getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Vulnerability Management Software with Security Auditing - Page 2

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


92 software options

Action1 logo

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
CyLock EVA logo

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock EVA

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Iru logo

Collapse the IT stack with Iru.

learn more
AI-powered platform that unifies identity, endpoints, and compliance—giving IT teams time and control back.

Read more about Iru

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Runecast logo

AI-powered platform for Security and Compliance

learn more
Runecast is a provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises rely on Runecast for proactive risk mitigation, security compliance, operational efficiency & mission-critical stability. To add proactiveness to your IT strategy, visit www.runecast.com

Read more about Runecast

Users also considered
CanIPhish logo

Simulate Phishing Threats And Train Your Employees

learn more
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.

Read more about CanIPhish

Users also considered
6clicks logo

Free/limited user licensing. AI-powered. Integrated content.

learn more
6clicks is transforming cyber risk and compliance management with its AI-powered platform. It offers a unique Hub & Spoke architecture ideal for distributed GRC programs and advisors, along with the first-ever AI engine, Hailey, built for cyber GRC.

Read more about 6clicks

Users also considered
Astra Pentest logo

Continuous Pentests (VAPT) that scales with your dev velocit

learn more
AI Powered offensive Pentest Platform

Read more about Astra Pentest

Users also considered
Rivial Data Security logo

Integrated cybersecurity management tool for measuring risks

learn more
Rivial streamlines vulnerability management to stay ahead of threats, reduce manual workloads, and enhance cybersecurity resilience.

Read more about Rivial Data Security

Users also considered
WP Ghost by AISQ logo

Cloud-based vulnerability management platform

learn more
WP Ghost by AISQ uncovers and helps you fix key WordPress vulnerabilities before hackers exploit them. Get clear reports, one-click fixes, and continuous monitoring — so your site stays secure, resilient, and protected around the clock.

Read more about WP Ghost by AISQ

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

learn more
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
ESET's MDR offers 24/7 managed detection and response to secure businesses +250 people by addressing vulnerabilities.

Read more about ESET PROTECT MDR

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
Risk Hawk logo

Risk, compliance and audit management software

learn more
Integrated Risk Management system to actively manage all risks & KRIs, controls, incidents, policies, audits, action plans, resources, compliance registers, case queues such as whistleblowing, complaints, SARs, media reports, and regulatory notifications and facilitates linking these to each other.

Read more about Risk Hawk

Users also considered
Sprinto logo

Cloud-based solution for security compliance.

learn more
Sprinto is a cloud-based platform designed to help businesses of all sizes manage and streamline their compliance processes. It offers various capabilities such as compliance programs, automated workflows, and continuous control monitoring. Sprinto's risk assessment module allows for quantitative and qualitative evaluation of risks, while its role-based task management ensures seamless collaboration across the organization.

Read more about Sprinto

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
System Mechanic Ultimate Defense logo

The Ultimate Defense for PCs.

learn more
System Mechanic Ultimate Defense includes a full-featured antivirus that protects the PC system and important files from viruses, spyware, ransomware, and more.

Read more about System Mechanic Ultimate Defense

Users also considered
Enzoic for Active Directory Lite logo

Free Password Auditing Tool

learn more
Identify weak, breached, and reused passwords in Active Directory within minutes. Backed by Enzoic’s threat intelligence, it provides a detailed report with actionable insights to improve security and reduce risks. It is fast, simple, and free to use.

Read more about Enzoic for Active Directory Lite

Users also considered
Lightspin logo

Web-based cybersecurity and vulnerability management system

learn more
Lightspin is a cloud-based cybersecurity software that helps companies eliminate risks to cloud assets. It targets firms in the travel, financial technology, e-commerce, travel, and gaming industries. Key features include threat intelligence, encryption, risk assessment, and patch management.

Read more about Lightspin

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Threatspy logo

Reinventing Application Security

learn more
Developer-first Application & API Security Management Platform

Read more about Threatspy

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered