getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Scanner Software with Third-Party Integrations (2026)

Last updated: February 2026

Key features of Vulnerability Scanner Software

Based on GetApp's analysis of verified user reviews collected between July 2021 and August 2024.

  • Vulnerability/Threat Prioritization: Reviewers value the ability to identify and focus on critical vulnerabilities, ensuring efficient risk management and prioritization of remediation activities. 100% of reviewers rated this feature as important or highly important.
  • Vulnerability Scanning: Users highlight the tool's effectiveness in identifying zero-day attacks, outdated software, and configurations, providing reliable and detailed vulnerability reports. 100% of reviewers rated this feature as important or highly important.
  • Vulnerability Assessment: Reviewers appreciate detailed reporting, prioritization based on CVE scores, and the ability to ensure compliance and risk management through accurate vulnerability identification. 98% of reviewers rated this feature as important or highly important.
  • Network Scanning: Users find network scanning useful for discovering host IPs, open ports, and security gaps, presenting results in an organized manner for comprehensive risk assessment. 92% of reviewers rated this feature as important or highly important.
  • Alerts/Notifications: Users note the benefit of timely alerts and notifications, which keep security teams informed about vulnerabilities and configuration changes, aiding in quick response. 89% of reviewers rated this feature as important or highly important.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


51 software options

UserWay Accessibility Widget logo

Website accessibility widget & audit reports for compliance

visit website
The AI-Powered Accessibility Widget automatically finds/fixes web accessibility issues 24/7 for continuous ADA and WCAG compliance.

Read more about UserWay Accessibility Widget

Users also considered
Aikido Security logo

Secure your code, cloud, and runtime in one central system.

visit website
Aikido Security is an all-in-one vulnerability scanner. Secure your code, cloud, and runtime environments in one central system.


Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense delivers comprehensive vulnerability scanning, including security configurations. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.

Read more about Syxsense

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

learn more
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
Invicti logo

Zero-Noise AppSec & Vulnerability Management Platform

learn more
DAST-first platform for scalable, accurate application security. Combines DAST, IAST, API security, SAST, static and dynamic SCA, and container security to find and prove real risks—eliminating noise, automating remediation, and empowering teams to secure everything from a single platform.

Read more about Invicti

Users also considered
Acunetix logo

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
Cyber Chief logo

Release cloud software with zero known vulnerabilities

learn more
Cyber Chief is a vulnerability scanner and issue management tool that helps ship software with zero known security vulnerabilities.

Read more about Cyber Chief

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security & software engineers find vulnerabilities, instructions on how-to-fix them and automate security testing with ease.

Read more about Probely

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Astra Pentest logo

Vulnerability management made simple!

learn more
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 8000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
Raynet One logo

Find out more on www.raynet-inc.com.

learn more
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.

TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.

Read more about Raynet One

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid simplifies vulnerability scanning with its powerful platform that provides ongoing monitoring and detailed analysis of software vulnerabilities. It ensures that organizations can proactively manage their security risks and maintain the integrity of their software systems.

Read more about Sigrid

Users also considered
Axonius logo

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
PingSafe logo

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered
Xygeni Security logo

Real Risk. Real Control. From Code to Cloud

learn more
Xygeni Vulnerability Scanner continuously scans code, open source, containers, and cloud infrastructure to detect exploitable vulnerabilities, secrets, misconfigurations, and malware. AI-driven triage reduces noise and prioritizes real risk with full ASPM context.

Read more about Xygeni Security

Users also considered