{"id":82335,"date":"2024-08-05T15:18:54","date_gmt":"2024-08-05T07:18:54","guid":{"rendered":"https:\/\/version-2.com\/?p=82335"},"modified":"2024-07-29T15:20:44","modified_gmt":"2024-07-29T07:20:44","slug":"runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/08\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/","title":{"rendered":"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"82335\" class=\"elementor elementor-82335\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p dir=\"ltr\"><em>runZero Receives the Highest Willingness to Recommend Rating 96%<\/em><\/p><p dir=\"ltr\"><strong>AUSTIN, TEXAS \u2014 July 22, 2024 \u2014 <\/strong>runZero has been peer recognized as a 2024 Customers\u2019 Choice in the <a href=\"https:\/\/www.runzero.com\/gartner-customer-choice-2024\/\" target=\"_blank\" rel=\"noopener\">Gartner\u00ae Peer Insights\u2122 Voice of the Customer for Cyber Asset Attack Surface Management (CAASM)<\/a> market category. Additionally, runZero received the highest willingness to recommend rating of any vendor at 96% based on 29 reviews as of 31st March 2024. <em>The \u201cVoice of the Customer\u201d is a document that synthesizes Gartner Peer Insights\u2019 reviews into insights for IT decision makers. This aggregated peer perspective, along with the individual detailed reviews, is complementary to Gartner expert research and can play a key role in your buying process, as it focuses on direct peer experiences of implementing and operating a solution.<\/em><\/p><p dir=\"ltr\">With 29 Gartner Peer Insights reviews, the most of any vendor included in the report, runZero received ratings from customers at organizations with annual revenues ranging from 50M to 10B+. Their feedback reflects real-world experiences with the runZero Platform across multiple sectors, including some of the world&#8217;s largest enterprises. Reviewers consistently rated runZero highly across various aspects: Product Capabilities (4.7\/5) based on 29 reviews, Support Experience (4.6\/5) based on 26 reviews, Sales Experience (4.7\/5) based on 25 reviews, and Deployment Experience (4.6\/5) based on 28 reviews. Here is a sampling of the individual reviews:<\/p><ul><li dir=\"ltr\"><p dir=\"ltr\">\u201c<a href=\"https:\/\/www.gartner.com\/reviews\/market\/cyber-asset-attack-surface-management\/vendor\/runzero\/product\/runzero\/review\/view\/5021356\" target=\"_blank\" rel=\"noopener\">An Excellent Inventory Tool.<\/a> As we say, you can&#8217;t secure what you can&#8217;t see, and I needed to know what was out there in a highly distributed environment that has 22 business lines, each with a high degree of disparity in their technology needs. From cameras, drones, ICS, SCADA, radios, non-traditional IoT devices, and traditional IT infrastructure. We&#8217;ve matured significantly in our asset inventory and event response because of this partnership and I think I&#8217;d have a mutiny on my hands if I ever took it away!&#8221; &#8211; IT Security and Risk Management in Government<\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\"><a href=\"https:\/\/www.gartner.com\/reviews\/market\/cyber-asset-attack-surface-management\/vendor\/runzero\/product\/runzero\/review\/view\/5020062\" target=\"_blank\" rel=\"noopener\">runZero is a great product for asset management<\/a>. One of the most standout features of runZero is its asset discovery capabilities. It&#8217;s really easy to deploy and it has a great accuracy during the scans. Also the speed of the scans are great, giving us the possibility to get results really fast and also accurate. Also its ability to map entire networks without any credentials is a great features. The product is really user friendly and has great ability to be used with APIs.&#8221; \u2013 Data Scientist in Software<\/p><\/li><\/ul><p>Many CAASM solutions in the market rely heavily on integrations to inventory assets, leading to incomplete visibility into unknown and unmanaged assets, while others focus solely on IT devices, lacking coverage for OT and IoT assets. The runZero Platform combines powerful proprietary active scanning and native passive discovery with integrations to overcome these limitations, providing a comprehensive, unified solution that delivers complete visibility and accurate, in-depth fingerprinting for all IT, OT, and IoT devices across on-prem, cloud, and remote environments. runZero does not require credentials, agents, or appliances, enabling the platform to start delivering insights into complex environments in just minutes.<\/p><p dir=\"ltr\">\u201cOur approach at runZero sets us apart from traditional CAASM companies. We\u2019re honored to have the market validate the unique path we\u2019ve taken and to be recognized as a Customers\u2019 Choice in our category,\u201d said HD Moore, founder and CEO at runZero. \u201cWe are passionate about improving visibility and exposure management for security teams, as well as streamlining their operations and accelerating response times. It\u2019s rewarding to see the success they are having and we appreciate their willingness to share their experience and recommend runZero to their peers.