getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with AI/Machine Learning (2026)

Last updated: February 2026

Key features of Vulnerability Management Software

Based on GetApp's analysis of verified user reviews collected between July 2021 and August 2024.

  • Vulnerability/Threat Prioritization: Reviewers value the ability to focus on critical vulnerabilities, saving time by filtering noise and using CVSS scoring for effective threat management. 99% of reviewers rated this feature as important or highly important.
  • Patch Management: Users appreciate the ease of automating patch deployment, updating third-party software, and customizing patches to maintain secure systems. 97% of reviewers rated this feature as important or highly important.
  • Vulnerability Scanning: Users highlight the efficiency of automated scans, quick identification of vulnerabilities, and comprehensive reporting to secure systems. 96% of reviewers rated this feature as important or highly important.
  • Vulnerability Assessment: Reviewers find value in detailed vulnerability identification and prioritization, with clear remediation guidance and integration with popular scanners. 94% of reviewers rated this feature as important or highly important.
  • Risk Assessment: Reviewers focus on the importance of identifying high-risk areas and prioritizing efforts, with actionable insights and effective dashboards. 94% of reviewers rated this feature as important or highly important.
  • Alerts/Notifications: Users benefit from real-time alerts, customizable notifications, and preconfigured alerts to stay informed about potential threats and necessary actions. 86% of reviewers rated this feature as important or highly important.
1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


38 software options

Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

visit website
Fidelis Elevate is a cloud-based XDR Solution that delivers endpoint security, network security, deception, and Active Directory protection in a single platform.

Read more about Fidelis Elevate

Users also considered
vRx logo

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
CloudJacket MDR logo

Managed Cybersecurity Platform with 24/7 SOC Monitoring

visit website
In today's digital landscape, organizations face an ever-evolving array of cyber threats. Secnap's CloudJacket MDR offers a comprehensive, AI-augmented security solution that combines advanced technology with 24/7 expert monitoring, delivering robust protection.

Read more about CloudJacket MDR

Users also considered
Nanitor logo

Vulnerability management solution

visit website
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
CyLock EVA logo

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock EVA

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
Runecast logo

AI-powered platform for Security and Compliance

learn more
Runecast is a provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises rely on Runecast for proactive risk mitigation, security compliance, operational efficiency & mission-critical stability. To add proactiveness to your IT strategy, visit www.runecast.com

Read more about Runecast

Users also considered
Acunetix logo

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a vulnerability management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation.

Read more about Acunetix

Users also considered
AppTrana logo

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
EcoTrust logo

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
ESET PROTECT MDR logo

Future ready protection for enterprise

learn more
ESET's MDR offers 24/7 managed detection and response to secure businesses +250 people by addressing vulnerabilities.

Read more about ESET PROTECT MDR

Users also considered
IncMan SOAR logo

Security orchestration, automation and response platform

learn more
IncMan SOAR is a cloud-based and on-premise platform, which enables enterprises to manage, evaluate, and plan various security operation tasks such as threat hunting and investigation, triage and escalation, incident qualification, and more using machine learning and automation capabilities.

Read more about IncMan SOAR

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Alert Logic MDR logo

Managed detection and response (MDR) platform

learn more
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.

Read more about Alert Logic MDR

Users also considered
HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
SilverSky Managed Security Services logo

Security device monitoring and management

learn more
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.

Read more about SilverSky Managed Security Services

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Do you know the vulnerabilities (CVEs) in your IT infrastructure? With Enginsight's vulnerability scanner, you can see the affected assets 24/7 and patch them immediately (also automatically) and in a targeted manner according to prioritisation.

Read more about Enginsight

Users also considered
Machine Learning on AWS logo

Machine learning and AI solutions from AWS

learn more
AWS provides machine learning (ML) and artificial intelligence (AI) solutions designed to help businesses analyze data insights, personalize the customer experience, optimize business processes, and more.

Read more about Machine Learning on AWS

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered