App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Vulnerability Management Software

191 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Invicti logo

Invicti

4.7
(18)

Security scanning & vulnerability management

visit website
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Chariot logo

Chariot

(0)

Cybersecurity platform on the offensive.

visit website
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Astra Pentest logo

Astra Pentest

4.9
(7)

Vulnerability management made simple!

visit website
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 8000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.

Read more about Astra Pentest

Users also considered
Kiuwan logo

Kiuwan

4.4
(35)

Security Solutions for your DevOps Process

visit website
We provide a Software Security platform designed to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. SAST and open source management of your entire portfolio.

Read more about Kiuwan

Users also considered
Heimdal Patch & Asset Management logo

Heimdal Patch & Asset Management

4.6
(37)

Innovative Patch Management. Anytime. Anywhere.

visit website
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux, MacOS and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.

Read more about Heimdal Patch & Asset Management

Users also considered
NorthStar logo

NorthStar

(0)

Risk-Based Vulnerability Management

visit website
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered
Centraleyezer logo

Centraleyezer

4.9
(11)

Vulnerability management software

visit website
Centraleyezer is a vulnerability tracking solution which provides centralized dashboards and reporting.

Read more about Centraleyezer

Users also considered
Pentera logo

Pentera

5.0
(2)

Emulating real-life attacks on all cybersecurity layers

visit website
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Shinobi Defense System logo

Shinobi Defense System

(0)

Data loss prevention software

visit website
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
Rencore Governance logo

Rencore Governance

4.7
(14)

Rencore is an automation tool for Microsoft 365 Governance

visit website
With Rencore, users can automate Microsoft 365 Governance, ranging from mid-level businesses to large enterprises worldwide while providing maximum flexiblity. Rencore integrates with Microsoft Teams, SharePoint, Azure, and Power Platform and is used for monitoring end-user acivity, governance planning, automated fixing and deviation discovery.

Read more about Rencore Governance

Users also considered
NinjaOne logo

NinjaOne

4.8
(193)

The Easiest-to-Use Unified IT Operations Solution

visit website
NinjaOne helps IT teams identify and remediate vulnerabilities via endpoint monitoring, patch management, and device configuration hardening. Leverage fast, fully automated patching for Windows, macOS, and Linux OS, as well as numerous third-party applications to minimize potential exposure.

Read more about NinjaOne

Users also considered
Nanitor logo

Nanitor

(0)

Vulnerability management solution

visit website
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
Automox logo

Automox

4.8
(71)

Cloud-based platform for patch management

visit website
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.

Read more about Automox

Users also considered
vRx logo

vRx

4.9
(19)

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
FlexNet Code Insight logo

FlexNet Code Insight

(0)

Vulnerability management tool for legal and security teams

visit website
FlexNet Code Insight is designed to help development, legal, and security teams handle open source software (OSS) through automated scans. It enables organizations to manage license compliance and security risks by identifying vulnerabilities during the entire application production lifecycle.

Read more about FlexNet Code Insight

Users also considered
Netwrix StealthINTERCEPT logo

Netwrix StealthINTERCEPT

(0)

Prevent threats from becoming breaches

visit website
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix StealthINTERCEPT

Users also considered
ESET PROTECT MDR logo

ESET PROTECT MDR

4.8
(15)

Future ready protection for enterprise

visit website
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
FractalScan Surface logo

FractalScan Surface

4.8
(11)

Identify your vulnerabilities before the hackers.

visit website
FractalScan Surface is a passive attack surface management tool that has been designed to help IT teams protect their online infrastructure fast.

Scan the internet to discover your online infrastructure, assets and shadow IT.

Check for misconfigurations, security vulnerabilities & exposed data.

Read more about FractalScan Surface

Users also considered
Xygeni logo

Xygeni

(0)

End to end Software Supply Chain Security

visit website
Xygeni offers complete visibility, enabling a systematic process for assessing the risks associated with the SSC, identifying and prioritizing the most critical components, evaluating and improving their global and detailed security posture at an effective and efficient effort, time and cost.

Read more about Xygeni

Users also considered
Quadrant XDR logo

Quadrant XDR

5.0
(4)

Intelligent Action. Rapid Response.

visit website
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Malwarebytes for Business logo

Malwarebytes for Business

4.7
(2.3K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
PDQ Deploy & Inventory logo

PDQ Deploy & Inventory

4.8
(330)

Created by sysadmins, for sysadmins.

learn more
PDQ Deploy is the best way to automate your patch management. Update third-party software, deploy custom scripts, and make impactful configuration changes in minutes. With 200+ ready-to-deploy applications right out of the box.

Read more about PDQ Deploy & Inventory

Users also considered
WebTitan logo

WebTitan

4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Nessus logo

Nessus

4.7
(83)

Vulnerability assessment solution for security practitioners

learn more
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.

Read more about Nessus

Users also considered
Phoenix Security logo

Phoenix Security

4.7
(74)

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered