My major interest is in getting signal intelligence, risk vectors, and detailed information that BitSight collects around the attack surface of a company. We integrate this information with our overall cyber detection and counter-response strategy.
Retired at a media company with 1-10 employees
Comprehensive risk vectors and detailed anomaly insights enhance cyber hygiene
Pros and Cons
- "The best thing about BitSight is the comprehensive list of risk vectors, covering compromised systems, diligence failures, and behavioral anomalies."
- "BitSight could improve the classes and lower-level detections of anomalies that compound the information used to compute the rating."
What is our primary use case?
How has it helped my organization?
All our employees benefit from the information, not directly through BitSight, but through our own security analytics platform. As CISO, one of our objectives was cyber hygiene, and the major provider of metrics for cyber hygiene was BitSight.
What is most valuable?
The best thing about BitSight is the comprehensive list of risk vectors, covering compromised systems, diligence failures, and behavioral anomalies. The ability to drill down from a score to very detailed factual information about anomalies is valuable. They have a good web portal for users to access, a good API for system integration, and a comprehensive pricing structure.
What needs improvement?
BitSight could improve the classes and lower-level detections of anomalies that compound the information used to compute the rating. They could evolve to be a more powerful scanner of cyber hygiene for a company's exposed attack surface, allowing them to compete with companies like Qualys and CyCognito. It's important to ensure a correlation between the score and detailed information to avoid confusion.
Buyer's Guide
Bitsight
April 2026
Learn what your peers think about Bitsight. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
886,664 professionals have used our research since 2012.
For how long have I used the solution?
We have been using this solution since 2016, about eight years.
What do I think about the stability of the solution?
BitSight is completely stable. As with any platform, when they update or fine-tune the rating algorithm, there may be changes in rating. That said, this is normal.
What do I think about the scalability of the solution?
BitSight is scalable, and there are no issues surrounding its scalability.
How are customer service and support?
The technical support from BitSight was very good. I was a privileged customer as BitSight's technical office was based in Lisbon, allowing personal connections. It was perfect for me, but other customers might not have the same experience.
How was the initial setup?
The initial setup is straightforward for a normal company. For telcos, there is some additional work required to clean up the attack surface, however, it's still pretty easy. You can start almost plug-and-play and then make necessary adjustments through their portal.
Which other solutions did I evaluate?
I am currently evaluating the possibility of also using SecurityScorecard in a similar manner.
What other advice do I have?
BitSight is still better than SecurityScorecard, and those two are completely separated from the rest of the market. For us, BitSight is better.
I'd rate the solution nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cybersecurity Customer Service Manager and Technical Account Manager at Cybersel
Simple to use and has an easy initial setup process
Pros and Cons
- "Its customer service team responds quickly."
- "Its factor analysis feature could be better."
What is our primary use case?
We use the solution for monitoring the supply chain and security performance management.
What is most valuable?
The solution's most valuable feature is third-party risk management. It provides the best capabilities to retrieve information on the security posture of third-party applications without any impact on our vendors' business processes.
What needs improvement?
The solution's factor analysis feature could be better.
For how long have I used the solution?
We have been using the solution since 2020.
What do I think about the stability of the solution?
I rate the solution's stability a ten.
What do I think about the scalability of the solution?
We have over 150 solution users as our customers. They are SMBs and enterprises.
How are customer service and support?
The solution's customer service team responds quickly.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution's initial setup is easy. I rate it a ten.
What's my experience with pricing, setup cost, and licensing?
The solution's price is average.
What other advice do I have?
I recommend the solution to others. It is simple to use, is very immediate, and has a return on investment. I rate it a ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Bitsight Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2026
Popular Comparisons
CrowdStrike Falcon
TrendAI Vision One
Cymulate
Qualys CyberSecurity Asset Management
RSA Archer
Axonius
OneTrust GRC
Amazon Inspector
Mandiant Advantage
AuditBoard
SecurityScorecard
Cybersixgill
Microsoft Defender External Attack Surface Management
ImmuniWeb
ProcessUnity
Buyer's Guide
Download our free Bitsight Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is your recommended automated audit software for internal and external audit?
- Vulnerability Management and Risk Management Integration
- What vendor risk management software do you recommend?
- What is the best solution for comprehensive Risk Management in financial services?
- What is the difference between SOC 1, SOC 2, and SOC 3 compliance?
- When evaluating IT Vendor Risk Management, what aspect do you think is the most important to look for?
- Which enterprise threat modeling tool do you recommend?
- What is Security Posture and what categories of Security Posture Management do exist?
- How many ISO norms do we have in the entire ISO27k security family standards?
- What should an enterprise risk management plan and strategy include in 2022?

















