getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


186 software options

Aikido Security logo

Unified cybersecurity software

visit website
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
NorthStar logo

Risk-Based Vulnerability Management

visit website
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

visit website
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
Nanitor logo

Vulnerability management solution

visit website
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
Heimdal Patch & Asset Management logo

Innovative Patch Management. Anytime. Anywhere.

visit website
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux, MacOS and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.

Read more about Heimdal Patch & Asset Management

Users also considered
NinjaOne logo

Unified endpoint management & IT automation platform

visit website
NinjaOne helps IT teams identify and remediate vulnerabilities via endpoint monitoring, patch management, and device configuration hardening. Leverage fast, fully automated patching for Windows, macOS, and Linux OS, as well as numerous third-party applications to minimize potential exposure.

Read more about NinjaOne

Users also considered
Rencore Governance logo

M365, Copilot, Agent, & Power Platform governance done right

visit website
Rencore's award-winning Microsoft 365, Copilot, Agent, and Power Platform governance tool helps orgainzations of all sizes control their costs, risks, compliance and innovation speed in order to remain competitive in the modern digital working reality.

Read more about Rencore Governance

Users also considered
vRx logo

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

visit website
Fidelis Elevate is a cloud-based XDR Solution that delivers endpoint security, network security, deception, and Active Directory protection in a single platform.

Read more about Fidelis Elevate

Users also considered
Fidelis Halo logo

Cloud security software

visit website
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

visit website
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream IT and cyber risk management solution empowers organizations to adopt a strategic, business-driven approach to effectively manage and mitigate IT and cyber risks

Read more about MetricStream CyberGRC

Users also considered
Deepinfo Attack Surface Platform logo

Know your attack surface. Empower your security.

learn more
Deepinfo Attack Surface Platform discovers all your digital assets, monitors them 24/7, detects any issues, and notifies you quickly so you can take immediate action.

Read more about Deepinfo Attack Surface Platform

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
Sonrai Public Cloud Security Platform logo

Identity and data governance management software

learn more
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.

Read more about Sonrai Public Cloud Security Platform

Users also considered
Sysdig logo

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
Lansweeper logo

Know Your IT

learn more
Lansweeper is an IT Asset Management solution that provides network discovery of all connected devices, users, and software within your IT estate. Lansweeper's advanced device recognition capabilities allow for complete visibility across your entire IT estate, in one centralized IT inventory.

Read more about Lansweeper

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered

Popular vulnerability management comparisons