\u201d<\/p><p dir=\"ltr\">Disclaimer: <em>Gartner\u00ae and Peer Insights<\/em><em>\u2122<\/em><em> are trademarks of Gartner, Inc. and\/or its affiliates. All rights reserved. Gartner\u00ae Peer Insights<\/em><em>\u2122<\/em><em> content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.<\/em><\/p><p dir=\"ltr\"><strong>Additional resources<\/strong><\/p><ul><li dir=\"ltr\"><p dir=\"ltr\">Read the <a href=\"https:\/\/www.runzero.com\/gartner-customer-choice-2024\/\" target=\"_blank\" rel=\"noopener\">2024 Gartner\u00ae Peer Insights\u2122 Voice of the Customer Report for Cyber Asset Attack Surface Management<\/a><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\">Visit the <a href=\"https:\/\/www.runzero.com\/\" target=\"_blank\" rel=\"noopener\">runZero website to learn more<\/a><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\">Start a <a href=\"https:\/\/www.runzero.com\/try\/\" target=\"_blank\" rel=\"noopener\">free trial of the runZero Platform<\/a><\/p><\/li><li dir=\"ltr\"><p dir=\"ltr\">Schedule a <a href=\"https:\/\/www.runzero.com\/contact-sales\/\" target=\"_blank\" rel=\"noopener\">runZero Platform demo<\/a><\/p><\/li><\/ul><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>runZero Receives the Highest Willingness to Recommend R [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[976,1273,61],"tags":[977,1272],"class_list":["post-82335","post","type-post","status-publish","format-standard","hentry","category-runzero","category-1273","category-press-release","tag-runzero","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM) - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM) - Version 2\" \/>\n<meta property=\"og:description\" content=\"runZero Receives the Highest Willingness to Recommend R [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-05T07:18:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/newsroom\\\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM)\",\"datePublished\":\"2024-08-05T07:18:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/\"},\"wordCount\":737,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"runZero\",\"2024\"],\"articleSection\":[\"runZero\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/newsroom\\\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/08\\\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/newsroom\\\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/\",\"name\":\"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM) - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2024-08-05T07:18:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/newsroom\\\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/newsroom\\\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/newsroom\\\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM) - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/","og_locale":"en_US","og_type":"article","og_title":"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM) - Version 2","og_description":"runZero Receives the Highest Willingness to Recommend R [&hellip;]","og_url":"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/","og_site_name":"Version 2","article_published_time":"2024-08-05T07:18:54+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/08\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM)","datePublished":"2024-08-05T07:18:54+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/08\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/"},"wordCount":737,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["runZero","2024"],"articleSection":["runZero","2024","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/08\/runzero-recognized-as-a-customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/","url":"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/","name":"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM) - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2024-08-05T07:18:54+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/newsroom\/customers-choice-in-2024-gartner-peer-insights-report-for-cyber-asset-attack-surface-management-caasm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"runZero Recognized as a Customers\u2019 Choice in 2024 Gartner\u00ae Peer Insights\u2122 Report for Cyber Asset Attack Surface Management (CAASM)"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-lpZ","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/82335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=82335"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/82335\/revisions"}],"predecessor-version":[{"id":82339,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/82335\/revisions\/82339"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=82335"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=82335"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=82335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}