getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Scanner Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


28 software options

Cyber Chief logo

Release cloud software with zero known vulnerabilities

learn more
Cyber Chief is a vulnerability scanner and issue management tool that helps ship software with zero known security vulnerabilities.

Read more about Cyber Chief

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that detects, prioritizes, and helps manage and remediate vulnerabilities across multiple cloud application, workloads, and environments.

Read more about Wiz

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
Intruder logo

Vulnerability scanner that prevents security & data breaches

learn more
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.

Read more about Intruder

Users also considered
PingSafe logo

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered
Hackrate logo

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security & software engineers find vulnerabilities, instructions on how-to-fix them and automate security testing with ease.

Read more about Probely

Users also considered
Astra Pentest logo

Continuous Pentests (VAPT) that scales with your dev velocit

learn more
AI Powered offensive Pentest Platform

Read more about Astra Pentest

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca Security is the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across AWS, Azure, Google Cloud and Kubernetes.

Read more about Orca Security

Users also considered
Detectify logo

Vulnerability management solution for security teams

learn more
Detectify is a cybersecurity solution designed to help security teams monitor assets and identify threats across web applications. Administrators can add domains or IP addresses, verify asset ownership, and scan profiles to track vulnerabilities including DNS misconfigurations and SQL injections.

Read more about Detectify

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
Aikido Security is an all-in-one vulnerability scanner. Secure your code, cloud, and runtime environments in one central system.


Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Invicti logo

Proof-based application security testing platform

learn more
Invicti is a web application and API security platform that provides proof-based vulnerability scanning with DAST, SAST, and ASPM capabilities. The platform discovers and tests websites, applications, and APIs while correlating security findings from multiple tools to prioritize real vulnerabilities. It integrates with CI/CD pipelines and offers AI-powered remediation guidance to help development teams address security issues efficiently.

Read more about Invicti

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Techowlshield logo

"Defending Your Digital Domain Against the UNSEEN ENEMY"

learn more
TechOwl Shield offers a real-time, AI-powered view of your cybersecurity threats, helping you identify and prioritize vulnerabilities for around-the-clock data protection.

Read more about Techowlshield

Users also considered
Pentest-Tools.com logo

Discover what's possible. Prove what's real.

learn more
From vulnerability scans to proof, Pentest-Tools.com gives 2,000+ security teams in 119 countries the speed, accuracy, and coverage to confidently validate and mitigate risks across their infrastructure (network, cloud, web apps, APIs).

Read more about Pentest-Tools.com

Users also considered
CloudWize logo

Cloud security and compliance management solution

learn more
Get 360° cloud protection from architecture design to runtime. This agentless, drag-and-drop, no-code solution enables you to detect and fix cloud issues in minutes. Over 1000 rules running continuously on your cloud within minutes of onboarding.

Read more about CloudWize

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Deepinfo Attack Surface Platform logo

Know your attack surface. Empower your security.

learn more
Deepinfo Attack Surface Platform discovers all your digital assets, monitors them 24/7, detects any issues, and notifies you quickly so you can take immediate action.

Read more about Deepinfo Attack Surface Platform

Users also considered
AquilaX logo

AI-enabled security solution for developers

learn more
AquilaX provides AI-enabled security scanning for developers, supporting GitHub, GitLab, and Bitbucket repositories. With SecuriTron, their AI assistant, users can automate scan setup and identify vulnerabilities through both automated and tailored scans.

Read more about AquilaX

Users also considered