App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Vulnerability Scanner Software with Asset Tagging

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

19 software options

Sponsored

1 filter applied


Integrated with


Pricing model


Devices supported



User rating


Personalize your search

Any industry

Any business size

Invicti logo
4.7
(18)

Security scanning & vulnerability management

visit website
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Orca Security logo
4.8
(56)

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
CyLock Anti-Hacker logo
4.9
(27)

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock Anti-Hacker

Users also considered
Acunetix logo
4.4
(34)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
EcoTrust logo
4.9
(14)

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
GlitchSecure logo
5.0
(11)

Real-time Continuous Security Testing

learn more
GlitchSecure is a cloud-based vulnerability scanner, which helps small to large businesses in healthcare, technology, and other sectors streamline continuous security testing via penetration testing, real-time notifications, automated reporting, and more. The platform offers various features such as vulnerability assessment, remediation verification, data dashboards, collaboration tools, and APIs.

Read more about GlitchSecure

Users also considered
FractalScan Surface logo
4.8
(11)

Identify your vulnerabilities before the hackers.

learn more
FractalScan Surface is a passive attack surface management tool that has been designed to help IT teams protect their online infrastructure fast.

Scan the internet to discover your online infrastructure, assets and shadow IT.

Check for misconfigurations, security vulnerabilities & exposed data.

Read more about FractalScan Surface

Users also considered
USM Anywhere logo
4.4
(14)

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
VulScan logo
4.0
(9)

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
CODA Footprint logo
5.0
(3)

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
CloudWize logo
4.5
(4)

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Red Sentry logo
5.0
(2)

Expose Exploits, Automatically

learn more
You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Red Sentry is an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable.

Read more about Red Sentry

Users also considered
Strobes RBVM logo
5.0
(2)

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Intruder logo
5.0
(2)

Vulnerability scanner that prevents security & data breaches

learn more
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.

Read more about Intruder

Users also considered
Vulnerability Intelligence logo
5.0
(1)

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about Vulnerability Intelligence

Users also considered
cyberscan.io logo
5.0
(1)

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered
tbSIEM logo
(0)

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Cyberwatch Vulnerability Manager logo
(0)

Vulnerability and asset inventory management software

learn more
Cyberwatch Vulnerability Manager is a security solution designed to help organizations track and manage vulnerabilities across network equipment, servers, devices, websites, workstations, and docker images via a unified portal. The platform lets users maintain an inventory of technologies and automatically captures and stores details about system issues, detection history, and remediation date.

Read more about Cyberwatch Vulnerability Manager

Users also considered
StorageGuard logo
(0)

Your data isn’t secure, unless your storage & backup are.

learn more
The industry’s ONLY Vulnerability Scanner for enterprise storage & backup systems, helping to secure these systems to protect your data

Read more about StorageGuard

Users also considered