getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


141 software options

Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream IT and cyber risk management solution empowers organizations to adopt a strategic, business-driven approach to effectively manage and mitigate IT and cyber risks

Read more about MetricStream CyberGRC

Users also considered
Nipper logo

Close security gaps with proactive assessments

learn more
Nipper is a network configuration audit tool that helps close critical security and compliance gaps. It analyzes configurations with the precision of a penetration tester, providing exception-based security reporting, evidence-based compliance reporting, risk-prioritized views of non-compliances, and remediation analysis to improve compliance posture.

Read more about Nipper

Users also considered
Ostorlab logo

Cloud-based vulnerability management platform

learn more
Ostorlab is a cloud-based vulnerability management platform designed to help businesses detect, monitor, and remediate risks across enterprises' external attack surfaces.

Read more about Ostorlab

Users also considered
Sn1per logo

Get an attacker’s view of your organization!

learn more
Introducing Sn1per Professional – the leading security scanning solution to discover hidden vulnerabilities and assets in your environment.

Read more about Sn1per

Users also considered
FlexNet Code Insight logo

Vulnerability management tool for legal and security teams

learn more
FlexNet Code Insight is designed to help development, legal, and security teams handle open source software (OSS) through automated scans. It enables organizations to manage license compliance and security risks by identifying vulnerabilities during the entire application production lifecycle.

Read more about FlexNet Code Insight

Users also considered
ThunderScan logo

SAST Application Security

learn more
ThunderScan by DefenseCode is a Static Application Security Testing (SAST) software that allows businesses to perform deep and extensive security analysis of various application source codes. ThunderScan can be integrated with existing CI/CD pipelines and DevOps environment, offering a platform that requires almost no user input, easy to use, and can be deployed during or after development.

Read more about ThunderScan

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
Mayhem logo

Automated testing software for detecting security defects

learn more
Mayhem is an on-premise and cloud-based automated testing software designed to help government organizations and businesses in the aerospace and automotive industries generate custom test cases to secure applications, detect defects, mitigate risks, and more.

Read more about Mayhem

Users also considered
RHDVM logo

Vulnerability governance tool for cyber risk reduction

learn more
RHDVM is a vulnerability management software that assists with extensive governance of the entire vulnerability lifecycle, including detection, mitigation, and more.

Read more about RHDVM

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
Compliance Foresight logo

Scalable GRC Framework for Enterprise

learn more
A scalable GRC framework for enterprise , fast , easy, quick modules for cyber security compliances. Automated Reports, Business Logics and inbuilt workflows are the key highlights of the solution.

Read more about Compliance Foresight

Users also considered
Informer logo

Discover your external attack surface in minutes

learn more
Our External Attack Surface Management platform combines asset discovery, vulnerability scanning and integrated penetration testing in one platform. Gain full visibility of your attack surface with detail asset inventory, actionable vulnerability insights complete with alerting and reporting tools.

Read more about Informer

Users also considered
Dependency Track SaaS logo

Cloud-based software composition analysis tool (SCA)

learn more
Dependency Track SaaS enables professionals to run vulnerability scans, handle license compliance, and define policies.

Read more about Dependency Track SaaS

Users also considered
Amazon Inspector logo

Vulnerability Management for EC2 and ECR.

learn more
Amazon Inspector is a vulnerability management solution that helps businesses scan AWS workloads to expose and identify vulnerabilities, enhance the security and compliance of applications across AWS, and meet compliance requirements.

Read more about Amazon Inspector

Users also considered
Guardium Data Security Center logo

Comprehensive data security solution

learn more
IBM Guardium Data Security Center is a comprehensive solution that protects your data from current and emerging risks, including AI and cryptographic attacks. It offers a unified experience for security teams to collaborate, manage vulnerabilities, and streamline compliance. The product covers the full data security lifecycle, from discovery to remediation, across on-premises and cloud environments, structured and unstructured data.

Read more about Guardium Data Security Center

Users also considered
OpenText Automation Center logo

Vulnerability and risk management solution

learn more
Micro Focus Data Center Automation is a vulnerability management solution that enables businesses to automate the identification, prioritization, and remediation of noncompliant configurations and exposures. The software is designed to work both on-premises and in the cloud, providing businesses with the flexibility they need to manage their IT infrastructure.

Read more about OpenText Automation Center

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
Cyberwatch Vulnerability Manager logo

Vulnerability and asset inventory management software

learn more
Cyberwatch Vulnerability Manager is a security solution designed to help organizations track and manage vulnerabilities across network equipment, servers, devices, websites, workstations, and docker images via a unified portal. The platform lets users maintain an inventory of technologies and automatically captures and stores details about system issues, detection history, and remediation date.

Read more about Cyberwatch Vulnerability Manager

Users also considered