getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


187 software options

Greenbone logo

Vulnerability management for security issue detection.

learn more
Greenbone is vulnerability management software for any-level sized businseses for security issue detection. Greenbone is based on open-source software which evaluates and analyzes IT networks, generating security reports, providing remediation advice. Greenbone also offers daily security updates which are atuomatic. The software is available as not only a cloud-based solution but also physical and virtual.

Read more about Greenbone

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid streamlines vulnerability management by delivering continuous, detailed insights into your IT system’s security vulnerabilities, offering specific recommendations for improvement. This enables organizations to maintain robust security measures and manage software risks more effectively.

Read more about Sigrid

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
Fidelis Halo logo

Cloud security software

learn more
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream IT and cyber risk management solution empowers organizations to adopt a strategic, business-driven approach to effectively manage and mitigate IT and cyber risks

Read more about MetricStream CyberGRC

Users also considered
Netwrix Change Tracker logo

Maintain system integrity and detect risky changes

learn more
Netwrix Change Tracker helps organizations monitor configurations, detect unauthorized changes, and maintain system integrity across critical IT systems. It provides real-time visibility into configuration drift, file integrity monitoring, and automated compliance reporting to reduce risk and streng

Read more about Netwrix Change Tracker

Users also considered
Guardium Data Security Center logo

Comprehensive data security solution

learn more
IBM Guardium Data Security Center is a comprehensive solution that protects your data from current and emerging risks, including AI and cryptographic attacks. It offers a unified experience for security teams to collaborate, manage vulnerabilities, and streamline compliance. The product covers the full data security lifecycle, from discovery to remediation, across on-premises and cloud environments, structured and unstructured data.

Read more about Guardium Data Security Center

Users also considered
Skybox Vulnerability Control logo

Threat-centric vulnerability management

learn more
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast.

Read more about Skybox Vulnerability Control

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered
vPenTest logo

Meet Modern Security

learn more
PenTest is an automated and full-scale penetration testing platform that makes network penetration testing more affordable.

Read more about vPenTest

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered
Pathlock logo

Leader in Compliance-Centric Identity Governance

learn more
Pathlock automates security controls, detecting misconfigurations, and enforcing policies in SAP ERP. It reduces vulnerabilities, ensures compliance, and protects critical business processes across hybrid IT environments.

Read more about Pathlock

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
NorthStar logo

Risk-Based Vulnerability Management

learn more
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service continuous penetration testing platform transforms vulnerability management by delivering real-time, automated, and scalable testing. It empowers organizations to continuously detect, prioritize, and remediate vulnerabilities with precision and cost efficiency.

Read more about Blacklock

Users also considered
OpenText Automation Center logo

Vulnerability and risk management solution

learn more
Micro Focus Data Center Automation is a vulnerability management solution that enables businesses to automate the identification, prioritization, and remediation of noncompliant configurations and exposures. The software is designed to work both on-premises and in the cloud, providing businesses with the flexibility they need to manage their IT infrastructure.

Read more about OpenText Automation Center

Users also considered