getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Scanner Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


30 software options

UserWay Accessibility Widget logo

Website accessibility widget & audit reports for compliance

visit website
The AI-Powered Accessibility Widget automatically finds/fixes web accessibility issues 24/7 for continuous ADA and WCAG compliance.

Read more about UserWay Accessibility Widget

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that detects, prioritizes, and helps manage and remediate vulnerabilities across multiple cloud application, workloads, and environments.

Read more about Wiz

Users also considered
cyberscan.io logo

Cybersecurity Tool

learn more
The IT security tool cyberscan.io is a portal designed for security measures that combines functions of vulnerability scanner, penetration tool and open source intelligence tools.

Read more about cyberscan.io

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Enginsight combines IT monitoring, pentesting and SIEM in a unique IT security platform. A comprehensive feature set with many automation options and low configuration effort makes the solution the ideal foundation for any IT security strategy.

Read more about Enginsight

Users also considered
cysmo logo

Automated real-time cyber risk rating platform

learn more
cysmo is a cloud-based platform that offers automated, real-time cyber risk assessments and assists with threat detection.

Read more about cysmo

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Hakware logo

Cloud-based solution for scanning system vulnerabilities.

learn more
Hakware is an AI-powered Security Management Solution, vulnerability scanner and pen testing tool. It aids organizations in safeguarding networks, systems, and applications by continuously identifying security risks through advanced AI analysis, facilitating a more secure operational environment.

Read more about Hakware

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Vulnerability Intelligence logo

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about Vulnerability Intelligence

Users also considered
Offensity logo

Cloud-based vulnerability scanning tool

learn more
Offensity is a vulnerability scanning solution designed for professional IT administrators seeking an efficient and straightforward way to identify and resolve security weaknesses.

Read more about Offensity

Users also considered
Intruder logo

Vulnerability scanner that prevents security & data breaches

learn more
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.

Read more about Intruder

Users also considered
CyLock EVA logo

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock EVA

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Guardz logo

Cybersecurity solution

learn more
Guardz is a managed cybersecurity solution built for MSPs to holistically protect and provide insurance coverage to SMEs with a holistic and multilayered approach.

The Guardz platform continuously monitors businesses' digital landscapes to safeguard their assets.

Read more about Guardz

Users also considered
SolarWinds Network Configuration Manager logo

Network Configuration Management and Backup

learn more
SolarWinds Network Configuration Manager is an automated network configuration management and backup solution that ensures a high level of network reliability with network configuration backups. SolarWinds NCM simplifies the backup, monitoring, and restoration of router, switch, and device configurations.

Read more about SolarWinds Network Configuration Manager

Users also considered
Nessus logo

Vulnerability assessment solution for security practitioners

learn more
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.

Read more about Nessus

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
Aikido Security is an all-in-one vulnerability scanner. Secure your code, cloud, and runtime environments in one central system.


Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
Security for Everyone logo

as known as Sec4Everyone | S4E

learn more
Security for Everyone is created to make cybersecurity understandable, affordable and manageable for everyone.

Read more about Security for Everyone

Users also considered
ZeroThreat logo

Fastest AI-Powered AppSec & Automated Pentesting Platform

learn more
ZeroThreat is an AI-powered web and API security platform that identifies real, exploitable vulnerabilities using attacker-style testing, delivering fast, proof-based results with minimal false positives.

Read more about ZeroThreat

Users also considered
HostedScan logo

Cloud-based vulnerability scanning and risk management tool

learn more
Designed for businesses of all sizes, HostedScan is a cloud-based vulnerability scanner solution that helps businesses monitor risk insights and generate screening reports accordingly.

Read more about HostedScan

Users also considered
Strobes PTaaS logo

Continuous and On-Demand Pentesting Platform

learn more
Strobes PTaaS is a cloud-based and on-premise vulnerability scanner that is designed for businesses in banking, network security, healthcare, telecommunications, and other sectors. Platform-enabled pentesting from the best white hats gives you faster collaboration and better results. By transitioning from ad-hoc penetration testing to continuous, on-demand pentesting, you will be able to level up your delivery.

Read more about Strobes PTaaS

Users also considered
Vulseek logo

Attack surface and vulnerability management

learn more
Vulseek is a modern attack surface management and vulnerability detection platform designed for small and medium-sized organizations. It combines external scanning, internal network visibility, and cross-platform endpoint agents to give teams complete insights

Read more about Vulseek

Users also considered
Edgewatch logo

External attack surface management platform

learn more
Edgewatch attack surface management platform assists companies with discovering, monitoring, and analyzing devices accessible from the Internet.

Read more about Edgewatch

Users also considered
Deepinfo Attack Surface Platform logo

Know your attack surface. Empower your security.

learn more
Deepinfo Attack Surface Platform discovers all your digital assets, monitors them 24/7, detects any issues, and notifies you quickly so you can take immediate action.

Read more about Deepinfo Attack Surface Platform

Users also considered