getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software

Define levels of authorization for access to specific files or systems

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


199 software options

NinjaOne logo

Unified endpoint management & IT automation platform

visit website
NinjaOne helps IT teams identify and remediate vulnerabilities via endpoint monitoring, patch management, and device configuration hardening. Leverage fast, fully automated patching for Windows, macOS, and Linux OS, as well as numerous third-party applications to minimize potential exposure.

Read more about NinjaOne

Users also considered
Netwrix Threat Prevention logo

Prevent threats from becoming breaches

visit website
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix Threat Prevention

Users also considered
Rencore Governance logo

M365, Copilot, Agent, & Power Platform governance done right

visit website
Rencore's award-winning Microsoft 365, Copilot, Agent, and Power Platform governance tool helps orgainzations of all sizes control their costs, risks, compliance and innovation speed in order to remain competitive in the modern digital working reality.

Read more about Rencore Governance

Users also considered
Action1 logo

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
Iru logo

Collapse the IT stack with Iru.

learn more
AI-powered platform that unifies identity, endpoints, and compliance—giving IT teams time and control back.

Read more about Iru

Users also considered
runZero logo

Asset inventory and network visibility for security and IT.

learn more
runZero provides asset inventory and network visibility for security and IT teams.

Read more about runZero

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
CyLock EVA logo

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock EVA

Users also considered
Hackrate logo

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate

Users also considered
RoboShadow logo

Global Vulnerability Scanner. Cyber Security, Demystified.

learn more
Get a complete Internal & External Vulnerability Assessment for Free for your organisation or network. The RoboShadow Vulnerability Scanner platform give you all the main Cyber Security assessment tests that are common in Penetration Testing, Cyber Certifications and used by bad guys themselves.

Read more about RoboShadow

Users also considered
GlitchSecure logo

Real-time Continuous Security Testing

learn more
GlitchSecure is a cloud-based vulnerability scanner, which helps small to large businesses in healthcare, technology, and other sectors streamline continuous security testing via penetration testing, real-time notifications, automated reporting, and more. The platform offers various features such as vulnerability assessment, remediation verification, data dashboards, collaboration tools, and APIs.

Read more about GlitchSecure

Users also considered
CanIPhish logo

Simulate Phishing Threats And Train Your Employees

learn more
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.

Read more about CanIPhish

Users also considered
Runecast logo

AI-powered platform for Security and Compliance

learn more
Runecast is a provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises rely on Runecast for proactive risk mitigation, security compliance, operational efficiency & mission-critical stability. To add proactiveness to your IT strategy, visit www.runecast.com

Read more about Runecast

Users also considered
Rubrik logo

All Your Apps. Instantly Available.

learn more
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!

Read more about Rubrik

Users also considered
Cyber Chief logo

Release cloud software with zero known vulnerabilities

learn more
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero known security vulnerabilities

Read more about Cyber Chief

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
vRx logo

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Astra Pentest logo

Continuous Pentests (VAPT) that scales with your dev velocit

learn more
AI Powered offensive Pentest Platform

Read more about Astra Pentest

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

learn more
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
Centraleyezer logo

Vulnerability management software

learn more
Centraleyezer is a vulnerability tracking solution which provides centralized dashboards and reporting.

Read more about Centraleyezer

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Do you know the vulnerabilities (CVEs) in your IT infrastructure? With Enginsight's vulnerability scanner, you can see the affected assets 24/7 and patch them immediately (also automatically) and in a targeted manner according to prioritisation.

Read more about Enginsight

Users also considered

Popular vulnerability management comparisons