App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software

Last updated: January 2025

226 software options

Invicti logo

Security scanning & vulnerability management

visit website
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

visit website
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
vRx logo

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Heimdal Patch & Asset Management logo

Innovative Patch Management. Anytime. Anywhere.

visit website
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux, MacOS and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.

Read more about Heimdal Patch & Asset Management

Users also considered
NinjaOne logo

Automate the hardest parts of IT with NinjaOne

visit website
NinjaOne simplifies IT management with powerful automation, empowering over 20,000 IT teams to enhance productivity, security, and control. From endpoint and patch management to remote access and backups, NinjaOne offers a user-friendly, scalable solution for modern IT challenges.

Read more about NinjaOne

Users also considered
Centraleyezer logo

Vulnerability management software

visit website
Centraleyezer is a vulnerability tracking solution which provides centralized dashboards and reporting, automated follow-ups, and escalation processes for tracking and managing vulnerabilities. The system is designed to facilitate collaboration between security analysts, managers, and asset owners.

Read more about Centraleyezer

Users also considered
Aikido Security logo

System for identifying and managing code vulnerabilities

visit website
Aikido Security is a security management system designed to help businesses streamline their security operations across code, containers & cloud vulnerabilities in a single dashboard.

Read more about Aikido Security

Users also considered
Rencore Governance logo

Rencore is an automation tool for Microsoft 365 Governance

visit website
With Rencore, users can automate Microsoft 365 Governance, ranging from mid-level businesses to large enterprises worldwide while providing maximum flexiblity. Rencore integrates with Microsoft Teams, SharePoint, Azure, and Power Platform and is used for monitoring end-user acivity, governance planning, automated fixing and deviation discovery.

Read more about Rencore Governance

Users also considered
Xygeni Security logo

Secure your Software Development and Delivery!

visit website
Xygeni offers complete visibility, enabling a systematic process for assessing the risks associated with the SSC, identifying and prioritizing the most critical components, evaluating and improving their global and detailed security posture at an effective and efficient effort, time and cost.

Read more about Xygeni Security

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

visit website
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
Action1 logo

Patching That Just Works

visit website
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

visit website
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Nanitor logo

Vulnerability management solution

visit website
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
NorthStar logo
(0)

Risk-Based Vulnerability Management

visit website
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered
Shinobi Defense System logo
(0)

Data loss prevention software

visit website
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
Astra Pentest logo

Vulnerability management made simple!

visit website
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 8000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

visit website
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Netwrix StealthINTERCEPT logo
(0)

Prevent threats from becoming breaches

visit website
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix StealthINTERCEPT

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
PDQ Deploy & Inventory logo

Created by sysadmins, for sysadmins.

learn more
PDQ Deploy is the best way to automate your patch management. Update third-party software, deploy custom scripts, and make impactful configuration changes in minutes. With 200+ ready-to-deploy applications right out of the box.

Read more about PDQ Deploy & Inventory

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
ACMP Suite logo

Keep clients running!

learn more
In a world full of unpredictability, choosing the right partner is crucial. We are your guide on the path to greater simplicity and efficiency. ACMP offers modular and scalable solutions for your specific challenges in the IT department.

Read more about ACMP Suite

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.

Read more about Automox

Users also considered
baramundi Management Suite logo

IT asset management for small and midsize businesses (SMB)

learn more
baramundi Management Suite is an IT asset management software designed to help businesses manage and protect endpoints across multiple corporate networks. Administrators can track application usage and manage licenses on a unified interface.

Read more about baramundi Management Suite

Users also considered
Nessus logo

Vulnerability assessment solution for security practitioners

learn more
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.

Read more about Nessus

Users also considered