getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Monitoring (2026) - Page 3

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


153 software options

KACE logo

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered
SilverSky Managed Security Services logo

Security device monitoring and management

learn more
SilverSky Managed Security Services is a cloud-based cybersecurity platform that helps businesses monitor firewalls and automate remediation processes to handle threats. Features include routing, authentication, issue tracking, encryption, content filtering, log management, and analytics.

Read more about SilverSky Managed Security Services

Users also considered
Raynet One logo

Find out more on www.raynet-inc.com.

learn more
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.

TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.

Read more about Raynet One

Users also considered
Dark Web ID logo

Threat detection and monitoring for businesses and MSPs

learn more
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.

Read more about Dark Web ID

Users also considered
Appgate SDP logo

Zero Trust Security Access Platform

learn more
Appgate is secure access provider that delivers solutions that prevents complex threats and reduce operational costs, securing the lives of the people that rely on them.

Read more about Appgate SDP

Users also considered
Brandefense logo

Cloud-based threat intelligence tool for data security.

learn more
Brandefense is a cloud-based digital risk protection suite that helps organizations track and manage cyber threats. The platform helps protect systems from potential risks via threat identification, real-time threat alerts, and continuous monitoring.

Read more about Brandefense

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid streamlines vulnerability management by delivering continuous, detailed insights into your IT system’s security vulnerabilities, offering specific recommendations for improvement. This enables organizations to maintain robust security measures and manage software risks more effectively.

Read more about Sigrid

Users also considered
Enginsight logo

ALL-IN-ONE SECURITY PLATFORM for SMEs

learn more
Do you know the vulnerabilities (CVEs) in your IT infrastructure? With Enginsight's vulnerability scanner, you can see the affected assets 24/7 and patch them immediately (also automatically) and in a targeted manner according to prioritisation.

Read more about Enginsight

Users also considered
Netsurion logo

Complete Cybersecurity Confidence

learn more
Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business

Read more about Netsurion

Users also considered
PingSafe logo

All-in-One Cloud Security Platform

learn more
PingSafe is a cloud security platform that helps businesses manage regulatory compliance, system vulnerabilities, cloud credential leakage, and more. A comprehensive CNAPP that has all the necessary components to safeguard your multi-cloud environment and infrastructure.

Read more about PingSafe

Users also considered
Axonius logo

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
Bytesafe logo

Source code and vulnerability management platform

learn more
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.

Read more about Bytesafe

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock Vulnerability Management
identifies vulnerabilities on endpoints, make them visible and prevent potential malware attacks

Read more about DriveLock

Users also considered
Aikido Security logo

Unified cybersecurity software

learn more
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Sysdig logo

The Secure DevOps Company

learn more
Confidently secure containers, Kubernetes and cloud with the Sysdig Secure DevOps Platform. Scan images, detect and respond to threats, validate cloud posture and compliance, monitor and troubleshoot.

Read more about Sysdig

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Nanitor logo

Vulnerability management solution

learn more
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
BIMA logo

Unifying Cybersecurity, Simplifying Protection

learn more
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Read more about BIMA

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
Greenbone logo

Vulnerability management for security issue detection.

learn more
Greenbone is vulnerability management software for any-level sized businseses for security issue detection. Greenbone is based on open-source software which evaluates and analyzes IT networks, generating security reports, providing remediation advice. Greenbone also offers daily security updates which are atuomatic. The software is available as not only a cloud-based solution but also physical and virtual.

Read more about Greenbone

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered