getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Scanner Software - Page 2

Last updated: February 2026

87 software options

Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Astra Pentest logo

Vulnerability management made simple!

learn more
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 8000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
Security for Everyone logo

as known as Sec4Everyone | S4E

learn more
Security for Everyone is created to make cybersecurity understandable, affordable and manageable for everyone.

Read more about Security for Everyone

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
Raynet One logo

Find out more on www.raynet-inc.com.

learn more
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.

TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.

Read more about Raynet One

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid simplifies vulnerability scanning with its powerful platform that provides ongoing monitoring and detailed analysis of software vulnerabilities. It ensures that organizations can proactively manage their security risks and maintain the integrity of their software systems.

Read more about Sigrid

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
Axonius logo

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
GuardRails logo

Application security software

learn more
With GuardRails, you can finally feel safe on every level of your security. The platform enhances development processes and gives developers control via its layered approach that shields them from code to the cloud for complete protection against attackers.

Read more about GuardRails

Users also considered
Hakware logo

Cloud-based solution for scanning system vulnerabilities.

learn more
Hakware is an AI-powered Security Management Solution, vulnerability scanner and pen testing tool. It aids organizations in safeguarding networks, systems, and applications by continuously identifying security risks through advanced AI analysis, facilitating a more secure operational environment.

Read more about Hakware

Users also considered
PingSafe logo

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered
Xygeni Security logo

Real Risk. Real Control. From Code to Cloud

learn more
Xygeni Vulnerability Scanner continuously scans code, open source, containers, and cloud infrastructure to detect exploitable vulnerabilities, secrets, misconfigurations, and malware. AI-driven triage reduces noise and prioritizes real risk with full ASPM context.

Read more about Xygeni Security

Users also considered
Bytesafe logo

Source code and vulnerability management platform

learn more
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.

Read more about Bytesafe

Users also considered
BIMA logo

Unifying Cybersecurity, Simplifying Protection

learn more
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Read more about BIMA

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Techowlshield logo

"Defending Your Digital Domain Against the UNSEEN ENEMY"

learn more
TechOwl Shield offers a real-time, AI-powered view of your cybersecurity threats, helping you identify and prioritize vulnerabilities for around-the-clock data protection.

Read more about Techowlshield

Users also considered
Checkmarx One logo

Enterprise cloud-native application security platform.

learn more
Checkmarx One is an enterprise cloud-native application security platform that helps teams cut through the noise fix what matters most.

Read more about Checkmarx One

Users also considered
Intruder logo

Vulnerability scanner that prevents security & data breaches

learn more
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.

Read more about Intruder

Users also considered