getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software with Vulnerability/Threat Prioritization (2026) - Page 3

Last updated: April 2026

2 filters applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


72 software options

Enzoic for Active Directory Lite logo

Free Password Auditing Tool

learn more
Identify weak, breached, and reused passwords in Active Directory within minutes. Backed by Enzoic’s threat intelligence, it provides a detailed report with actionable insights to improve security and reduce risks. It is fast, simple, and free to use.

Read more about Enzoic for Active Directory Lite

Users also considered
Threatspy logo

Reinventing Application Security

learn more
Developer-first Application & API Security Management Platform

Read more about Threatspy

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
OpenText Application Security Aviator logo

Application security, data security, and threat detection.

learn more
Fortify enables businesses of all sizes to protect their applications, data and the rest of their assets from cyber criminals. With strategic outcomes ranging from DevSecOps to secure data analytics, Fortify helps enterprises gain visibility into their applications, detect threats quickly and defend against them effectively with automated incident response capabilities.

Read more about OpenText Application Security Aviator

Users also considered
Intruder logo

Vulnerability scanner that prevents security & data breaches

learn more
Intruder is a cloud-based vulnerability scanner which scans digital assets, identifies threats and generates reports. Designed for small to medium businesses, it assists users with automated assessments, bug tracking, patch management, network security, data encryption & hybrid penetration testing.

Read more about Intruder

Users also considered
Versio.io logo

CMDB, IT Asset Management, Governance, Security

learn more
Versio.io continuously and automatically detects and documents changes in businesses and IT landscapes. Data from third-party applications that companies use to run business processes, monitor the IT landscape and control IT service management can be seamlessly integrated.

Read more about Versio.io

Users also considered
Pentest-Tools.com logo

Discover what's possible. Prove what's real.

learn more
From vulnerability scans to proof, Pentest-Tools.com gives 2,000+ security teams in 119 countries the speed, accuracy, and coverage to confidently validate and mitigate risks across their infrastructure (network, cloud, web apps, APIs).

Read more about Pentest-Tools.com

Users also considered
CloudJacket MXDR logo

High-fidelity security where AI meets Human-validation.

learn more
High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.

Read more about CloudJacket MXDR

Users also considered
Autobahn Fit logo

Vulnerability Prioritization & Remediation

learn more
Autobahn Security is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently.

Read more about Autobahn Fit

Users also considered
SecOps Solution logo

SecOps Solution is a full-stack vulnerability and patch mana

learn more
SecOps is an AI-powered cybersecurity assessment platform that assists businesses with vulnerability management and patch management across endpoints, servers and network devices

Read more about SecOps Solution

Users also considered
CyberCAST logo

Going Beyond The Alert

learn more
Zyston, a leading cybersecurity provider, offers CyberCast, a software solution which finds critical insights into an organization's threat susceptibility.

Read more about CyberCAST

Users also considered
Vulnerability Intelligence logo

Vulnerability management platform and scanner

learn more
SaaS Vulnerability Scanner is a computer security platform designed to help businesses manage, detect and prioritize vulnerabilities across the network infrastructure. Organizations can use the interface to schedule and configure assessments to include or exclude specific ports from external scans.

Read more about Vulnerability Intelligence

Users also considered
Trava logo

Cybersecurity solution with surveys and assessments

learn more
Trava is a cybersecurity platform designed to help insurance brokers, investors, managed service providers (MSPs) and other professionals across multiple industries protect data from risks using cyber insurance, automated assessments, and more.

Read more about Trava

Users also considered
Wiz logo

Secure everything you build and run in the cloud

learn more
Cloud security solution that allows businesses to detect, prioritize, and manage remediate vulnerabilities across their cloud environments.

Read more about Wiz

Users also considered
Metasploit logo

Penetration testing software for offensive security teams

learn more
Metasploit is a penetration testing tool designed for offensive security teams. It provides access to a vast database of real-world exploits maintained by a global community of contributors and users.

Read more about Metasploit

Users also considered
Morphisec Guard logo

Adapt. Protect Defend.

learn more
Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud.

Read more about Morphisec Guard

Users also considered
CheckRed logo

Unified SaaS & cloud security posture management platform

learn more
CheckRed is a unified SaaS and cloud security posture management platform that empowers security teams with comprehensive capabilities to manage both SaaS and cloud security. The vendor-agnostic solution provides visibility across assets, detects misconfigurations with accuracy, enables adherence to compliance standards, offers insightful risk analytics, and defines remediation workflows to strengthen security posture.

Read more about CheckRed

Users also considered
Predictive logo

Unified security and observability SaaS solution

learn more
Predictive is a cloud-based vulnerability management software crafted to fortify organizations against cyber threats, delivering informed insights for decisive action.

Read more about Predictive

Users also considered
Jit logo

The easiest way to secure your code and cloud

learn more
Jit is the easiest way to secure your code and cloud, providing full application and cloud security coverage in minutes.

Our platform empowers developers to own the security of their code without ever leaving their workflow, prioritizing and fixing the alerts that matter.

Read more about Jit

Users also considered
Conviso logo

Application Security Posture Management

learn more
The Conviso Platform is an Application Security Posture Management (ASPM) solution that centralizes the management of risks, vulnerabil

Read more about Conviso

Users also considered