getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Vulnerability Management Software with Vulnerability Assessment - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


145 software options

Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
HCL BigFix SaaS Remediate logo

Cloud vulnerability management with auto patching

learn more
HCL BigFix SaaS Remediate is a cloud-native platform automating the detection and remediation of security vulnerabilities across endpoints. It offers access to over 500,000 pre-built fixes for more than 100 operating systems and 400 third-party applications. The solution includes risk-based prioritization via CyberFOCUS analytics, automated patching workflows, and Protection Level Agreements to track remediation performance.

Read more about HCL BigFix SaaS Remediate

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service continuous penetration testing platform transforms vulnerability management by delivering real-time, automated, and scalable testing. It empowers organizations to continuously detect, prioritize, and remediate vulnerabilities with precision and cost efficiency.

Read more about Blacklock

Users also considered
Hackuity logo

Risk-Based Vulnerability Management Cockpit

learn more
Hackuity is a comprehensive security solution that orchestrates and automates the vulnerability management process.

Read more about Hackuity

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered
HTTPCS Security logo

Next-Gen Vulnerability Scanner for websites and web apps

learn more
SECURITY, the Online Web Vulnerability Scanner allows you to detect vulnerabilities and scan security vulnerabilities of your Websites and Apps.

Read more about HTTPCS Security

Users also considered
Nipper logo

Close security gaps with proactive assessments

learn more
Nipper is a network configuration audit tool that helps close critical security and compliance gaps. It analyzes configurations with the precision of a penetration tester, providing exception-based security reporting, evidence-based compliance reporting, risk-prioritized views of non-compliances, and remediation analysis to improve compliance posture.

Read more about Nipper

Users also considered
Sn1per logo

Get an attacker’s view of your organization!

learn more
Introducing Sn1per Professional – the leading security scanning solution to discover hidden vulnerabilities and assets in your environment.

Read more about Sn1per

Users also considered
FlexNet Code Insight logo

Vulnerability management tool for legal and security teams

learn more
FlexNet Code Insight is designed to help development, legal, and security teams handle open source software (OSS) through automated scans. It enables organizations to manage license compliance and security risks by identifying vulnerabilities during the entire application production lifecycle.

Read more about FlexNet Code Insight

Users also considered
Dependency Track SaaS logo

Cloud-based software composition analysis tool (SCA)

learn more
Dependency Track SaaS enables professionals to run vulnerability scans, handle license compliance, and define policies.

Read more about Dependency Track SaaS

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
Plexicus logo

Cloud native application protection platform

learn more
Plexicus is an AI-powered cybersecurity platform for ASPM and CNAPP that automates the vulnerability management lifecycle. It identifies, prioritizes, and auto-remediates security risks by generating code fixes.

Read more about Plexicus

Users also considered
Akto logo

API Security Platform for Modern Appsec teams

learn more
Akto is an industry-leading solution for API discovery, API security posture management, sensitive data exposure, API security testing.

Read more about Akto

Users also considered
RHDVM logo

Vulnerability governance tool for cyber risk reduction

learn more
RHDVM is a vulnerability management software that assists with extensive governance of the entire vulnerability lifecycle, including detection, mitigation, and more.

Read more about RHDVM

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
Pathlock logo

Leader in Compliance-Centric Identity Governance

learn more
Pathlock automates security controls, detecting misconfigurations, and enforcing policies in SAP ERP. It reduces vulnerabilities, ensures compliance, and protects critical business processes across hybrid IT environments.

Read more about Pathlock

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Ivanti Neurons for RBVM logo

Risk-based vulnerability management platform

learn more
Ivanti Neurons for RBVM is a patch management solution that helps organizations evolve vulnerability management strategy to a risk-based approach. The solution enables prioritization of vulnerabilities and weaknesses that pose the most risk, allowing organizations to protect against ransomware and other cyber threats.

Read more about Ivanti Neurons for RBVM

Users also considered
teamplay Fleet logo

Cloud-based equipment maintenance tool for healthcare teams.

learn more
teamplay Fleet is a cloud-based equipment maintenance solution that helps healthcare organizations manage maintenance schedules, asset security, vulnerability reporting, and more. With teamplay Fleet's comprehensive range of features, users can gain clear visibility into equipment data, maintain optimal performance, and make informed decisions. The platform also helps secure equipment data and integrate with select service management software.

Read more about teamplay Fleet

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered