getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


172 software options

Fidelis Halo logo

Cloud security software

learn more
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
Netwrix Change Tracker logo

Maintain system integrity and detect risky changes

learn more
Netwrix Change Tracker helps organizations monitor configurations, detect unauthorized changes, and maintain system integrity across critical IT systems. It provides real-time visibility into configuration drift, file integrity monitoring, and automated compliance reporting to reduce risk and streng

Read more about Netwrix Change Tracker

Users also considered
Kikimora logo

Cloud-based platform for managing vulnerabilities

learn more
Kikimora is a cybersecurity platform that automates threat detection, vulnerability scanning, and compliance tracking. It provides real-time monitoring, customizable dashboards, and a centralized security hub, making it easier to manage security operations. Free consulting hours are included.

Read more about Kikimora

Users also considered
Skybox Vulnerability Control logo

Threat-centric vulnerability management

learn more
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast.

Read more about Skybox Vulnerability Control

Users also considered
ThreadFix  logo

Vulnerability management & risk prioritization platform

learn more
ThreadFix is a vulnerability management solution designed to help businesses consolidate test results and prioritize risk decisions. Software development and server operation teams can export vulnerability data into defect tracking and ticketing systems to resolve discovered vulnerabilities.

Read more about ThreadFix

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
OpenText Automation Center logo

Vulnerability and risk management solution

learn more
Micro Focus Data Center Automation is a vulnerability management solution that enables businesses to automate the identification, prioritization, and remediation of noncompliant configurations and exposures. The software is designed to work both on-premises and in the cloud, providing businesses with the flexibility they need to manage their IT infrastructure.

Read more about OpenText Automation Center

Users also considered
Novee logo

AI-powered penetration testing platform

learn more
Novee provides AI-powered penetration testing software that continuously identifies vulnerabilities and exploit chains in live environments. The platform uses AI agents to map systems, detect business logic flaws, and validate security issues with clear replication steps. It offers personalized remediation guidance tailored to specific architectures and automatically retests after fixes are implemented.

Read more about Novee

Users also considered
Amazon Inspector logo

Vulnerability Management for EC2 and ECR.

learn more
Amazon Inspector is a vulnerability management solution that helps businesses scan AWS workloads to expose and identify vulnerabilities, enhance the security and compliance of applications across AWS, and meet compliance requirements.

Read more about Amazon Inspector

Users also considered
Guardium Data Security Center logo

Comprehensive data security solution

learn more
IBM Guardium Data Security Center is a comprehensive solution that protects your data from current and emerging risks, including AI and cryptographic attacks. It offers a unified experience for security teams to collaborate, manage vulnerabilities, and streamline compliance. The product covers the full data security lifecycle, from discovery to remediation, across on-premises and cloud environments, structured and unstructured data.

Read more about Guardium Data Security Center

Users also considered
Ostorlab logo

Cloud-based vulnerability management platform

learn more
Ostorlab is a cloud-based vulnerability management platform designed to help businesses detect, monitor, and remediate risks across enterprises' external attack surfaces.

Read more about Ostorlab

Users also considered
Cyberwatch Vulnerability Manager logo

Vulnerability and asset inventory management software

learn more
Cyberwatch Vulnerability Manager is a security solution designed to help organizations track and manage vulnerabilities across network equipment, servers, devices, websites, workstations, and docker images via a unified portal. The platform lets users maintain an inventory of technologies and automatically captures and stores details about system issues, detection history, and remediation date.

Read more about Cyberwatch Vulnerability Manager

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
Code Dx logo

Correlate, prioritize, and remediate with Code Dx.

learn more
Code Dx automates application security processes across the SDLC. It determines the appropriate tests to execute, then correlates results and prioritizes vulnerabilities. Users get a complete picture of risk visibility for their organization's entire software portfolio on one centralized platform.

Read more about Code Dx

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered
RedShield logo

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered