AIMultiple ResearchAIMultiple Research

Top 10 DAST Tools in 2024: Analysis of 500+ Reviews

Updated on Jun 3
14 min read
Written by
Cem Dilmegani
Cem Dilmegani
Cem Dilmegani

Cem is the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per Similarweb) including 60% of Fortune 500 every month.

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity(including network security, application security), data collection including web data collection and process intelligence.

View Full Profile
Researched by
Altay Ataman
Altay Ataman
Altay Ataman
Altay is an industry analyst at AIMultiple. He has background in international political economy, multilateral organizations, development cooperation, global politics, and data analysis.

He has experience working at private and government institutions. Altay discovered his interest for emerging tech after seeing its wide use of area in several sectors and acknowledging its importance for the future.
View Full Profile
Technically reviewed by
Adil Hafa
Adil Hafa
Adil Hafa
Adil is a security expert with over 16 years of experience in defense, retail, finance, exchange, food ordering and government.

Currently, Adil is the Chief Information Security Officer at Ödeal, a regional digital payment platform. Ödeal serves 125,000 merchants with its software and hardware based POS solutions.
View Full Profile

Dynamic Application Security Testing (DAST) tools safeguard web applications by identifying and mitigating security vulnerabilities in applications during their operational phase. As cyber threats continually evolve, the selection of an appropriate DAST tool is critical for organizations keen on maintaining a robust security posture.

With 20+ DAST tools available in the market, choosing the right tool can be a complex undertaking. This article aims to shed light on contemporary DAST solutions, focusing on their capabilities, efficiency, popularity, and integration within existing security frameworks.

The solutions below include paid and free DAST solutions that can serve businesses. If you are only looking for free solutions, check out free DAST tools.

Top 10 DAST tools compared

VendorsBest For*Reviews**Free Trial***EmployeesPrice
Invicti Web application scanning4.6 based on 72 reviews300Not shared publicly
PortSwigger Burp SuitePentesting4.8 based on 136 reviews190
From $449 to $49,000 per year (Professional edition, per person vs Enterprise edition.) Also has a free “community” version.
OWASP ZAP (Zed Attack Proxy)
4.7 based on 14 reviews Open SourceN/A****Open Source
Tenable Nessus ProfessionalNetwork scanning and security4.6 based on 357 reviews✅ (7-day)2,100
Tenable Nessus has 3 pricing edition(s), from $3,590 to $5,290 annually.
Mobile app scanning4.6 based on 27 reviews900Not shared publicly
Indusface WAS 4.5 based on 50 reviews✅ (14-day)150
Has a free “basic” plan. Advanced plan, priced at $59 per month. A premium plan at $199 per month.
Contrast Assess
4.5 based on 49 reviews300Not shared publicly
InsightVM Rapid7
4.4 based on 94 reviews ✅ (30-day) 2,700

Pricing is asset-based (at least 512 assets​).1

Checkmarx DAST
4.2 based on 33 reviews130Not shared publicly
HCL AppScan4.1 based on 49 reviews✅ (30-day)10,000Not shared publicly

* Based on technical reviewer’s experience. Within each vendor’s section, AIMultiple team outlined our rationale for this selection.

** Reviews are based on Capterra and G2.

*** Free trial period is included if it is publicly shared.

**** Community-driven, non-profit foundation

Sorting: AIMultiple’s sponsors are listed at the top and have links to their websites. Other vendors are ranked according to their average rating.

Differentiating features of selected tools

VendorIntegration with SIEM toolsTicketing tool integrationsDeployment optionsXSS DetectionSQL injection detectionOAuth 2.0 integration
Invicti SplunkBuilt-in, Jira, ServiceNow On-Prem, Cloud, Hybrid
PortSwigger Burp Suite
Built-in, JiraOn-Prem, Cloud, Hybrid
Tenable Nessus ProfessionalSplunk, IBM QRadar, McAfee ESMBuilt-in, Jira, ServiceNow On-Prem, Cloud, Hybrid
NowSecureJiraOn-Prem, Cloud
Indusface WAS
Sumo Logic, RSA, Splunk, McAfee ESMCloud
Contrast Assess
Azure Sentinel, Datadog, Splunk, Sumo Logic Jira On-Prem, Cloud, Hybrid
InsightVM Rapid 7Splunk, McAfee ESM,Sumo LogicBuilt-in, Jira, ServiceNowOn-Prem, Cloud, Hybrid
Checkmarx DAST
SplunkJira, ServiceNowOn-Prem, Cloud, Hybrid
HCL AppScan
IBM Security QRadarJira, ServiceNowOn-Prem, Cloud, Hybrid

To understand why these differentiating features are important, check the definitions and significance of each feature.

Top DAST tools analyzed

Invicti: Best for Web Application Scanning

Invicti’s Dynamic Application Security Testing (DAST) tool is designed for enterprise-level web application security. It focuses on automating security tasks within the Software Development Life Cycle (SDLC), offering capabilities like identifying critical vulnerabilities and integrating them for remediation. 

The tool aims to provide a comprehensive view of application security, leveraging a dynamic and interactive scanning approach (DAST + IAST) to find vulnerabilities other tools might miss. Invicti emphasizes scalability, allowing teams to manage risks effectively, even in complex infrastructures, and integrates into existing systems and workflows to enhance productivity and security.

Invicti’s DAST solution’s deployment is on-prem, public or private cloud and hybrid. Additionally, Invicti provides Web Application Firewall and Oauth 2.0 integration. It is best known for web application security scanning with capabilities for scanning internal or external websites.


  • Capterra: 4.7 based on 18 reviews1
  • G2: 4.5 based on 54 reviews2


  • Users argue that some of the most promising features of Invicti are its ability to confirm access vulnerabilities, SSL injection vulnerabilities, and its connectors to other security tools. 3
  • Users argue that Invicti’s baseline scanning and incremental scan are valuable features.4
  • Users state that Invicti’s proof-based scanning is impressive and it helps them reduce their time and focus on finding vulnerabilities.5


  • Some users have cited that the solution’s false positive analysis and vulnerability analysis libraries could be improved. 6
  • Some users expressed recommendations about raising the specificity of the reports generated by the tool. 7
  • Some users argue that the licensing model could be improved to be more cost-effective. 8

PortSwigger Burp Suite: Best for Pentesters

PortSwigger’s Burp Suite is a tool designed for web security testing, with a focus on both automated and manual Dynamic Application Security Testing (DAST). Additionally, Burp Suite incorporates other methods like out-of-band testing (OAST) to enhance its DAST capabilities. Burp Suite is available in different editions, including the Professional, Enterprise, and Community editions, each tailored to specific needs and scales of operation.

PortSwigger is known for its suitability for professionals who seek to enhance their penetration testing. The UI may be complex for users who lack technical expertise. The community edition can help scan or crawl web apps internally or externally, while the paid version provides additional capabilities for enterprises that seek a more complex tool.


  • Capterra: 4.8 based on 24 reviews9
  • G2: 4.8 based on 112 reviews10


  • The solution is noted for its straightforward and simple setup process, as mentioned by multiple reviewers​. 11
  • The tool is noted for its accuracy in comparison to other solutions, reporting fewer false positives.12
  • The automated scan feature is particularly useful for customers needing basic security assurance.13


  • Some users noted stability issues, particularly in terms of high memory usage during scanning. 14
  • Some users feel that it could offer better integration with tools like Jenkins for automating dynamic application security testing (DAST).15
  • There are concerns about the quality of reporting, with some finding it not very informative.16


OWASP ZAP (Zed Attack Proxy) is an open-source DAST tool designed to identify security vulnerabilities in web applications. It acts as a man-in-the-middle proxy, which allows it to intercept and inspect messages sent between a browser and a web server to find security holes in real time, making it a popular choice for developers and testers to secure their web applications.


Capterra: 5.0 based on 3 reviews 17

G2: 4.7 based on 11 reviews 18


  • Users argue that the tool is easy to use, especially for an open-source tool.19.
  • Users argue that OWASP ZAP is highly customizable, and integrations are easy. 20


  • Some users argue that it takes a considerable amount of time when anaylzing big applications.21.
  • Users argue that OWASP ZAP lacks certain features and automation capabilities are not always up to par with other web scanning applications22

Tenable Nessus Professional: Best for Network scanning and Security

Tenable Nessus Professional is a security tool tailored for scanning vulnerabilities, detecting misconfigurations, and identifying possible security threats across network systems. It conducts thorough vulnerability assessments through both evaluative and agentless scans. For Nessus Professional, multi-year subscriptions are available, encompassing enhanced support services such as telephone, community forums, and live chat assistance.

Tenable Nessus has a more expensive version, Tenable Nessus Expert that adds features such as web application scanning and external attack surface scanning.

We discussed the pricing of dast tools and more in the “DAST Pricing: Comparison of Vendor’s Fees” article.


Capterra: 4.7 based on 84 reviews23

G2: 4.5 based on 273 reviews24


  • Users report that the tool features a user-friendly graphical interface and boasts superior detection capabilities.25
  • Users acknowledge that Nessus provides satisfactory customer support and highlight its dual implementation approach, which includes both agent-based and credentials-based solutions.26
  • Users note that the tool’s plugins receive frequent updates to incorporate the most recent vulnerabilities, along with recommendations for remediation.27


  • Some users have mentioned experiencing variability in both the duration of scans and the consistency of results with the tool.. 28
  • Some users have reported that retrieving reports over an extended timeframe can be time-consuming, indicating that both the scanning and reporting processes require a significant amount of time.29

If you have already using Tenable Nessus and looking for alternatives, you can read our article “Tenable Nessus Alternatives”.

NowSecure: Best for Mobile App Scanning

NowSecure DAST is a tool designed for the testing of mobile applications. It integrates various testing methods, including static, dynamic, and interactive analyses, to provide a view of the security posture of mobile applications. NowSecure does not provide web application testing; it is a tool focused only on mobile application testing.

Since the mobile app scanning market is limited, few tools are focused solely on mobile app scanning. NowSecure could be a suitable option for businesses that

  • Test only mobile applications.
  • Can afford a dedicated tool for mobile app scanning.


  • Capterra: N/A
  • G2: 4.6 based on 27 reviews30


  • Users cite that the platform is easy to integrate and has an intuitive interface. 31
  • Some users argue that reporting capabilities of the tool are impressive. 32


  • Some users cite that testing can be complex and require manual intervention. Additionally, the cost of the service can be a challenge for smaller companies.33
  • Some users argue that customization options are not widely available.34

Indusface WAS 

The Indusface DAST tool is part of the Indusface Web Application Scanning (WAS) suite, designed to identify web application security vulnerabilities during runtime by simulating external attacks. This suite is an all-in-one solution for application security testing and vulnerability scanning, including cloud-based Web Application Firewall (WAF) features. Indusface WAS cannot be deployed on prem, which could be seen as a negative if users wish to avoid using cloud services.

  • Capterra: N/A
  • G2: 4.5 based on 50 reviews35


  • Users cite that the tool is capable of running complex workloads. 36
  • Users state that the tools have quick support and timely responsiveness, also stating that the team is knowledgeable and efficient.37


  • Some users argue that the time-out time after inactivity in the portal can be longer.38
  • Some users argue that the portal’s user interface can be made more intuitive and informative for the user, citing concerns that the design looks dated. 39

Contrast Assess

Contrast Security’s tool, known as Contrast Assess, is an application security testing tool primarily using the Interactive Application Security Testing (IAST) approach. Contrast Assess employs an agent that instruments applications with sensors. These sensors analyze data flow in real-time and assess the application from within, providing insights into vulnerabilities in libraries, frameworks, custom code, configuration information, runtime control, data flow, HTTP requests and responses, and back-end connections.


  • Capterra: N/A
  • G2: 4.5 based on 49 reviews40


  • Users state that Contrast Asses is a stable solution.41
  • Users state that the solution is accurate in identifying vulnerabilities. Multiple users also noted that the real-time code evaluation feature is helpful.42


  • Users have argued that the solution should provide more details in the section showing that third-party libraries have CVEs or some vulnerabilities.43
  • Some users cite their concern about the scalability of the solution. 44

InsightVM Rapid 7: Best for Tracking Vulnerabilities and Exploitation

InsightVM from Rapid7 is designed as a vulnerability management solution to detect potential threats in IT environments. It utilizes Rapid7’s vulnerability research, insights into global attacker activities, and comprehensive internet scanning data.

It also includes integration with Rapid7’s Metasploit to confirm exploits. The platform provides capabilities like real-time monitoring and evaluations of cloud, virtual, and container assets, which makes it adaptable for varied and evolving IT settings. This integration also makes it a suitable option for penetration testing. InsightVM has strong SIEM, tracking of vulnerabilities, and live observation with endpoint agents.


Capterra: 4.4 based on 17 reviews.45

G2: 4.4 based on 77 reviews.46


  • Users find the agent-based platform of the tool beneficial as it allows them to concentrate on making enhancements while managing underlying dependencies with ease. 47
  • Users argue that the tool clearly highlights vulnerabilities and prioritizes remediation efforts, making it extremely useful for managing vulnerabilities and patches.48
  • Users suggest that the tool’s approach, which uses real risk scores, along with features like agent and engine support, SCCM-assisted patching, hardening checks, remediation projects, and SLAs, is highly effective.. 49


  • Some users mention that the tool occasionally consumes a lot of memory. 50
  • Some users criticize the tool for having an immature and inconsistent graphical user interface (GUI), and they also find the query builder to be limited.51
  • Users point out that bugs in complex vulnerability checks sometimes take a long time to resolve. They also mention that setting up reports to be concise can be challenging.52

Checkmarx DAST

Checkmarx DAST is a tool designed for identifying vulnerabilities and security flaws in web applications and APIs. It simulates real-world attacks to find vulnerabilities during runtime, integrating with CI/CD processes for continuous testing. 

Checkmarx DAST detects server/database misconfigurations, authentication, and encryption issues. It offers real-time analysis, accuracy in identifying legitimate vulnerabilities, comprehensive coverage across web applications and API frameworks, easy integration with existing workflows, and detailed reporting and analytics. 


  • Capterra: N/A 
  • G2: 4.2 based on 33 reviews53


  • Users argue that Checkmarx finds noticeably higher vulnerabilities than free tools.54
  • Some users argue that the centralized reporting functionality is a great feature and aids them with tracking issues.55


  • Some users have reported that Checkmarx has a slightly difficult compilation with the CI/CD pipeline. 56
  • Some users have reported that The interactive application security testing (IAST) part needs improvement.57

HCL AppScan

HCL AppScan offers a range of security testing tools designed to protect businesses and their customers from cyber-attacks. The AppScan suite includes several products (AppScan on Cloud, AppScan 360, AppScan Standard, AppScan Source, and AppScan Enterprise).  

Key features of HCL AppScan include its dynamic analysis (DAST), static analysis (SAST), and interactive application security testing (IAST). Other notable features include integration capabilities with various development and deployment environments, regulatory compliance reporting, and customization through the AppScan Extension Framework. 


  • Capterra: N/A
  • G2: 4.1 based on 59 reviews58


  • Users argued that HCL AppScan has a quick feature request response, ease of use for developers, and effective vulnerability detection with severity grading.59


  • Users argued that HCL AppScan’s dashboard needs improvement, has limited integration with certain container technologies, challenges in CI/CD integration and scalability issues due to licensing restrictions. 60

Why are the differentiating features important?

Integration with SIEM Tools

SIEM (Security Information and Event Management) systems analyze real-time security alerts from network devices and applications. Integrations with them are valuable for DAST tools as they provide a centralized view for monitoring and responding to security threats detected during dynamic scans.

Ticketing Tool

In the context of DAST tools, a ticketing tool is an integrated or connected system that helps manage and track issues found during security tests. For example, when a DAST tool identifies a vulnerability, such as SQL injection or cross-site scripting (XSS), it can automatically create tickets for these issues within the ticketing tool. This helps organizations track the status of each vulnerability from discovery to resolution.


On-Prem Deployment

On-prem DAST tools are installed and managed within an organization’s own infrastructure. This model provides the highest level of control over the security and maintenance of the tools and the data they process. It’s particularly beneficial for industries with stringent compliance requirements, such as financial services, healthcare, and government sectors. These organizations often require full oversight of their security tools due to the sensitive nature of their data.

