getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Online Vulnerability Management Software

Last updated: April 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


186 software options

Malwarebytes for Business logo

Complete cybersecurity software for businesses

learn more
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.

Read more about Malwarebytes for Business

Users also considered
Iru logo

Collapse the IT stack with Iru.

learn more
AI-powered platform that unifies identity, endpoints, and compliance—giving IT teams time and control back.

Read more about Iru

Users also considered
Action1 logo

Patching That Just Works

learn more
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.

Read more about Action1

Users also considered
NinjaOne logo

Unified endpoint management & IT automation platform

learn more
NinjaOne helps IT teams identify and remediate vulnerabilities via endpoint monitoring, patch management, and device configuration hardening. Leverage fast, fully automated patching for Windows, macOS, and Linux OS, as well as numerous third-party applications to minimize potential exposure.

Read more about NinjaOne

Users also considered
WebTitan logo

DNS-based web filter, malware/phishing protection & security

learn more
TitanHQ's WebTitan web filter is a DNS based web content filtering tool that blocks malware, ransomware and phishing attempts, and provides advanced web content control.

Read more about WebTitan

Users also considered
Automox logo

Cloud-based platform for patch management

learn more
Automox is the endpoint management platform built for the era of autonomous operations

Read more about Automox

Users also considered
SentinelOne logo

Protect your Endpoints, Cloud, and Data

learn more
SentinelOne delivers autonomous cybersecurity powered by AI, enabling real-time prevention, detection, and response to threats across endpoints, cloud workloads, and identity systems—empowering organizations to stay ahead of cyberattacks with speed, visibility, and control.

Read more about SentinelOne

Users also considered
baramundi Management Suite logo

IT asset management for small and midsize businesses (SMB)

learn more
baramundi Management Suite is an IT asset management software designed to help businesses manage and protect endpoints across multiple corporate networks. Administrators can track application usage and manage licenses on a unified interface.

Read more about baramundi Management Suite

Users also considered
Sprinto logo

Cloud-based solution for security compliance.

learn more
Sprinto is a cloud-based platform designed to help businesses of all sizes manage and streamline their compliance processes. It offers various capabilities such as compliance programs, automated workflows, and continuous control monitoring. Sprinto's risk assessment module allows for quantitative and qualitative evaluation of risks, while its role-based task management ensures seamless collaboration across the organization.

Read more about Sprinto

Users also considered
Rubrik logo

All Your Apps. Instantly Available.

learn more
Rubrik brings instant application availability to hybrid cloud enterprises for recovery, search, cloud, & development. See what Rubrik can do for you!

Read more about Rubrik

Users also considered
Phoenix Security logo

Vulnerability management and orchestration platform

learn more
AppSec Phoenix helps organizations bring executives, developers and security on a unified platform.

Appsec Phoenix is a vulnerability management and orchestration platform that provides a single pane of glass across Cloud, Infrastructure, Application, Container Security

Read more about Phoenix Security

Users also considered
Amazon CloudWatch logo

Application performance management software for DevOps

learn more
Amazon CloudWatch is a vulnerability management software designed to help DevOps engineers, IT managers, and site reliability engineers (SREs) observe and manage AWS resources. Administrators can gain insights into operational data to visualize logs and utilize machine learning algorithms to detect anomalous behavior across environments.

Read more about Amazon CloudWatch

Users also considered
Orca Security logo

Thrive Securely in the Cloud

learn more
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely

Read more about Orca Security

Users also considered
Beagle Security logo

Secure your web apps & APIs from the latest vulnerabilities

learn more
Beagle Security helps you to identify security weaknesses and vulnerabilities on your web apps & APIs before hackers harm you in any way.

Read more about Beagle Security

Users also considered
Heimdal Patch & Asset Management logo

Innovative Patch Management. Anytime. Anywhere.

learn more
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux, MacOS and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.

Read more about Heimdal Patch & Asset Management

Users also considered
Lansweeper logo

Know Your IT

learn more
Lansweeper is an IT Asset Management solution that provides network discovery of all connected devices, users, and software within your IT estate. Lansweeper's advanced device recognition capabilities allow for complete visibility across your entire IT estate, in one centralized IT inventory.

Read more about Lansweeper

Users also considered
SiteGround logo

Server monitoring and vulnerability management tool

learn more
SiteGround is a cloud-based vulnerability management tool that helps businesses leverage AI technology to monitor and identify potential issues across servers. The application automatically prevents botnet attacks across all servers to prevent unauthorized access and secure other hosting resources.

Read more about SiteGround

Users also considered
CanIPhish logo

Simulate Phishing Threats And Train Your Employees

learn more
CanIPhish provides a cloud-based platform to conduct simulated phishing and train employees. CanIPhish features realistic phishing simulations, engaging employee training, and advanced real-time reporting to track phishing campaign progress.

Read more about CanIPhish

Users also considered
CyLock EVA logo

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock EVA

Users also considered
CrowdStrike logo

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about CrowdStrike

Users also considered
Syxsense logo

Unified Security and Endpoint Management

learn more
Syxsense delivers comprehensive vulnerability management, including security configuration management. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.

Read more about Syxsense

Users also considered
runZero logo

Asset inventory and network visibility for security and IT.

learn more
runZero provides asset inventory and network visibility for security and IT teams.

Read more about runZero

Users also considered
Cohesity logo

Server backup and data management software

learn more
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.

Read more about Cohesity

Users also considered
Risk Hawk logo

Risk, compliance and audit management software

learn more
Integrated Risk Management system to actively manage all risks & KRIs, controls, incidents, policies, audits, action plans, resources, compliance registers, case queues such as whistleblowing, complaints, SARs, media reports, and regulatory notifications and facilitates linking these to each other.

Read more about Risk Hawk

Users also considered
Runecast logo

AI-powered platform for Security and Compliance

learn more
Runecast is a provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises rely on Runecast for proactive risk mitigation, security compliance, operational efficiency & mission-critical stability. To add proactiveness to your IT strategy, visit www.runecast.com

Read more about Runecast

Users also considered