getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Vulnerability Protection (2026)

Last updated: April 2026

Filter results

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


99 software options

Aikido Security logo

Unified cybersecurity software

visit website
Secure your code, cloud, and runtime environments in one central system.
Find and fix vulnerabilities fast.

Features include SAST, DAST, SCA, IaC, CSPM, Container Security, Malware detection, Runtime Protection, License risk and more.

Read more about Aikido Security

Users also considered
Netwrix Threat Prevention logo

Prevent threats from becoming breaches

visit website
Spot threats early and block critical IT risks with Netwrix StealthINTERCEPT.

Read more about Netwrix Threat Prevention

Users also considered
vRx logo

Simplified Vulnerability Remediation

visit website
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Nanitor logo

Vulnerability management solution

visit website
Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across global IT infrastructure.

Read more about Nanitor

Users also considered
Heimdal Patch & Asset Management logo

Innovative Patch Management. Anytime. Anywhere.

visit website
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux, MacOS and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.

Read more about Heimdal Patch & Asset Management

Users also considered
Reveelium logo

Detection and response solution

learn more
Reveelium helps users reduce the impact of incidents by responding quickly to threats with behavioral analysis, threat Intelligence, correlation and alert prioritization.

Read more about Reveelium

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
tbSIEM logo

Discover Real Threats in Real-time

learn more
Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis. Unified event correlation and risk management for modern networks.

The solution that provides real-time analysis of security alerts generated by applications and network hardware.

Read more about tbSIEM

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
Plexicus logo

Cloud native application protection platform

learn more
Plexicus is an AI-powered cybersecurity platform for ASPM and CNAPP that automates the vulnerability management lifecycle. It identifies, prioritizes, and auto-remediates security risks by generating code fixes.

Read more about Plexicus

Users also considered
Hide My WP Ghost logo

Cloud-based vulnerability management platform

learn more
WP Ghost uncovers and helps you fix key WordPress vulnerabilities before hackers exploit them. Get clear reports, one-click fixes, and continuous monitoring — so your site stays secure, resilient, and protected around the clock.

Read more about Hide My WP Ghost

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Tenable Cloud Security logo

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Tenable Cloud Security

Users also considered
BIMA logo

Unifying Cybersecurity, Simplifying Protection

learn more
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Read more about BIMA

Users also considered
Pathlock logo

Leader in Compliance-Centric Identity Governance

learn more
Pathlock automates security controls, detecting misconfigurations, and enforcing policies in SAP ERP. It reduces vulnerabilities, ensures compliance, and protects critical business processes across hybrid IT environments.

Read more about Pathlock

Users also considered
Nipper logo

Close security gaps with proactive assessments

learn more
Nipper is a network configuration audit tool that helps close critical security and compliance gaps. It analyzes configurations with the precision of a penetration tester, providing exception-based security reporting, evidence-based compliance reporting, risk-prioritized views of non-compliances, and remediation analysis to improve compliance posture.

Read more about Nipper

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
HTTPCS Security logo

Next-Gen Vulnerability Scanner for websites and web apps

learn more
SECURITY, the Online Web Vulnerability Scanner allows you to detect vulnerabilities and scan security vulnerabilities of your Websites and Apps.

Read more about HTTPCS Security

Users also considered
IKare logo

France-based vulnerability management solution

learn more
IKare is a France-based tool that automates the implementation of security best practices and vulnerability management. You get a simple network monitoring solution, as well as quick management and easy control of key security factors. IKare allows organizations to easily create and organize virtual groups for servers that serve the same function or comply with the same compliance constraints.

Read more about IKare

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Xygeni Security logo

Real Risk. Real Control. From Code to Cloud

learn more
Xygeni Vulnerability Management delivers AI-driven visibility across code, dependencies, CI/CD, infrastructure, and containers. It prioritizes real, exploitable risk, reduces alert fatigue, and accelerates remediation with unified ASPM context and automation.

Read more about Xygeni Security

Users also considered
ManageEngine Vulnerability Manager Plus logo

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Threatspy logo

Reinventing Application Security

learn more
Developer-first Application & API Security Management Platform

Read more about Threatspy

Users also considered
Nessus logo

Vulnerability assessment solution for security practitioners

learn more
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.

Read more about Nessus

Users also considered