getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Monitoring (2026) - Page 5

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


153 software options

Fidelis Elevate logo

Extended Detection and Response (XDR) Cybersecurity Platform

learn more
Fidelis Elevate is a cloud-based XDR Solution that delivers endpoint security, network security, deception, and Active Directory protection in a single platform.

Read more about Fidelis Elevate

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to detect, prioritize, and manage remediate vulnerabilities across their cloud environments.

Read more about Wiz

Users also considered
MeghOps logo

Innovating Cyber Horizons

learn more
MeghOps is a provider of all-in-one cyber security solutions. With the help of MeghOps cloud security platform, cloud security compliance, firewall, security services (Pentest, Phishing And Training etc.) and your overall cybersecurity can be managed without any hassle.

Read more about MeghOps

Users also considered
ShadowKat logo

External Attack Surface Management

learn more
ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.

Read more about ShadowKat

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream IT and cyber risk management solution empowers organizations to adopt a strategic, business-driven approach to effectively manage and mitigate IT and cyber risks

Read more about MetricStream CyberGRC

Users also considered
Fidelis Halo logo

Cloud security software

learn more
Fidelis Halo is a unified cloud security solution that helps businesses with cloud-native application protection, scalability, automation, and real-time visibility. The platform enables teams to automate security and compliance operations, facilitating rapid DevSecOps maturity.

Read more about Fidelis Halo

Users also considered
Netwrix Change Tracker logo

Gain confidence in systems integrity

learn more
Netwrix Change Tracker is an IT security and compliance management platform, which helps enterprises track and validate changes to configurations, files, and performance of devices. Features include threat intelligence, intrusion detection, and agent-based and agentless integrity monitoring.

Read more about Netwrix Change Tracker

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
HTTPCS Security logo

Next-Gen Vulnerability Scanner for websites and web apps

learn more
SECURITY, the Online Web Vulnerability Scanner allows you to detect vulnerabilities and scan security vulnerabilities of your Websites and Apps.

Read more about HTTPCS Security

Users also considered
RIPS  logo

Static code analysis tool for web application security

learn more
RIPS is a static code analysis solution that helps businesses of all sizes automate and manage security testing in Java & PHP applications, detect risks/threats and implement corrective actions. It enables users to maintain and monitor scores on configurations, security and quality of applications.

Read more about RIPS

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
PROsecure logo

Cloud security suite to protect against cyber attacks

learn more
PROsecure is a cloud security suite designed to help small and midsize enterprises (SMEs) protect data and applications from cyber-attack and hacking attempts.

Read more about PROsecure

Users also considered
Reflectiz logo

Digital Security for Websites

learn more
Reflectiz empowers businesses to make web applications safer by mitigating their digital risks without any website impact.

Read more about Reflectiz

Users also considered
FlexNet Code Insight logo

Vulnerability management tool for legal and security teams

learn more
FlexNet Code Insight is designed to help development, legal, and security teams handle open source software (OSS) through automated scans. It enables organizations to manage license compliance and security risks by identifying vulnerabilities during the entire application production lifecycle.

Read more about FlexNet Code Insight

Users also considered
Guardium Data Security Center logo

Comprehensive data security solution

learn more
IBM Guardium Data Security Center is a comprehensive solution that protects your data from current and emerging risks, including AI and cryptographic attacks. It offers a unified experience for security teams to collaborate, manage vulnerabilities, and streamline compliance. The product covers the full data security lifecycle, from discovery to remediation, across on-premises and cloud environments, structured and unstructured data.

Read more about Guardium Data Security Center

Users also considered
DarkSight logo

Vulnerability Assessment and Patch Management

learn more
DarkSight is a powerful solution that helps organizations identify and eliminate critical vulnerabilities in third-party applications and plugins.

Read more about DarkSight

Users also considered
StorageGuard logo

Your data isn’t secure, unless your storage & backup are.

learn more
The industry’s ONLY Vulnerability Management solution for enterprise storage & backup systems.

Read more about StorageGuard

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Amazon Inspector logo

Vulnerability Management for EC2 and ECR.

learn more
Amazon Inspector is a vulnerability management solution that helps businesses scan AWS workloads to expose and identify vulnerabilities, enhance the security and compliance of applications across AWS, and meet compliance requirements.

Read more about Amazon Inspector

Users also considered
Ostorlab logo

Cloud-based vulnerability management platform

learn more
Ostorlab is a cloud-based vulnerability management platform designed to help businesses detect, monitor, and remediate risks across enterprises' external attack surfaces.

Read more about Ostorlab

Users also considered
Shinobi Defense System logo

Data loss prevention software

learn more
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
Netwrix Threat Prevention logo

Prevent threats from becoming breaches

learn more
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix Threat Prevention

Users also considered