---
description: Review of Cyrisma Software: system overview, features, price and cost information. Get free demos and compare to similar programs on Software Advice Ireland.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: Cyrisma | Reviews, Pricing & Demos - SoftwareAdvice IE
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](/directory/4286/vulnerability-management/software) > [Cyrisma](/software/371076/cyrisma)

# Cyrisma

Canonical: https://www.softwareadvice.ie/software/371076/cyrisma

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.ie/software/371076/cyrisma?page=2)

> CYRISMA provides a complete risk assessment and mitigation ecosystem to organizations via a unified platform. The cloud-delivered solution is easy to deploy and use, with capabilities for internal and external vulnerability scanning, data sensitivity scanning, secure configuration assessment, dark web monitoring, risk monetization and more.&#10;&#10;All features and capabilities are shipped out of the box, with no add-ons to purchase separately and no hidden costs.&#10;&#10;With enhanced visibility into their external attack surface, actionable recommendations to close security gaps, and the ability to plan and track mitigation activity, organizations can start seeing results almost as soon as the platform is deployed in their environments.&#10;&#10;Platform features include: &#10;- Vulnerability management&#10;- Sensitive data discovery&#10;- Secure configuration scanning&#10;- Dark web monitoring&#10;- Risk monetization&#10;- Risk mitigation&#10;- Cyber risk assessment reporting&#10;- Security scorecards&#10;- Compliance tracking&#10;&#10;Process:&#10;With CYRISMA, security teams can discover, understand, mitigate and manage their cyber risk more effectively, while reducing costs and complexity.&#10;- Discover tactical cybersecurity risks and vulnerabilities with vulnerability scans, sensitive data discovery, and secure configuration assessment. Find sensitive data, where it is stored, and which assets pose the greatest risk to a business.&#10;- Get a clear understanding of the organization's internal and external attack surface and security vulnerabilities by deep diving into scan and assessment results. Map the vulnerabilities identified to impacted assets and applications, and understand the root cause of security issues, their severity, and remediation options and priorities.&#10;- Mitigate the vulnerabilities identified during the scanning and assessment process with actionable recommendations for remediation, and the ability to assign mitigation tasks to either IT and security teams or end users from non-IT departments. Mitigation plans include start and end dates and the users responsible for specific mitigation tasks, making it easy to track progress and establish accountability.
> 
> Verdict: Rated **4.5/5** by 6 users. Top-rated for **Likelihood to recommend**.

-----

## Quick Stats & Ratings

| Metric | Rating | Detail |
| **Overall** | **4.5/5** | 6 Reviews |
| Ease of Use | 4.7/5 | Based on overall reviews |
| Customer Support | 4.7/5 | Based on overall reviews |
| Value for Money | 4.8/5 | Based on overall reviews |
| Features | 4.5/5 | Based on overall reviews |
| Recommendation percentage | 90% | (9/10 Likelihood to recommend) |

## About the vendor

- **Company**: CYRISMA

## Commercial Context

- **Pricing model**:  (Free Trial)
- **Pricing Details**: - Priced per endpoint (desktop/laptop/server)&#10;- Base Currency - USD&#10;- For other currencies supported, contact CYRISMA&#10;- Payment Frequency - Per Month or Annual
- **Target Audience**: Self Employed, 2–10, 11–50, 51–200, 201–500, 501–1,000, 1,001–5,000, 5,001–10,000, 10,000+
- **Deployment & Platforms**: Cloud, SaaS, Web-based
- **Supported Languages**: English
- **Available Countries**: Afghanistan, Albania, Algeria, American Samoa, Andorra, Angola, Argentina, Armenia, Australia, Austria, Azerbaijan, Bahrain, Bangladesh, Belarus, Belgium, Benin, Bhutan, Bolivia, Bosnia & Herzegovina, Botswana and 172 more

## Features

- Activity Monitoring
- Configuration Management
- Data Security
- Endpoint Protection Software
- Goal Setting/Tracking
- Monitoring
- Prioritisation
- Risk Management
- Rules-Based Workflow
- SQL Injections
- Threat Response
- Vulnerability Assessment
- Vulnerability Management
- Vulnerability Scanning
- Vulnerability/Threat Prioritization

## Support Options

- Email/Help Desk
- FAQs/Forum
- Knowledge Base
- Phone Support
- Chat

## Category

- [Vulnerability Management Software](https://www.softwareadvice.ie/directory/4286/vulnerability-management/software)

## Related Categories

- [Vulnerability Management Software](https://www.softwareadvice.ie/directory/4286/vulnerability-management/software)
- [Network Security Software](https://www.softwareadvice.ie/directory/4170/network-security/software)
- [Cybersecurity Software](https://www.softwareadvice.ie/directory/4643/cybersecurity/software)
- [Configuration Management Tools](https://www.softwareadvice.ie/directory/4653/configuration-management/software)
- [Risk Management Software](https://www.softwareadvice.ie/directory/4423/risk-management/software)

## Alternatives

1. [Pirani](https://www.softwareadvice.ie/software/122791/pirani-riskment-suite) — 4.5/5 (203 reviews)
2. [Wrike](https://www.softwareadvice.ie/software/3777/wrike-pm) — 4.4/5 (2887 reviews)
3. [D\&B Finance Analytics](https://www.softwareadvice.ie/software/246735/dandb-finance-analytics) — 4.5/5 (137 reviews)
4. [MasterControl Quality Excellence](https://www.softwareadvice.ie/software/142000/mastercontrol) — 4.5/5 (526 reviews)
5. [GOAT Risk](https://www.softwareadvice.ie/software/105558/goatrisksolutions) — 4.7/5 (65 reviews)

## Reviews

### "Cyrisma Risk Management Solution" — 5.0/5

> **Sanga** | *11 November 2022* | Information Technology & Services | Recommendation rating: 10.0/10
> 
> **Pros**: The Solution capability pick up results soon.The mitigation planning capability of the solution.The way the solution supports the consultant by providing free agents.The granularity in the result know the path of the vulnerability while mitigating.
> 
> **Cons**: The solution is till maturing and when compared to big solution is still need to sometime to be compared with them but anytime it is value for money.
> 
> It is been really smooth and happy journey with Cyrisma

-----

### "Its all right there\!" — 5.0/5

> **Kenneth** | *11 November 2022* | Hospital & Health Care | Recommendation rating: 10.0/10
> 
> **Pros**: The speed at which scans are completed,  all of the information is displayed in a format and location where I am not searching to see relevant information about my vulnerability scans.
> 
> **Cons**: none, maybe the orange an blue color scheme.
> 
> They are a model of a customer support, any time I have had a question it was answered with professionalism and timely.

-----

### "A bit rugged, but gets the job done\!" — 3.0/5

> **Kyle** | *9 September 2024* | Automotive | Recommendation rating: 5.0/10
> 
> **Pros**: the price of Cyrisma is unbeatable.  You can get everything for very cheap compared to everyone else in the industry.
> 
> **Cons**: Using the platform is a little bit cumbersome.  The UI isn't the greatest, and the layout is pretty bad.
> 
> There are a lot of cons,  but for a small business that needs to meet compliance it will get the job done.

-----

### "Cyrisma Review" — 5.0/5

> **Andy** | *14 November 2022* | Information Technology & Services | Recommendation rating: 10.0/10
> 
> **Pros**: - Easy to use- Easy to set up- Informative- White Labling
> 
> **Cons**: - Sometimes initial agent installs do not report back to the Instance when setting up scan targets- Support can take some time to respond back ( understandable as they are busy )- Agents don't auto-update sometimes which causes them to fail scans ( easy fix is to just reinstall)
> 
> Cyrisma provides the best information when scanning for vulnerabilities. It really gives actionable information allowing my team to provide the fastest remediation when new vulnerabilities are found.

-----

### "Cyrisma Vulnerability Management" — 5.0/5

> **Paul** | *10 November 2022* | Information Technology & Services | Recommendation rating: 8.0/10
> 
> **Pros**: Regardless of the environment we are trying to scan, it's easy to come up with a deployment and scanning plan to ensure we are scanning all assets in the environment with little to no impact on performance to the end users from both an endpoint and network perspective.  Scan reports identify root cause saving us from having to comb through hundreds of pages of data or building massive pivot tables to identify issues.
> 
> **Cons**: We run into bugs in the UI from time to time.  These are usually handled very quickly when reported to the Cyrisma team

-----

Page: 1 / 2\
Next: [Next page](https://www.softwareadvice.ie/software/371076/cyrisma?page=2)

## Links

- [View on SoftwareAdvice](https://www.softwareadvice.ie/software/371076/cyrisma)

## This page is available in the following languages

| Locale | URL |
| en | <https://www.softwareadvice.com/network-security/cyrisma-profile/> |
| en-AU | <https://www.softwareadvice.com.au/software/371076/cyrisma> |
| en-GB | <https://www.softwareadvice.co.uk/software/371076/cyrisma> |
| en-IE | <https://www.softwareadvice.ie/software/371076/cyrisma> |
| en-NZ | <https://www.softwareadvice.co.nz/software/371076/cyrisma> |

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"SoftwareAdvice Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"We've helped more than 500000 buyers to find the right software.","email":"info@softwareadvice.ie","url":"https://www.softwareadvice.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/software_advice/logo-white-d2cfd05bdd863947d19a4d1b9567dde8.svg","@id":"https://www.softwareadvice.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":[]},{"name":"Cyrisma","description":"CYRISMA provides a complete risk assessment and mitigation ecosystem to organizations via a unified platform. The cloud-delivered solution is easy to deploy and use, with capabilities for internal and external vulnerability scanning, data sensitivity scanning, secure configuration assessment, dark web monitoring, risk monetization and more.\n\nAll features and capabilities are shipped out of the box, with no add-ons to purchase separately and no hidden costs.\n\nWith enhanced visibility into their external attack surface, actionable recommendations to close security gaps, and the ability to plan and track mitigation activity, organizations can start seeing results almost as soon as the platform is deployed in their environments.\n\nPlatform features include: \n- Vulnerability management\n- Sensitive data discovery\n- Secure configuration scanning\n- Dark web monitoring\n- Risk monetization\n- Risk mitigation\n- Cyber risk assessment reporting\n- Security scorecards\n- Compliance tracking\n\nProcess:\nWith CYRISMA, security teams can discover, understand, mitigate and manage their cyber risk more effectively, while reducing costs and complexity.\n- Discover tactical cybersecurity risks and vulnerabilities with vulnerability scans, sensitive data discovery, and secure configuration assessment. Find sensitive data, where it is stored, and which assets pose the greatest risk to a business.\n- Get a clear understanding of the organization's internal and external attack surface and security vulnerabilities by deep diving into scan and assessment results. Map the vulnerabilities identified to impacted assets and applications, and understand the root cause of security issues, their severity, and remediation options and priorities.\n- Mitigate the vulnerabilities identified during the scanning and assessment process with actionable recommendations for remediation, and the ability to assign mitigation tasks to either IT and security teams or end users from non-IT departments. Mitigation plans include start and end dates and the users responsible for specific mitigation tasks, making it easy to track progress and establish accountability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/af174f26-c7e6-4030-8cab-a5966a37d53e.png","url":"https://www.softwareadvice.ie/software/371076/cyrisma","@id":"https://www.softwareadvice.ie/software/371076/cyrisma#software","@type":"SoftwareApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"applicationCategory":"BusinessApplication","aggregateRating":{"@type":"AggregateRating","ratingValue":4.5,"bestRating":5,"ratingCount":6},"operatingSystem":"Cloud"},{"@id":"https://www.softwareadvice.ie/software/371076/cyrisma#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"/directory/4286/vulnerability-management/software","@type":"ListItem"},{"name":"Cyrisma","position":3,"item":"/software/371076/cyrisma","@type":"ListItem"}]}]}
</script>
