getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Vulnerability Management Software with Access Controls/Permissions - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


103 software options

Hackrate logo

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
Action1 logo

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
Centraleyezer logo

Vulnerability management software

learn more
Centraleyezer is a vulnerability tracking solution which provides centralized dashboards and reporting.

Read more about Centraleyezer

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Iru logo

Collapse the IT stack with Iru.

learn more
AI-powered platform that unifies identity, endpoints, and compliance—giving IT teams time and control back.

Read more about Iru

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
6clicks logo

Free/limited user licensing. AI-powered. Integrated content.

learn more
6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC.

Read more about 6clicks

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

learn more
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
Rivial Data Security logo

Integrated cybersecurity management tool for measuring risks

learn more
Rivial streamlines vulnerability management to stay ahead of threats, reduce manual workloads, and enhance cybersecurity resilience.

Read more about Rivial Data Security

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
ESET's MDR offers 24/7 managed detection and response to secure businesses +250 people by addressing vulnerabilities.

Read more about ESET PROTECT MDR

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
Rubrik logo

All Your Apps. Instantly Available.

learn more
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!

Read more about Rubrik

Users also considered
Risk Hawk logo

Risk, compliance and audit management software

learn more
Integrated Risk Management system to actively manage all risks & KRIs, controls, incidents, policies, audits, action plans, resources, compliance registers, case queues such as whistleblowing, complaints, SARs, media reports, and regulatory notifications and facilitates linking these to each other.

Read more about Risk Hawk

Users also considered
Sprinto logo

Cloud-based solution for security compliance.

learn more
Sprinto is a cloud-based platform designed to help businesses of all sizes manage and streamline their compliance processes. It offers various capabilities such as compliance programs, automated workflows, and continuous control monitoring. Sprinto's risk assessment module allows for quantitative and qualitative evaluation of risks, while its role-based task management ensures seamless collaboration across the organization.

Read more about Sprinto

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
SilverSky Managed Security Services logo

Security device monitoring and management

learn more
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.

Read more about SilverSky Managed Security Services

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Detectify logo

Vulnerability management solution for security teams

learn more
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.

Read more about Detectify

Users also considered
Crashtest Security logo

Cloud-based vulnerability scanning & testing software

learn more
Crashtest Security is a vulnerability testing software that helps businesses perform automated scans to detect cybersecurity threats across applications. Managers can conduct single-page, multi-page, and documentation-based scans to identify attack vectors across several web applications.

Read more about Crashtest Security

Users also considered