Capterra’s researchers use a mix of verified reviews, independent research and objective methodologies to bring you selection and ranking information you can trust. While we may earn a referral fee when you visit a provider through our links or speak to an advisor, this has no influence on our research or methodology.
Capterra carefully verified over 2 million reviews to bring you authentic software and services experiences from real users. Our human moderators verify that reviewers are real people and that reviews are authentic. They use leading tech to analyze text quality and to detect plagiarism and generative AI. Learn more.
Capterra lists all providers across its website—not just those that pay us—so that users can make informed purchase decisions. Capterra is free for users. Software and service providers pay us for sponsored profiles to receive web traffic and sales opportunities. Sponsored profiles include a link-out icon that takes users to the provider’s website. Learn more.
runZero provides asset inventory and network visibility for security and IT. Discover managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. runZero's secret sauce is its proprietary unauthenticated scanner that gathers more details than other solutions. Augment the inventory with integrations for MDMs, EDRs, cloud service providers, and virtual environments. runZero integrates well with SIEMs & CMDBs and deploys in minutes.
Provider
runZero
Located In
United States
Foundation
2018
Open API
Yes
Deployment
Cloud, SaaS, Web-Based, On-Premise Windows, On-Premise Linux
Training
Documentation, Videos
Support
Chat, Email/Help Desk, Knowledge Base, FAQs/Forum
runZero was built for organizations that need better visibility into modern network environments; enterprise IT, but also cloud, hybrid, legacy, virtual, operational, industrial, and clinical.
Content Source: runZero
Based on other buyer's searches, these are the products that could be a good fit for you.
runZero Reviews
Pros
Ease of operationAbility to accurately fingerprint assets with better contextUnauthenticated approach to asset discovery and fingerprinting.
First, it provides extremely accurate asset identification. Second, and probably even more important, is that all of the data gathered by scanning an asset is added to the database and can be queried.
The visibility that this tool provides is fantastic. It was an easy sell to me for features and an easy sell to my boss as far as cost.
I like the ease of deployment and the versatility of the agents. I'm running on multiple operating systems and hardware platforms and they all work amazing.
Cons
I am achieving this with multiple scan schedules. It is a minor complaint.
I initially index data in. Jsonl file with Elasticsearch (ES) It works well with a small dataset, but for large dataset, it fails miserably b/c of the number of fields in the jsonl file.
During the beta testing of the application the only grip I had was when the scanner would fall off line, you would have to start over. The devices it has already scanned would be lost.
No option for scanning for additional information with a password.
"Asset Discovery has never been easier"
Overall: Excellent overall.
Pros: Flexibility of deployment, the scanners can run on any platform or hardware. The speed of the scans and the accuracy of results are stupendous.
Cons: There are several options for scan frequency but I would like something between daily weekly like every 8 hours or every three days. I am achieving this with multiple scan schedules. It is a minor complaint.
Vendor Response
"Gain complete visibility and control of your network"
Overall: Outstanding. Professional from the start. Does what it says on the tin. Hands-free updates. Complete network, system, and service visibility.
Pros: Incredibly easy to acquire, install, and (securely) update. I have the agent installed on multiple nodes and had zero issues with any of them (even macOS Catalina systems with the new, invasive permissions structure). Via the web UX I have quick access to reports and current status. The data download makes it super easy to use in analytics environments. The service is constantly updated with new features and signatures, making it straightforward to identify new devices and services as they emerge. The alerting capability helped identify an IoT device that "went rogue" and installed a telnet service port without permission (that device is now in the town electronics recycling facility). It's one of the few IT and IT security products and services that did what it said on the tin Day 1 and continues to do so without any intervention on my part.
Cons: It's honestly difficult to find a serious flaw. Agent releases are paced and come with great features and bug fixes. I think, perhaps, one improvement could be to provide "prompts" or "coaxes" in the UX to help novice users (and those who do not have a steeped background in IT or security) identify ways they could use the service to better manage their infrastructure, identify issues, and be proactive.
Vendor Response
"Visibility to the blind spots "
Pros: Able to view the assets in the organisation
Cons: Enumeration of applications of the discovered assets
Vendor Response
"Assurance for the external attack surface"
Overall: We are using Rumble to provide an independent check of the services visible on our exposed external network surface, with both fast and slow/comprehensive scans. This provides assurance that network-level and server-level controls are configured appropriately.
Pros: It was easy to use Rumble for the targeted job of asset discovery, without having to consider the impact of most products' actual scope of vulnerability detection. By having to provide our own agent for the scanning endpoint, we remain in complete control of the source of the scans, and can integrate it into existing firewall and other protective technologies easily.
Cons: Analysing the changes over time isn't very easy in the current system, it highlights changes between current and last scan just fine but other periods are much more difficult. There aren't a lot of facilities for controlling the impact or utilisation of the agent on the scanning machine; I'd like to be able to judge just 'how fast' we can effectively scan from within Rumble's management.
Vendor Response
"Rumble is the way"
Overall: I can always see the inventory and when things are not being used. I can save on licensing and resources if the tools or software are not being turned on at all.
Pros: I like the simple interface and the speed with witch it discovers items on the network.
Cons: There could be some functionality added to allow easier interacting with the discovered devices. One click remote desktop or some way to add tools like NMap to a menu to further explore devices.
Vendor Response