App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Vulnerability Scanner Software

58 software options

Sponsored

Filter results

Features


Integrated with


Pricing model


Devices supported



User rating


Personalize your search

Any industry

Any business size

Chariot logo

Chariot

(0)

Cybersecurity platform on the offensive.

visit website
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Invicti logo

Invicti

4.7
(18)

Security scanning & vulnerability management

visit website
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
UserWay logo

UserWay

4.9
(40)

Website accessibility widget & audit reports for compliance

visit website
Userway is a cloud-based suite of tools for website accessibility. It is used by companies of any size in various industries, such as hospitality, financial services, education, entertainment, government, and others. UserWay supports over 30 languages and provides an AI-powered accessibility widget to help businesses remain compliant with ADA and WCAG guidelines.

Read more about UserWay

Users also considered
Arcules logo

Arcules

(0)

Cloud Surveillance, Simplified.

visit website
A simple and unified video surveillance, access control, and analytics platform in the cloud.

Read more about Arcules

Users also considered
Astra Pentest logo

Astra Pentest

4.9
(7)

Vulnerability management made simple!

visit website
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 3000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
Nessus logo

Nessus

4.7
(79)

Vulnerability assessment solution for security practitioners

learn more
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.

Read more about Nessus

Users also considered
Beagle Security logo

Beagle Security

4.9
(51)

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Orca Security logo

Orca Security

4.8
(56)

Cloud security platform for AWS, Azure, and GCP environments

learn more
Got more than 100 cloud assets? Orca Security provides workload-level security for Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP) WITHOUT AGENTS. Detect and identify vulnerabilities, malware, misconfigurations, leaked passwords, lateral movement risk, and unsecured high-risk data.

Read more about Orca Security

Users also considered
Syxsense logo

Syxsense

4.6
(60)

Unified Security and Endpoint Management

learn more
Syxsense delivers comprehensive vulnerability scanning, including security configurations. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.

Read more about Syxsense

Users also considered
CyLock Anti-Hacker logo

CyLock Anti-Hacker

5.0
(23)

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock Anti-Hacker

Users also considered
Acunetix logo

Acunetix

4.4
(35)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
AppTrana logo

AppTrana

4.6
(24)

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
SolarWinds Network Configuration Manager logo

SolarWinds Network Configuration Manager

4.8
(18)

Network Configuration Management and Backup

learn more
SolarWinds Network Configuration Manager is an automated network configuration management and backup solution that ensures a high level of network reliability with network configuration backups. SolarWinds NCM simplifies the backup, monitoring, and restoration of router, switch, and device configurations.

Read more about SolarWinds Network Configuration Manager

Users also considered
Specops Password Auditor logo

Specops Password Auditor

4.8
(17)

Password audit & security tool for Active Directory accounts

learn more
Specops Password Auditor is a password audit tool that scans Active Directory accounts to identify potential vulnerabilities. This tool is designed to improve authentication and password security while helping organizations meet compliance standards. It can generate reports that list accounts with various vulnerabilities, such as expired, identical, blank passwords, and more. It can help organizations prevent breaches that result from leaked passwords.

Read more about Specops Password Auditor

Users also considered
Cyber Chief logo

Cyber Chief

5.0
(12)

Release cloud software with zero known vulnerabilities

learn more
Cyber Chief is a vulnerability scanner and issue management tool that helps ship software with zero known security vulnerabilities.

Read more about Cyber Chief

Users also considered
Probely logo

Probely

4.9
(13)

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security & software engineers find vulnerabilities, instructions on how-to-fix them and automate security testing with ease.

Read more about Probely

Users also considered
KACE logo

KACE

4.0
(24)

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
USM Anywhere logo

USM Anywhere

4.4
(14)

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
Security for Everyone logo

Security for Everyone

4.5
(12)

as known as Sec4Everyone | S4E

learn more
Security for Everyone is created to make cybersecurity understandable, affordable and manageable for everyone.

Read more about Security for Everyone

Users also considered
RayVentory logo

RayVentory

4.5
(12)

Find out more on www.raynet-inc.com.

learn more
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.

TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.

Read more about RayVentory

Users also considered
Qualys Cloud Platform logo

Qualys Cloud Platform

3.8
(26)

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
HackerOne logo

HackerOne

4.7
(9)

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Bytesafe logo

Bytesafe

4.6
(8)

Source code and vulnerability management platform

learn more
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.

Read more about Bytesafe

Users also considered
GuardRails logo

GuardRails

5.0
(5)

Application security software

learn more
With GuardRails, you can finally feel safe on every level of your security. The platform enhances development processes and gives developers control via its layered approach that shields them from code to the cloud for complete protection against attackers.

Read more about GuardRails

Users also considered
PingSafe logo

PingSafe

5.0
(5)

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered