getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Dashboard (2026) - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


79 software options

Security Manager by FireMon logo

Manage Policy, Ensure Compliance, Gain Visibility & Control

learn more
FireMon is a network security management solution for hybrid cloud that ?delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration.

Read more about Security Manager by FireMon

Users also considered
OpenText Application Security Aviator logo

Application security, data security, and threat detection.

learn more
Fortify enables businesses of all sizes to protect their applications, data and the rest of their assets from cyber criminals. With strategic outcomes ranging from DevSecOps to secure data analytics, Fortify helps enterprises gain visibility into their applications, detect threats quickly and defend against them effectively with automated incident response capabilities.

Read more about OpenText Application Security Aviator

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
AWS Shield logo

DDoS and vulnerability management software

learn more
AWS Shield is a DDoS and vulnerability management software that helps businesses detect attacks and automate inline mitigations to minimize application latency and downtime. It allows staff members to detect attacks at lower traffic thresholds to optimize application DDoS resiliency and minimize false-positive notifications.

Read more about AWS Shield

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
CybrHawk SIEM XDR logo

Transforming cybersecurity with unprecedented visibility

learn more
Delivering top-notch cybersecurity solutions to protect businesses from evolving threats. Stay ahead with our cutting-edge technologies, comprehensive services, and expert team. Visit www.cybrhawk.com for robust protection and peace of mind in the digital landscape.

Read more about CybrHawk SIEM XDR

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
ShadowKat logo

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
ThunderScan logo

SAST Application Security

learn more
ThunderScan by DefenseCode is a Static Application Security Testing (SAST) software that allows businesses to perform deep and extensive security analysis of various application source codes. ThunderScan can be integrated with existing CI/CD pipelines and DevOps environment, offering a platform that requires almost no user input, easy to use, and can be deployed during or after development.

Read more about ThunderScan

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Ostorlab logo

Cloud-based vulnerability management platform

learn more
Ostorlab is a cloud-based vulnerability management platform designed to help businesses detect, monitor, and remediate risks across enterprises' external attack surfaces.

Read more about Ostorlab

Users also considered
Compliance Foresight logo

Scalable GRC Framework for Enterprise

learn more
A scalable GRC framework for enterprise , fast , easy, quick modules for cyber security compliances. Automated Reports, Business Logics and inbuilt workflows are the key highlights of the solution.

Read more about Compliance Foresight

Users also considered
Pathlock logo

Leader in Compliance-Centric Identity Governance

learn more
Pathlock automates security controls, detecting misconfigurations, and enforcing policies in SAP ERP. It reduces vulnerabilities, ensures compliance, and protects critical business processes across hybrid IT environments.

Read more about Pathlock

Users also considered
TruOps logo

Experience the Ultimate in Risk Control.

learn more
Get holistic insight into your risk environment, improve resiliency, make smarter decisions, and streamline your internal processes.

Read more about TruOps

Users also considered
Seeker logo

Build secure, high-quality software faster.

learn more
An easy-to-use, enterprise scale IAST solution that accurately identifies and verifies vulnerabilities in running web applications and microservices.

Read more about Seeker

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
Akto logo

API Security Platform for Modern Appsec teams

learn more
Akto is an industry-leading solution for API discovery, API security posture management, sensitive data exposure, API security testing.

Read more about Akto

Users also considered
Hackuity logo

Risk-Based Vulnerability Management Cockpit

learn more
Hackuity is a comprehensive security solution that orchestrates and automates the vulnerability management process.

Read more about Hackuity

Users also considered
OpenText Automation Center logo

Vulnerability and risk management solution

learn more
Micro Focus Data Center Automation is a vulnerability management solution that enables businesses to automate the identification, prioritization, and remediation of noncompliant configurations and exposures. The software is designed to work both on-premises and in the cloud, providing businesses with the flexibility they need to manage their IT infrastructure.

Read more about OpenText Automation Center

Users also considered