While this deployment model can lead to higher upfront costs due to the necessary investment in hardware and personnel, it offers reduced latency and potentially higher performance, essential for organizations with large, complex applications.

Cloud-Based Deployment

Cloud-based DAST solutions are hosted on the provider’s servers and accessed over the internet. This model offers scalability, allowing organizations to easily increase or decrease their testing capacity based on current needs without the need for physical infrastructure changes.

It is cost-effective as it typically operates on a subscription basis, eliminating large upfront investments and ongoing hardware maintenance costs. Cloud deployment also enhances accessibility, enabling security teams to conduct tests from anywhere, which is an advantage for companies with remote teams or multiple locations. However, it involves trusting a third-party provider with sensitive data, which may not be suitable for all types of businesses.

Hybrid Deployment

Hybrid deployment models combine on-prem and cloud-based components. Hybrid models provide flexibility in data handling and tool deployment, enabling sensitive data to be processed on-premises while less critical operations can be managed in the cloud. This approach helps balance the need for control and customization with the benefits of scalability and cost reduction.

XSS Detection

Cross-site scripting (XSS) detection is a crucial feature for DAST tools due to the prevalence and impact of XSS vulnerabilities in web applications. XSS vulnerabilities exploit how browsers parse HTML and JavaScript, enabling attackers to inject malicious scripts into web pages viewed by other users. This can lead to various security breaches, including data theft, session hijacking, and malicious redirection, thereby compromising user trust and data integrity.

The complexity and variability of XSS attacks necessitate sophisticated detection mechanisms. DAST tools address this need by actively testing web applications from an outside perspective, mimicking the actions of a potential attacker. By simulating attempts to exploit XSS and other vulnerabilities, DAST tools help organizations identify and mitigate security risks promptly, maintaining the security and integrity of their web applications. This capability is integral to ensuring the comprehensive security coverage needed in today’s cybersecurity landscape.

SQL injection detection

SQL Injection detection is a critical capability for Dynamic Application Security Testing (DAST) tools due to the severe impact SQL Injection attacks can have on an organization. These attacks allow an attacker to interfere with the queries that an application makes to its database, potentially enabling unauthorized viewing of user lists, deletion of entire tables, and, in some cases, gaining administrative rights to a database system.

Given the ubiquity of SQL databases in web applications and the potential for significant data breaches or loss, the ability to detect SQL Injection vulnerabilities early in the software development lifecycle is imperative. By simulating attack patterns used in SQL Injection, DAST tools can identify vulnerable spots in applications where unsanitized user input might be incorrectly executed as SQL commands, thereby helping to prevent potential exploits.

OAuth 2.0 integration

OAuth 2.0 integration in DAST tools is pivotal for assessing the security of modern web applications that utilize this standard for delegated authorization. By simulating authenticated sessions and testing the application’s OAuth 2.0 implementation, DAST tools can uncover vulnerabilities in authorization flows, token handling, and other critical areas that could lead to unauthorized data access or breaches.

This integration ensures that DAST tools can effectively evaluate the security of applications in real-world scenarios, where OAuth 2.0 plays a fundamental role in user authentication and access control, thereby maintaining the integrity and confidentiality of sensitive information in an increasingly interconnected digital landscape.

Core features of DAST tools

Core Features of DAST Tools

Vulnerability Scanning

DAST tools automatically scan web applications for a wide range of known vulnerabilities such as SQL Injection, Cross-Site Scripting (XSS), and Cross-Site Request Forgery (CSRF). They use automated techniques to send various inputs to the application and observe the responses to detect potential vulnerabilities.

For an in-depth look at vulnerability scanning:

Dynamic Crawling

DAST tools can dynamically crawl through the application, automatically discovering content and functionality. This includes navigating through forms, links, and other interactive elements to map out the application’s structure and identify potential attack surfaces.

API Coverage

API coverage in DAST tools is vital because APIs are often the backbone of modern web applications, serving as gateways to functionalities and data. As such, they are a prime target for security breaches. Comprehensive API coverage in DAST ensures that potential vulnerabilities are identified and remediated before they can be exploited, enhancing the application’s overall security posture.

