getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Vulnerability Scanner Software with Vulnerability Scanning - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


79 software options

CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid simplifies vulnerability scanning with its powerful platform that provides ongoing monitoring and detailed analysis of software vulnerabilities. It ensures that organizations can proactively manage their security risks and maintain the integrity of their software systems.

Read more about Sigrid

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
ZeroThreat logo

Fastest AI-Powered AppSec & Automated Pentesting Platform

learn more
ZeroThreat is an AI-powered web and API security platform that identifies real, exploitable vulnerabilities using attacker-style testing, delivering fast, proof-based results with minimal false positives.

Read more about ZeroThreat

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Checkmarx One logo

Enterprise cloud-native application security platform.

learn more
Checkmarx One is an enterprise cloud-native application security platform that helps teams cut through the noise fix what matters most.

Read more about Checkmarx One

Users also considered
Strobes PTaaS logo

Continuous and On-Demand Pentesting Platform

learn more
Strobes PTaaS is a cloud-based and on-premise vulnerability scanner that is designed for businesses in banking, network security, healthcare, telecommunications, and other sectors. Platform-enabled pentesting from the best white hats gives you faster collaboration and better results. By transitioning from ad-hoc penetration testing to continuous, on-demand pentesting, you will be able to level up your delivery.

Read more about Strobes PTaaS

Users also considered
HostedScan logo

Cloud-based vulnerability scanning and risk management tool

learn more
Designed for businesses of all sizes, HostedScan is a cloud-based vulnerability scanner solution that helps businesses monitor risk insights and generate screening reports accordingly.

Read more about HostedScan

Users also considered
Vulseek logo

Attack surface and vulnerability management

learn more
Vulseek is a modern attack surface management and vulnerability detection platform designed for small and medium-sized organizations. It combines external scanning, internal network visibility, and cross-platform endpoint agents to give teams complete insights

Read more about Vulseek

Users also considered
Amazon Inspector logo

Vulnerability Management for EC2 and ECR.

learn more
Amazon Inspector is a vulnerability management solution that helps businesses scan AWS workloads to expose and identify vulnerabilities, enhance the security and compliance of applications across AWS, and meet compliance requirements.

Read more about Amazon Inspector

Users also considered
Deepinfo Attack Surface Platform logo

Know your attack surface. Empower your security.

learn more
Deepinfo Attack Surface Platform discovers all your digital assets, monitors them 24/7, detects any issues, and notifies you quickly so you can take immediate action.

Read more about Deepinfo Attack Surface Platform

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
Panoptic Scans logo

Vulnerability scanning solution for applications and network

learn more
Panoptic Scans is a managed vulnerability scanning solution that performs application and network vulnerability scans.

Read more about Panoptic Scans

Users also considered
Enzoic for Active Directory logo

Tool to stop breached passwords & credentials automatically

learn more
Enzoic for Active Directory is a software that helps automate password security, block weak and exposed credentials in real time, enforce NIST compliance, and protect the organization without user disruption.

Read more about Enzoic for Active Directory

Users also considered
Edgewatch logo

External attack surface management platform

learn more
Edgewatch attack surface management platform assists companies with discovering, monitoring, and analyzing devices accessible from the Internet.

Read more about Edgewatch

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Cyberwatch Vulnerability Manager logo

Vulnerability and asset inventory management software

learn more
Cyberwatch Vulnerability Manager is a security solution designed to help organizations track and manage vulnerabilities across network equipment, servers, devices, websites, workstations, and docker images via a unified portal. The platform lets users maintain an inventory of technologies and automatically captures and stores details about system issues, detection history, and remediation date.

Read more about Cyberwatch Vulnerability Manager

Users also considered
StorageGuard logo

Your data isn’t secure, unless your storage & backup are.

learn more
The industry’s ONLY Vulnerability Scanner for enterprise storage & backup systems, helping to secure these systems to protect your data

Read more about StorageGuard

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Trend Micro Cloud One logo

Cloud and cybersecurity software

learn more
Trend Micro Cloud One is cloud and cybersecurity software that helps businesses manage security policies, detect threats, receive malicious activity alerts, conduct root-cause analysis, and more from within a unified platform. It allows staff members to set up runtime container protection, manage security policies across multi-cloud environments, conduct health checks, and generate compliance reports, among other operations.

Read more about Trend Micro Cloud One

Users also considered