getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Risk Management (2026) - Page 4

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


119 software options

Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to detect, prioritize, and manage remediate vulnerabilities across their cloud environments.

Read more about Wiz

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
MetricStream CyberGRC logo

IT Risk identification and assessment management software

learn more
MetricStream IT and cyber risk management solution empowers organizations to adopt a strategic, business-driven approach to effectively manage and mitigate IT and cyber risks

Read more about MetricStream CyberGRC

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered
Cyber Hawk logo

Cybersecurity platform

learn more
Cyber Hawk is the enabling technology that allows businesses to begin offering new, high-value internal cybersecurity services to all clients.

Read more about Cyber Hawk

Users also considered
Netwrix Change Tracker logo

Gain confidence in systems integrity

learn more
Netwrix Change Tracker is an IT security and compliance management platform, which helps enterprises track and validate changes to configurations, files, and performance of devices. Features include threat intelligence, intrusion detection, and agent-based and agentless integrity monitoring.

Read more about Netwrix Change Tracker

Users also considered
HTTPCS Security logo

Next-Gen Vulnerability Scanner for websites and web apps

learn more
SECURITY, the Online Web Vulnerability Scanner allows you to detect vulnerabilities and scan security vulnerabilities of your Websites and Apps.

Read more about HTTPCS Security

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
Skybox Vulnerability Control logo

Threat-centric vulnerability management

learn more
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast.

Read more about Skybox Vulnerability Control

Users also considered
ThreadFix  logo

Vulnerability management & risk prioritization platform

learn more
ThreadFix is a vulnerability management solution designed to help businesses consolidate test results and prioritize risk decisions. Software development and server operation teams can export vulnerability data into defect tracking and ticketing systems to resolve discovered vulnerabilities.

Read more about ThreadFix

Users also considered
RedShield logo

Cybersecurity and vulnerability management software

learn more
RedShield is a cybersecurity software designed to help government agencies and businesses across healthcare and finance industries streamline network security and risk assessment operations using artificial intelligence (AI) technology. It enables IT teams to identify and remove vulnerabilities from online applications and APIs, perform penetration tests, and hide business logic flaws from attackers using object codes.

Read more about RedShield

Users also considered
Cyberwatch Vulnerability Manager logo

Vulnerability and asset inventory management software

learn more
Cyberwatch Vulnerability Manager is a security solution designed to help organizations track and manage vulnerabilities across network equipment, servers, devices, websites, workstations, and docker images via a unified portal. The platform lets users maintain an inventory of technologies and automatically captures and stores details about system issues, detection history, and remediation date.

Read more about Cyberwatch Vulnerability Manager

Users also considered
Seeker logo

Build secure, high-quality software faster.

learn more
An easy-to-use, enterprise scale IAST solution that accurately identifies and verifies vulnerabilities in running web applications and microservices.

Read more about Seeker

Users also considered
StorageGuard logo

Your data isn’t secure, unless your storage & backup are.

learn more
The industry’s ONLY Vulnerability Management solution for enterprise storage & backup systems.

Read more about StorageGuard

Users also considered
Code Dx logo

Correlate, prioritize, and remediate with Code Dx.

learn more
Code Dx automates application security processes across the SDLC. It determines the appropriate tests to execute, then correlates results and prioritizes vulnerabilities. Users get a complete picture of risk visibility for their organization's entire software portfolio on one centralized platform.

Read more about Code Dx

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
v6Protect logo

Web Application Security

learn more
v6Protect, French independent cyber security editor, offer an innovative, non-intrusive solution, in SaaS mode, allowing to easily monitor the security of web applications.

Read more about v6Protect

Users also considered
Shinobi Defense System logo

Data loss prevention software

learn more
Shinobi Defense System is a data loss prevention software that helps businesses manage whitelisting, set up automatic data encryption, configure internet access restrictions, and more from within a unified platform. It allows staff members to utilize the built-in search and filter functionality to consolidate and view log events and unexpected events across multiple endpoints.

Read more about Shinobi Defense System

Users also considered
Compliance Foresight logo

Scalable GRC Framework for Enterprise

learn more
A scalable GRC framework for enterprise , fast , easy, quick modules for cyber security compliances. Automated Reports, Business Logics and inbuilt workflows are the key highlights of the solution.

Read more about Compliance Foresight

Users also considered
Blacklock logo

Cybersecurity testing and monitoring platform

learn more
Blacklock’s award-winning self-service continuous penetration testing platform transforms vulnerability management by delivering real-time, automated, and scalable testing. It empowers organizations to continuously detect, prioritize, and remediate vulnerabilities with precision and cost efficiency.

Read more about Blacklock

Users also considered
tbVA logo

Cloud-based vulnerability management software

learn more
tbVA is a cloud-based vulnerability management software that helps businesses in finance, IT, retail, healthcare, manufacturing, telecommunications, and other industries detect security breaches, evaluate risks, and more from a unified platform. It lets staff members collect compliance data, analyze network environments, and receive potential threat alerts.

Read more about tbVA

Users also considered
Cytellix logo

One Platform. One Truth. Risk Managed. Risk Controlled.

learn more
The Cyber Watch Platform is the ONLY SaaS platform that integrates compliance, risk management, managed detection and response, and trusted expertise to maximize visibility, minimize risk & threats, and cut costs.

Read more about Cytellix

Users also considered
Chariot logo

Cybersecurity platform on the offensive.

learn more
Chariot provides customers with the tools needed to assess their current state of cyber threat posture, respond quickly in case of a breach and manage their evolving security needs.

Read more about Chariot

Users also considered
STORM logo

IT security management solution for organizations

learn more
STORM is a cloud-based IT security management system designed to assist cyber security teams within organizations with tracking and management of network issues. Key features include workflow automation, message authentication, secure digital signatures, resource planning, and reporting.

Read more about STORM

Users also considered
NorthStar logo

Risk-Based Vulnerability Management

learn more
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.

Read more about NorthStar

Users also considered