getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Reporting/Analytics (2026) - Page 6

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


142 software options

Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
NXT1 LaunchIT logo

Zero-Friction, Secure SaaS Delivery

learn more
Get the fastest time to revenue available and government-level security with NXT1 LaunchIT, the world’s first 100% serverless, SaaS deployment and management platform. Go from code to published SaaS in 15 minutes.

Read more about NXT1 LaunchIT

Users also considered
Cavelo Attack Surface Management logo

Cloud-based attack surface management software for MSPs

learn more
Cavelo is a cloud-based attack surface management software that assists managed service providers (MSPs) with cybersecurity management. Key features include data classification, asset discovery, identity access and vulnerability management.

Read more about Cavelo Attack Surface Management

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Amazon Inspector logo

Vulnerability Management for EC2 and ECR.

learn more
Amazon Inspector is a vulnerability management solution that helps businesses scan AWS workloads to expose and identify vulnerabilities, enhance the security and compliance of applications across AWS, and meet compliance requirements.

Read more about Amazon Inspector

Users also considered
Shinobi Defense System logo

Data loss prevention software

learn more
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
NorthStar logo

Risk-Based Vulnerability Management

learn more
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
Sn1per logo

Get an attacker’s view of your organization!

learn more
Introducing Sn1per Professional – the leading security scanning solution to discover hidden vulnerabilities and assets in your environment.

Read more about Sn1per

Users also considered
Hackuity logo

Risk-Based Vulnerability Management Cockpit

learn more
Hackuity is a comprehensive security solution that orchestrates and automates the vulnerability management process.

Read more about Hackuity

Users also considered
Pathlock logo

Leader in Compliance-Centric Identity Governance

learn more
Pathlock automates security controls, detecting misconfigurations, and enforcing policies in SAP ERP. It reduces vulnerabilities, ensures compliance, and protects critical business processes across hybrid IT environments.

Read more about Pathlock

Users also considered
teamplay Fleet logo

Cloud-based equipment maintenance tool for healthcare teams.

learn more
teamplay Fleet is a cloud-based equipment maintenance solution that helps healthcare organizations manage maintenance schedules, asset security, vulnerability reporting, and more. With teamplay Fleet's comprehensive range of features, users can gain clear visibility into equipment data, maintain optimal performance, and make informed decisions. The platform also helps secure equipment data and integrate with select service management software.

Read more about teamplay Fleet

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
Akto logo

API Security Platform for Modern Appsec teams

learn more
Akto is an industry-leading solution for API discovery, API security posture management, sensitive data exposure, API security testing.

Read more about Akto

Users also considered
Cyble Vision logo

AI-powered threat intelligence platform

learn more
Cyble Vision is an AI-powered threat intelligence platform that proactively monitors the surface, deep, and dark web to analyze and mitigate cyber risks. It provides real-time visibility into emerging threats.

Read more about Cyble Vision

Users also considered
Ivanti Neurons for RBVM logo

Risk-based vulnerability management platform

learn more
Ivanti Neurons for RBVM is a patch management solution that helps organizations evolve vulnerability management strategy to a risk-based approach. The solution enables prioritization of vulnerabilities and weaknesses that pose the most risk, allowing organizations to protect against ransomware and other cyber threats.

Read more about Ivanti Neurons for RBVM

Users also considered
Kikimora logo

Cloud-based platform for managing vulnerabilities

learn more
Kikimora is a cybersecurity platform that automates threat detection, vulnerability scanning, and compliance tracking. It provides real-time monitoring, customizable dashboards, and a centralized security hub, making it easier to manage security operations. Free consulting hours are included.

Read more about Kikimora

Users also considered