
Vulnerability Intelligence
100%
10.0
Threat Intelligence (3)
80%
8.0
Vulnerability Classification
100%
10.0
Automated Alerts and Reporting
70%
7.0
Automated Threat Identification
70%
7.0
  • Reduced mean time to resolve vulnerabilities by half
  • Provided visibility to our network vulnerabilities we didn't have before without manually correlating
  • Saves time on tracking resolution of vulnerabilities because you don't need to rescan to see if work was performed
It was easy to turn on and perform connector integrations, however some of those connectors were not well tested and had bugs.
Visibility of vulnerability data took less than a month, however we're still working through getting ticketing integrations working properly.
The visibility is there, however the orchestration piece still has work to be done before we can fully leverage it.
Nucleus Security was missing some connectors and was more focused on risk prioritization than ticketing automation.

Seemplicity had a different billing method that may have ended up being more expensive. Also a younger app.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Vulcan Cyber allows us to centralize all the information regarding our corporate assets as well as any vulnerabilities they are affected by. For us, it is a single place of truth to understand the risks and exposure of our devices and take immediate and automated actions in case of any vulnerabilities that need to be remediated. It also allows us to automate the ticket creation process and share it with the different asset/risk owners so they are aware of how an when should they patch an issue.
  • Asset/vulnerabilities ingestion
  • Remediation automation
  • Asset and risk visibility
  • Integration with many vulnerability sources
  • Integrated exception process in the tool
  • Some UX bugs
  • Missing integrations for some less popular vulnerability scanning tools
  • Customization options could be better
It is well suited to ingest, parse, deduplicate and show unique assets and vulnerabilities coming from very different sources. It is also very useful to automate the process of Vulnerability Management when it comes to ticket creation and escalation, vulnerability retest and automatic ticket closure.
It has several customization options to cater to very different departments when it comes to SLA or risk appetite.
However, there are some UX bugs that make it a little hard to navigate the platform sometimes and can lead to a subpar user experience.
Vulnerability Management Tools (1)
100%
10.0
Vulnerability Intelligence
100%
10.0
Threat Intelligence (3)
96.66666666666666%
9.7
Vulnerability Classification
100%
10.0
Automated Alerts and Reporting
90%
9.0
Automated Threat Identification
100%
10.0
  • Increased and more accurate risk exposure
  • Improved automation for vulnerabilities remediation
  • Cost reduction for fixing vulnerabilities
It is very easy to integrate different sources to Vulcan using the public documentation and the initial onboarding process for new data is clearly displayed to the end user.
I would still like to have less popular scanning tools available as native connectors or the possibility to onboard any tool that has an API publicly available instead of having to request it to be natively added.
It vastly improved our Vulnerability Management lifecycle, shaping what was a manual process in the past to a more automated one with the Vulcan platform. It also gives us a more accurate vision of our risk and exposure given the ample scanning sources that can be integrated with it.
The customizable SLA and risk appetite for different business units is highly appreciated too.
Vulcan Cyber has a more mature platform catered for enterprise customers compared to Nucleus. The very close support and attention to detail of the Vulcan sales and technical team also helped in answering any possible question we had about the platform or take note of our feature requests/feedback to be implemented in their roadmap.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use it to aggregate vulnerability findings from WIZ and Rapid7.
  • Aggregates the information well from multiple sources
  • Creates Jira stories for immediate attention
  • Better categorization of the criticality of vulns so that an org can focus on the worst issues first and track to completion. Currently, we get double reporting.
It is well suited to our company's effort to reduce overall vulns and empower application teams to be more self aware of issues as they are found. This helps to encourage organic growth of a strengthened security policy and processes. We are finding this easier to utilize than periodic pen tests were dozens of issues are dumped on teams requiring longer follow-up on resolution. More of a Fix as you go approach helping to keep security in the forefront of everyone's mind.
Vulnerability Management Tools (3)
53.33333333333333%
5.3
IT Asset Realization
N/A
N/A
Configuration Monitoring
70%
7.0
Vulnerability Intelligence
90%
9.0
Threat Intelligence (4)
90%
9.0
Network Analytics
90%
9.0
Vulnerability Classification
70%
7.0
Automated Alerts and Reporting
100%
10.0
Automated Threat Identification
100%
10.0
  • Definitely reduces time to mitigation as the pipeline to identification and notification is very efficient/shortened.
  • Prioritization of critical risks makes sure we are focused on the most critical items that can cause the most exposure first.
From what I can tell this has gone in seamlessly and is easily managed by a small number of folks once setup.
I'm unsure of this overall measurement but it has definitely provided a vast improvement in Risk identification and mitigation.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We operate multiple vulnerability scanning technologies and vendors, for network, application, pentesting, external attack surface type scans. We also have multiple asset inventory sources. We needed a capability to aggregate (assets and vulnerabilities), assign remediation, and vulnerability/risk tracking metrics for compliance.
  • Connectors to asset or vulnerability source is very extensive
  • Development of new feature request has been very quick
  • Tagging and grouping logic helps to make complex environment manageable
  • Metrics related to aging of vulnerabilities to compliance
  • Exceptions for vulnerabilities to provide a group more time to remediate.
The effectiveness of connectors and speed to rollout was impressive. Works as advertised.
Vulnerability Management Tools (3)
70%
7.0
IT Asset Realization
80%
8.0
Configuration Monitoring
50%
5.0
Vulnerability Intelligence
80%
8.0
Threat Intelligence (4)
77.5%
7.8
Network Analytics
80%
8.0
Vulnerability Classification
80%
8.0
Automated Alerts and Reporting
70%
7.0
Automated Threat Identification
80%
8.0
  • Improvement on team efficiency to alert remediation teams of open vulnerabilities
The competitors were either more complex to implement or higher cost for similar capabilities.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Vulcan to get a clear picture of the vulnerabilities of our rapidly-growing organization and how they could actually affect us, as well as a perspective into how serious those vulnerabilities really are. Vulcan helps us make real-time decisions in terms of where to prioritize, what's a pressing issue, and it also gives us guidance into how to mitigate the risks of those vulnerabilities. We use Vulcan in all of our production, staging, and Dev environments to keep them updated and protected.
  • Alerting us to critical vulnerabilities
  • Prioritizing the patch tasks that are most time-sensitive
  • Providing a solution and roadmap to pressing issues
  • Auto-update feature could be streamlined
It's really challenging at times to contend with multiple vulnerabilities on a daily basis, and having a way to make sense of what actually needs to be prioritized and what can be shifted further down the task list is extremely helpful. Because the solution suggests what your next step should be in mitigating a specific vulnerability, it helps us save time and research by enabling us to immediately take action after being informed about an issue.
  • Securing the environment
  • Mitigating risks
  • Suggested solutions save time and research
  • Saving research hours for SecOps team
  • Saving resolution hours for Security Engineering team
  • Protecting the company from data breaches -- which could tremendously affect the business
  • IBM Resilient Security Orchestration and Automation and Response (SOAR)
Vulcan was easier to implement with our existing Security environment. The UX and UI were more intuitive and user-friendly. While SOAR is a super solid product, for our business Vulcan made more sense. It was more of a natural fit for a rapidly-expanding company in a hyper-growth phase using Edge technology.
Return to navigation