Security Reporting

After scanning, DAST tools generate detailed reports highlighting the vulnerabilities discovered, including their severity and potential impact, and often provide guidance on how to remediate the issues. This is crucial for developers and security teams to prioritize and address security weaknesses.

Authentication Handling

Many DAST tools can handle authenticated sessions, allowing them to test parts of the application that are only accessible after logging in effectively. This feature is critical for thoroughly testing applications with user-specific functionality or restricted areas.

How did we choose the top DAST tools?

In our evaluation of the top DAST tools, we used two publicly accessible criteria in addition to features of these tools:

  • Employee Count: Recognizing the link between a company’s revenue and its workforce size, our attention was on firms with a workforce exceeding 100.
  • Reviews on B2B Platforms: We favored solutions that had feedback from at least 10 users on B2B review platforms like G2 and Capterra, as this reflects market presence based on actual user experiences.

What is a DAST Tool?

DAST tools are application security solutions that detect vulnerabilities in web applications while running in a live environment. They simulate attacks from a malicious user’s perspective to identify potential security issues. They can also be considered a part of vulnerability scanning tools.

How Do DAST Tools Work?

DAST tools typically interact with an application through its front end, testing for vulnerabilities like SQL injection, cross-site scripting (XSS), and other standard security threats. They do not require access to the source code.

Who Should Use DAST Tools?

DAST tools are essential for security teams, developers, and IT professionals involved in maintaining the security of web applications. They are particularly useful for organizations with dynamic, frequently updated web applications.

What are the Benefits of Using DAST Tools?

The main benefits include the ability to identify real-world attack vectors, ease of use without needing access to source code, and the capacity to test applications in their final running state.

Can DAST Tools Replace Other Security Testing Methods?

No, DAST complements other testing methods like static application security testing (SAST) and interactive application security testing (IAST). A comprehensive security strategy often includes a mix of different testing approaches.

Are There Limitations to DAST Tools?

Yes, DAST tools can miss vulnerabilities that are not exposed through the web interface, and they might generate false positives. They also can’t typically assess the source code for underlying issues.

How Often Should DAST Tools be Used?

It’s recommended to use DAST tools regularly, especially after significant changes to the application or its environment. Continuous integration environments may benefit from more frequent testing.

Can DAST Tools Test Mobile Applications?

Some DAST tools are capable of testing mobile applications, but their effectiveness can vary depending on the tool and the specific application architecture.

Are DAST Tools Suitable for All Web Applications?

DAST tools are versatile, but their effectiveness can vary depending on the complexity and technology of the web application. They are generally more effective for traditional web applications than for single-page applications or services using extensive client-side scripting.

If you have further questions, reach us:

Find the Right Vendors
Cem Dilmegani
Principal Analyst

Cem is the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per Similarweb) including 60% of Fortune 500 every month.

Cem's work focuses on how enterprises can leverage new technologies in AI, automation, cybersecurity(including network security, application security), data collection including web data collection and process intelligence.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE, NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and media that referenced AIMultiple.

Cem's hands-on enterprise software experience contributes to the insights that he generates. He oversees AIMultiple benchmarks in dynamic application security testing (DAST), data loss prevention (DLP), email marketing and web data collection. Other AIMultiple industry analysts and tech team support Cem in designing, running and evaluating benchmarks.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

Sources: Traffic Analytics, Ranking & Audience, Similarweb.
Why Microsoft, IBM, and Google Are Ramping up Efforts on AI Ethics, Business Insider.
Microsoft invests $1 billion in OpenAI to pursue artificial intelligence that’s smarter than we are, Washington Post.
Data management barriers to AI success, Deloitte.
Empowering AI Leadership: AI C-Suite Toolkit, World Economic Forum.
Science, Research and Innovation Performance of the EU, European Commission.
Public-sector digitization: The trillion-dollar challenge, McKinsey & Company.
Hypatos gets $11.8M for a deep learning approach to document processing, TechCrunch.
We got an exclusive look at the pitch deck AI startup Hypatos used to raise $11 million, Business Insider.

To stay up-to-date on B2B tech & accelerate your enterprise:

Follow on

Next to Read


Your email address will not be published. All fields are required.