getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


172 software options

SAINT Security Suite logo

Cybersecurity and vulnerability assessment solution

learn more
SAINT Security Suite is a cybersecurity solution that helps businesses uncover, assess, and mitigate security risks across the entire security infrastructure. The platform provides granular, tailored reports that facilitate informed decision-making.

Read more about SAINT Security Suite

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Cobalt logo

(previously CrowdCurity) Pen Testing as a Service

learn more
Cobalt - previously CrowdCurity - is a modern application security platform that supports a complete find-to-fix workflow for all penetration testing and vulnerability assessments throughout an organization

Read more about Cobalt

Users also considered
Alert Logic MDR logo

Managed detection and response (MDR) platform

learn more
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.

Read more about Alert Logic MDR

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
Sysdig logo

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix (by Invicti) is a vulnerability management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation.

Read more about Acunetix

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Mend logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and management.
We help companies find and fix open source vulnerabilities, including prioritizing vulnerabilities based on vulnerability's effectiveness.

Read more about Mend

Users also considered
Apiiro logo

AppSec management tool to secure cloud software development.

learn more
Apiiro is re-inventing the secure development lifecycle for agile and cloud-native development. It helps businesses transform application security into multidimensional application risk.

Read more about Apiiro

Users also considered
JFrog Xray logo

A DevSecOps binary security vulnerability scanning solution

learn more
Xray is a DevSecOps binary security vulnerability scanning solution that scans your OSS dependencies for security vulnerabilities and license compliance issues.

Read more about JFrog Xray

Users also considered
AWS Shield logo

DDoS and vulnerability management software

learn more
AWS Shield is a DDoS and vulnerability management software that helps businesses detect attacks and automate inline mitigations to minimize application latency and downtime. It allows staff members to detect attacks at lower traffic thresholds to optimize application DDoS resiliency and minimize false-positive notifications.

Read more about AWS Shield

Users also considered
ISS logo

Cloud-based compliance management solution

learn more
INSSIDE Security Suite is a leading cloud-based platform in regulatory compliance solutions, designed by collaborators, allowing companies to manage risks, and facilitating the creation of reports, analysis, and monitoring of compliance processes.

Read more about ISS

Users also considered
Brandefense logo

Cloud-based threat intelligence tool for data security.

learn more
Brandefense is a cloud-based digital risk protection suite that helps organizations track and manage cyber threats. The platform helps protect systems from potential risks via threat identification, real-time threat alerts, and continuous monitoring.

Read more about Brandefense

Users also considered
Zscaler logo

Secure your users, apps and data with Zero Trust + AI.

learn more
Zscaler is a cloud-native security platform offering Zero Trust access, advanced threat protection, and DLP for secure digital transformation. It protects users, apps & data by enabling secure web access, securing cloud apps & preventing cyber threats, all while simplifying IT operations at scale.

Read more about Zscaler

Users also considered
SolarWinds Patch Manager logo

Vulnerability management software

learn more
SolarWinds Patch Manager is a server monitoring software that helps businesses manage the process of patching systems and applications. It provides a centralized platform for managing, deploying, and reporting on patches for Windows and third-party applications.

Read more about SolarWinds Patch Manager

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Greenbone logo

Vulnerability management for security issue detection.

learn more
Greenbone is vulnerability management software for any-level sized businseses for security issue detection. Greenbone is based on open-source software which evaluates and analyzes IT networks, generating security reports, providing remediation advice. Greenbone also offers daily security updates which are atuomatic. The software is available as not only a cloud-based solution but also physical and virtual.

Read more about Greenbone

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid streamlines vulnerability management by delivering continuous, detailed insights into your IT system’s security vulnerabilities, offering specific recommendations for improvement. This enables organizations to maintain robust security measures and manage software risks more effectively.

Read more about Sigrid

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered