getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


44 software options

Aikido Security logo

Unified cybersecurity software

visit website
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Shinobi Defense System logo

Data loss prevention software

visit website
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
vRx logo

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Plexicus logo

Cloud native application protection platform

learn more
Plexicus is an AI-powered cybersecurity platform for ASPM and CNAPP that automates the vulnerability management lifecycle. It identifies, prioritizes, and auto-remediates security risks by generating code fixes.

Read more about Plexicus

Users also considered
Hide My WP Ghost logo

Cloud-based vulnerability management platform

learn more
WP Ghost uncovers and helps you fix key WordPress vulnerabilities before hackers exploit them. Get clear reports, one-click fixes, and continuous monitoring — so your site stays secure, resilient, and protected around the clock.

Read more about Hide My WP Ghost

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
Teleport logo

Open-source Teleport Access Plane

learn more
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.

Read more about Teleport

Users also considered
Nessus logo

Vulnerability assessment solution for security practitioners

learn more
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.

Read more about Nessus

Users also considered
FlexNet Code Insight logo

Vulnerability management tool for legal and security teams

learn more
FlexNet Code Insight is designed to help development, legal, and security teams handle open source software (OSS) through automated scans. It enables organizations to manage license compliance and security risks by identifying vulnerabilities during the entire application production lifecycle.

Read more about FlexNet Code Insight

Users also considered
ManageEngine Vulnerability Manager Plus logo

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
Hexiosec ASM logo

Identify your vulnerabilities before the hackers.

learn more
Hexiosec ASM is a passive attack surface management solution designed to help businesses protect their online infrastructure.

Scan your business to discover your internet-connected infrastructure, assets, and shadow IT.

Check for vulnerabilities, misconfigurations and exposed data quickly.

Read more about Hexiosec ASM

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
CanIPhish logo

Simulate Phishing Threats And Train Your Employees

learn more
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.

Read more about CanIPhish

Users also considered
GuardRails logo

Application security software

learn more
With GuardRails, you can finally feel safe on every level of your security. The platform enhances development processes and gives developers control via its layered approach that shields them from code to the cloud for complete protection against attackers.

Read more about GuardRails

Users also considered
Lansweeper logo

Know Your IT

learn more
Lansweeper is an IT Asset Management solution that provides network discovery of all connected devices, users, and software within your IT estate. Lansweeper's advanced device recognition capabilities allow for complete visibility across your entire IT estate, in one centralized IT inventory.

Read more about Lansweeper

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
Pentest-Tools.com logo

Discover what's possible. Prove what's real.

learn more
From vulnerability scans to proof, Pentest-Tools.com gives 2,000+ security teams in 119 countries the speed, accuracy, and coverage to confidently validate and mitigate risks across their infrastructure (network, cloud, web apps, APIs).

Read more about Pentest-Tools.com

Users also considered
Snyk logo

Cloud-based security platform to track & fix vulnerabilities

learn more
Snyk is a cloud-based application security and testing platform, which helps enterprises discover and fix vulnerabilities across open source libraries, containers, or codes throughout the development process. Features include runtime monitoring, reporting, exploitability indicators, alerts, and prioritization.

Read more about Snyk

Users also considered
Sysdig logo

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
UpGuard logo

Cloud-based cybersecurity tool for vendor risk management.

learn more
UpGuard is a cloud-based risk and attack surface management platform that provides organizations visibility and control over their cyber risk. The solution provides a suite of features that enable security teams to identify, assess, and remediate risks across their entire vendor ecosystem and external attack surface.

Read more about UpGuard

Users also considered
AppTrana logo

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
Enzoic for Active Directory Lite logo

Free Password Auditing Tool

learn more
Identify weak, breached, and reused passwords in Active Directory within minutes. Backed by Enzoic’s threat intelligence, it provides a detailed report with actionable insights to improve security and reduce risks. It is fast, simple, and free to use.

Read more about Enzoic for Active Directory Lite

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered

Popular vulnerability management comparisons