getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Top Rated Vulnerability Management Software with Mid size business - Page 5

Last updated: May 2026

2 filters applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


128 software options

HackerOne logo

Cybersecurity platform to identify and fix vulnerabilities

learn more
HackerOne is a web-based cybersecurity platform designed to help businesses across various industry verticals such as education, telecom, aviation, media, financial services, and more eliminate vulnerabilities by securing continuous development processes.

Read more about HackerOne

Users also considered
Cyrisma logo

All-in-one cyber risk management platform

learn more
CYRISMA is a revolutionary cyber risk management platform that combines multiple risk discovery, assessment and mitigation features, removing the need for organizations to integrate different single-point products to get the same outcomes.

Read more about Cyrisma

Users also considered
baramundi Management Suite logo

IT asset management for small and midsize businesses (SMB)

learn more
baramundi Management Suite is an IT asset management software designed to help businesses manage and protect endpoints across multiple corporate networks. Administrators can track application usage and manage licenses on a unified interface.

Read more about baramundi Management Suite

Users also considered
AWS Config logo

Configuration and vulnerability management software

learn more
AWS Config is a configuration and vulnerability management software that helps businesses manage continuous audits, operational troubleshooting, compliance monitoring, and more from within a unified platform. It allows staff members to automatically send updates of all configuration changes including resource updating, creation, and deletion.

Read more about AWS Config

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
DataDome logo

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
USM Anywhere logo

Threat detection and response software for IT security teams

learn more
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.

Read more about USM Anywhere

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense delivers comprehensive vulnerability management, including security configuration management. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.

Read more about Syxsense

Users also considered
Saner CVEM logo

Integrated platform for continuous vulnerability detection.

learn more
SecPod SanerNow is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets via continuous vulnerability management, patch management and more. Get 190,000 + vulnerability checks with the industry's fastest 5 mins scans with SanerNow.

Read more about Saner CVEM

Users also considered
Snyk logo

Cloud-based security platform to track & fix vulnerabilities

learn more
Snyk is a cloud-based application security and testing platform, which helps enterprises discover and fix vulnerabilities across open source libraries, containers, or codes throughout the development process. Features include runtime monitoring, reporting, exploitability indicators, alerts, and prioritization.

Read more about Snyk

Users also considered
Brandefense logo

Cloud-based threat intelligence tool for data security.

learn more
Brandefense is a cloud-based digital risk protection suite that helps organizations track and manage cyber threats. The platform helps protect systems from potential risks via threat identification, real-time threat alerts, and continuous monitoring.

Read more about Brandefense

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
Greenbone logo

Vulnerability management for security issue detection.

learn more
Greenbone is vulnerability management software for any-level sized businseses for security issue detection. Greenbone is based on open-source software which evaluates and analyzes IT networks, generating security reports, providing remediation advice. Greenbone also offers daily security updates which are atuomatic. The software is available as not only a cloud-based solution but also physical and virtual.

Read more about Greenbone

Users also considered
ManageEngine Vulnerability Manager Plus logo

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Lansweeper logo

Know Your IT

learn more
Lansweeper is an IT Asset Management solution that provides network discovery of all connected devices, users, and software within your IT estate. Lansweeper's advanced device recognition capabilities allow for complete visibility across your entire IT estate, in one centralized IT inventory.

Read more about Lansweeper

Users also considered
ACMP Suite logo

Keep clients running!

learn more
In a world full of unpredictability, choosing the right partner is crucial. We are your guide on the path to greater simplicity and efficiency. ACMP offers modular and scalable solutions for your specific challenges in the IT department.

Read more about ACMP Suite

Users also considered
Kiuwan logo

Secure your applications confidently with Kiuwan.

learn more
Kiuwan is an end-to-end application security platform supporting 30+ languages with SAST, SCA, & QA. Kiuwan integrates with IDEs for direct analysis, offers tailored reports, and meets NIST, CWE, & OWASP standards.

Manage open source components and secure your projects confidently with Kiuwan.

Read more about Kiuwan

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
SolarWinds Patch Manager logo

Vulnerability management software

learn more
SolarWinds Patch Manager is a server monitoring software that helps businesses manage the process of patching systems and applications. It provides a centralized platform for managing, deploying, and reporting on patches for Windows and third-party applications.

Read more about SolarWinds Patch Manager

Users also considered
Amazon CloudWatch logo

Application performance management software for DevOps

learn more
Amazon CloudWatch is a vulnerability management software designed to help DevOps engineers, IT managers, and site reliability engineers (SREs) observe and manage AWS resources. Administrators can gain insights into operational data to visualize logs and utilize machine learning algorithms to detect anomalous behavior across environments.

Read more about Amazon CloudWatch

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Sigrid logo

One platform to manage your entire application landscape

learn more
Sigrid streamlines vulnerability management by delivering continuous, detailed insights into your IT system’s security vulnerabilities, offering specific recommendations for improvement. This enables organizations to maintain robust security measures and manage software risks more effectively.

Read more about Sigrid

Users also considered
CyberArk Privileged Access Management Solutions logo

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Management Solutions

Users also considered
Acunetix logo

Cloud-based and automated web application security solution

learn more
Acunetix (by Invicti) is a vulnerability management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation.

Read more about Acunetix

Users also considered
Zscaler logo

Secure your users, apps and data with Zero Trust + AI.

learn more
Zscaler is a cloud-native security platform offering Zero Trust access, advanced threat protection, and DLP for secure digital transformation. It protects users, apps & data by enabling secure web access, securing cloud apps & preventing cyber threats, all while simplifying IT operations at scale.

Read more about Zscaler

Users also considered