getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


153 software options

Aikido Security logo

Unified cybersecurity software

visit website
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Netwrix Threat Prevention logo

Prevent threats from becoming breaches

visit website
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix Threat Prevention

Users also considered
NorthStar logo

Risk-Based Vulnerability Management

visit website
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered
Red Sentry logo

Human-Led Penetration Testing, Done Right

visit website
Human-led, AI-assisted penetration testing that helps teams validate real security risks across applications, cloud environments, and networks.

Read more about Red Sentry

Users also considered
Nanitor logo

Vulnerability management solution

visit website
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
Heimdal Patch & Asset Management logo

Innovative Patch Management. Anytime. Anywhere.

visit website
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux, MacOS and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.

Read more about Heimdal Patch & Asset Management

Users also considered
Shinobi Defense System logo

Data loss prevention software

visit website
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
NinjaOne logo

Unified endpoint management & IT automation platform

visit website
NinjaOne helps IT teams identify and remediate vulnerabilities via endpoint monitoring, patch management, and device configuration hardening. Leverage fast, fully automated patching for Windows, macOS, and Linux OS, as well as numerous third-party applications to minimize potential exposure.

Read more about NinjaOne

Users also considered
Rencore Governance logo

M365, Copilot, Agent, & Power Platform governance done right

visit website
Rencore's award-winning Microsoft 365, Copilot, Agent, and Power Platform governance tool helps orgainzations of all sizes control their costs, risks, compliance and innovation speed in order to remain competitive in the modern digital working reality.

Read more about Rencore Governance

Users also considered
vRx logo

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

visit website
Fidelis Elevate is a cloud-based XDR Solution that delivers endpoint security, network security, deception, and Active Directory protection in a single platform.

Read more about Fidelis Elevate

Users also considered
Fidelis Halo logo

Cloud security software

visit website
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

visit website
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Zscaler logo

Secure your users, apps and data with Zero Trust + AI.

learn more
Zscaler is a cloud-native security platform offering Zero Trust access, advanced threat protection, and DLP for secure digital transformation. It protects users, apps & data by enabling secure web access, securing cloud apps & preventing cyber threats, all while simplifying IT operations at scale.

Read more about Zscaler

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream IT and cyber risk management solution empowers organizations to adopt a strategic, business-driven approach to effectively manage and mitigate IT and cyber risks

Read more about MetricStream CyberGRC

Users also considered
Lansweeper logo

Know Your IT

learn more
Lansweeper is an IT Asset Management solution that provides network discovery of all connected devices, users, and software within your IT estate. Lansweeper's advanced device recognition capabilities allow for complete visibility across your entire IT estate, in one centralized IT inventory.

Read more about Lansweeper

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
baramundi Management Suite logo

IT asset management for small and midsize businesses (SMB)

learn more
baramundi Management Suite is an IT asset management software designed to help businesses manage and protect endpoints across multiple corporate networks. Administrators can track application usage and manage licenses on a unified interface.

Read more about baramundi Management Suite

Users also considered
KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
Akto logo

API Security Platform for Modern Appsec teams

learn more
Akto is an industry-leading solution for API discovery, API security posture management, sensitive data exposure, API security testing.

Read more about Akto

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered

Popular vulnerability management comparisons