getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Scanner Software - Page 3

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


87 software options

AppTrana logo

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
ZeroThreat logo

Fastest AI-Powered AppSec & Automated Pentesting Platform

learn more
ZeroThreat is an AI-powered web and API security platform that identifies real, exploitable vulnerabilities using attacker-style testing, delivering fast, proof-based results with minimal false positives.

Read more about ZeroThreat

Users also considered
Raynet One logo

Find out more on www.raynet-inc.com.

learn more
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.

TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.

Read more about Raynet One

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense delivers comprehensive vulnerability scanning, including security configurations. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.

Read more about Syxsense

Users also considered
Saner CVEM logo

Integrated platform for continuous vulnerability detection.

learn more
SecPod Saner is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets via continuous vulnerability management, patch management and more. Key features include regulatory compliance, asset management, audit trails, and reporting.

Read more about Saner CVEM

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
ManageEngine Vulnerability Manager Plus logo

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Checkmarx One logo

Enterprise cloud-native application security platform.

learn more
Checkmarx One is an enterprise cloud-native application security platform that helps teams cut through the noise fix what matters most.

Read more about Checkmarx One

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix is a cybersecurity solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.

Read more about Acunetix

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid simplifies vulnerability scanning with its powerful platform that provides ongoing monitoring and detailed analysis of software vulnerabilities. It ensures that organizations can proactively manage their security risks and maintain the integrity of their software systems.

Read more about Sigrid

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Vulseek logo

Attack surface and vulnerability management

learn more
Vulseek is a modern attack surface management and vulnerability detection platform designed for small and medium-sized organizations. It combines external scanning, internal network visibility, and cross-platform endpoint agents to give teams complete insights

Read more about Vulseek

Users also considered
AppTotal logo

Vulnerability management software

learn more
AppTotal is a business applications security platform. It lets employees connect the apps & add-ons to IT-approved platforms without worrying about security. AppTotal streamlines third-party app vetting processes, maps and analyzes the apps and integrations already connected to your environment, and helps teams automate app and extensions recertification and off-boarding process across Office 365, Google Workspace, Atlassian, Slack and other major platforms.

Read more about AppTotal

Users also considered
HostedScan logo

Cloud-based vulnerability scanning and risk management tool

learn more
Designed for businesses of all sizes, HostedScan is a cloud-based vulnerability scanner solution that helps businesses monitor risk insights and generate screening reports accordingly.

Read more about HostedScan

Users also considered
Gordon VAPT logo

Automated vuln scanning & penetration testing

learn more
VAPT platform that identifies, validates, and prioritizes vulnerabilities across web, API, cloud, and network environments using automated scanning and expert testing, with actionable remediation guidance and continuous monitoring to reduce risk.

Read more about Gordon VAPT

Users also considered
Amazon Inspector logo

Vulnerability Management for EC2 and ECR.

learn more
Amazon Inspector is a vulnerability management solution that helps businesses scan AWS workloads to expose and identify vulnerabilities, enhance the security and compliance of applications across AWS, and meet compliance requirements.

Read more about Amazon Inspector

Users also considered
blacklens.io logo

Discover vulnerabilities before attackers do.

learn more
Blacklensio is a platform that combines advanced penetration testing with proactive techniques like darknet monitoring, attack surface management, and vulnerability scanning to identify potential attack vectors early. By taking this comprehensive approach, it aims to not only detect costly cyber incidents but actively prevent them.

Read more about blacklens.io

Users also considered
Praetorian Guard logo

Continuous offensive security

learn more
Continuous offensive security. Agentic AI plus the top 1% of offensive operators. Attacker-verified.

Read more about Praetorian Guard

Users also considered
Visiativ Cyber logo

Cybersecurity solution for handling IT security

learn more
Visiativ Cyber specializes in safeguarding and fortifying the company's web applications. It employs a proactive approach that mitigates risks and vulnerabilities and fosters active engagement from all company stakeholders by offering valuable recommendations and effective solutions.

Read more about Visiativ Cyber

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered