App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Vulnerability Management Software with Anomaly/Malware Detection

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

27 software options

Sponsored

Personalize your search

Any industry

Any business size

Invicti logo
4.7
(18)

Security scanning & vulnerability management

visit website
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.

Read more about Invicti

Users also considered
Shinobi Defense System logo
(0)

Data loss prevention software

visit website
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
Malwarebytes for Business logo
4.7
(2.4K)

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
WebTitan logo
4.5
(258)

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Orca Security logo
4.8
(56)

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
Syxsense logo
4.6
(61)

Unified Security and Endpoint Management

learn more
Syxsense delivers comprehensive vulnerability management, including security configuration management. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.

Read more about Syxsense

Users also considered
Falcon logo
4.7
(33)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
AppTrana logo
4.6
(24)

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
ESET PROTECT MDR logo
4.8
(16)

Future ready protection for enterprise

learn more
Airtight protection of your IT environment,
with complete cyber risk management and
world-class ESET expertise on call.

Read more about ESET PROTECT MDR

Users also considered
EcoTrust logo
4.9
(14)

Prioritizing Critical Cyber Risks for Business

learn more
EcoTrust introduces an innovative CAASM platform that redefines cybersecurity by focusing on prioritizing critical business risks. Our solution offers a consolidated view of vulnerabilities and attack surfaces, employing advanced AI to filter out noise and concentrate on what truly matters, enabling

Read more about EcoTrust

Users also considered
Probely logo
4.9
(13)

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
Netsurion logo
3.6
(23)

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
Bytesafe logo
4.6
(7)

Source code and vulnerability management platform

learn more
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.

Read more about Bytesafe

Users also considered
Uptycs logo
4.7
(6)

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
VulScan logo
4.0
(9)

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Aikido Security logo
4.6
(5)

System for identifying and managing code vulnerabilities

learn more
Protect your source code against any vulnerabilities with Aikido's all-in-one security app. We scan your source code, containers & cloud to five you an overview of vulnerabilities and risks, triaging the ones that are important to solve and filtering out false positives.

Read more about Aikido Security

Users also considered
CyberCAST logo
5.0
(1)

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Carbon Black Cloud Workload logo
5.0
(1)

Vulnerability management solution

learn more
The Carbon Black Cloud Workload is a purpose-built vulnerability management solution for securing data centers. It helps users reduce the attack surface and protect critical applications, systems and networks from cyber threats.

Read more about Carbon Black Cloud Workload

Users also considered
CloudJacketXi logo
5.0
(1)

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
CloudJacketXi is a managed security-as-a-service platform designed to help SMBs to mid-market enterprises detect and respond to cybersecurity threats. It lets IT teams ensure protection against data breaches by monitoring the organization's network in real-time.

Read more about CloudJacketXi

Users also considered
Trava logo
5.0
(1)

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
tbVA logo
(0)

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
RoboShadow logo
(0)

Global Vulnerability Scanner. Cyber Security, Demystified.

learn more
Get a complete Internal & External Vulnerability Assessment for Free for your organisation or network. The RoboShadow Vulnerability Scanner platform give you all the main Cyber Security assessment tests that are common in Penetration Testing, Cyber Certifications and used by bad guys themselves.

Read more about RoboShadow

Users also considered
Brandefense logo
(0)

Cloud-based threat intelligence tool for data security.

learn more
Brandefense is a cloud-based digital risk protection suite that helps organizations track and manage cyber threats. The platform helps protect systems from potential risks via threat identification, real-time threat alerts, and continuous monitoring.

Read more about Brandefense

Users also considered
Secomea logo
(0)

Secure Remote Access solution purpose-built for OT equipment

learn more
Secomea is a Secure Remote Access (SRA) solution purpose-built for industrial networks and OT equipment.
Over 9.500 customers around the world use it every day across thousands of sites to manage remote access to their machines and prevent downtime.
Let us help you defend your factory floor.

Read more about Secomea

Users also considered
tbSIEM logo
(0)

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered