getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Vulnerability Management Software for Windows - Page 3

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


105 software options

GuardRails logo

Application security software

learn more
With GuardRails, you can finally feel safe on every level of your security. The platform enhances development processes and gives developers control via its layered approach that shields them from code to the cloud for complete protection against attackers.

Read more about GuardRails

Users also considered
Axonius logo

Cybersecurity asset management platform

learn more
Axonius is a cybersecurity asset management platform which gives organizations a comprehensive asset inventory, helps uncover security solution coverage gaps, & automatically validates & enforces security policies with 130+ management & security solution integrations, & more.

Read more about Axonius

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock Vulnerability Management
identifies vulnerabilities on endpoints, make them visible and prevent potential malware attacks

Read more about DriveLock

Users also considered
Mend logo

Open source security and licenses compliance

learn more
WhiteSource is the leading solution for agile open source security and management.
We help companies find and fix open source vulnerabilities, including prioritizing vulnerabilities based on vulnerability's effectiveness.

Read more about Mend

Users also considered
Machine Learning on AWS logo

Machine learning and AI solutions from AWS

learn more
AWS provides machine learning (ML) and artificial intelligence (AI) solutions designed to help businesses analyze data insights, personalize the customer experience, optimize business processes, and more.

Read more about Machine Learning on AWS

Users also considered
Uptycs logo

Shift up with Uptycs!

learn more
Protect your crown jewels, your development lifecycle, and your data with Uptycs, the unified CNAPP and XDR platform.

Read more about Uptycs

Users also considered
Quadrant XDR logo

Around-the-clock threat detection and response

learn more
Quadrant XDR is a cloud-based security analytics platform developed by Quadrant Managed Detection and Response. It is designed to provide businesses with around-the-clock threat detection and response, curated by the highest quality Security Analysts in the industry.

Read more about Quadrant XDR

Users also considered
Greenbone logo

Vulnerability management for security issue detection.

learn more
Greenbone is vulnerability management software for any-level sized businseses for security issue detection. Greenbone is based on open-source software which evaluates and analyzes IT networks, generating security reports, providing remediation advice. Greenbone also offers daily security updates which are atuomatic. The software is available as not only a cloud-based solution but also physical and virtual.

Read more about Greenbone

Users also considered
VulScan logo

Cloud-based network vulnerability management software

learn more
Designed for IT professionals, security officers, and compliance administrators, VulScan is a network vulnerability management application that helps automate internal security scanning processes, monitor network endpoints, and create service tickets on a centralized platform.

Read more about VulScan

Users also considered
Reporter logo

Software for streamlining security tests

learn more
Reporter is a self-hosted pentest reporting platform designed for security teams to optimize their assessment workflow from testing to reporting. The platform features built-in templates, automatic PDF generation, client engagement tools, and collaborative functionality that allows team members to work together efficiently on security assessments.

Read more about Reporter

Users also considered
JFrog Xray logo

A DevSecOps binary security vulnerability scanning solution

learn more
Xray is a DevSecOps binary security vulnerability scanning solution that scans your OSS dependencies for security vulnerabilities and license compliance issues.

Read more about JFrog Xray

Users also considered
Holm Security VMP logo

Vulnerability management system

learn more
Holm Security VMP helps customers identify vulnerabilities in their cyber security defenses covering both technical and human assets.

Read more about Holm Security VMP

Users also considered
CAST Highlight logo

The control tower for your application portfolio.

learn more
CAST Highlight is a SaaS product that provides rapid insights across a portfolio of applications.

Read more about CAST Highlight

Users also considered
CODA Footprint logo

Multi-tenant vulnerability & contextual risk management tool

learn more
CODA Footprint is a SaaS multi-tenant attack surface reduction solution that covers vulnerability management, contextual risk scoring and prioritized remediation in an all-in-one package.

Read more about CODA Footprint

Users also considered
UpGuard logo

Cloud-based cybersecurity tool for vendor risk management.

learn more
UpGuard is a cloud-based risk and attack surface management platform that provides organizations visibility and control over their cyber risk. The solution provides a suite of features that enable security teams to identify, assess, and remediate risks across their entire vendor ecosystem and external attack surface.

Read more about UpGuard

Users also considered
OX Security logo

Cloud-security solution for administrators.

learn more
OX Security is a cloud security platform that helps small to large businesses in technology, banking, financial services, and other sectors protect their organization from advanced cyber threats. The platform provides real-time threat detection and response capabilities, giving administrators the ability to gain insights into their network so they can identify and address threats before those threats cause damage.

Read more about OX Security

Users also considered
Security Manager by FireMon logo

Manage Policy, Ensure Compliance, Gain Visibility & Control

learn more
FireMon is a network security management solution for hybrid cloud that ?delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration.

Read more about Security Manager by FireMon

Users also considered
Tenable Cloud Security logo

Holistic security for AWS, Azure and GCP

learn more
Holistic cloud infrastructure security

Read more about Tenable Cloud Security

Users also considered
Pentera logo

Emulating real-life attacks on all cybersecurity layers

learn more
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.

Read more about Pentera

Users also considered
Strobes RBVM logo

Scalable and Faster Vulnerability Management

learn more
Strobes VM365 is the frontier that gives you the consolidated view of all the findings from various security sources, empowering your teams to focus on resolving the right set of findings.

Read more about Strobes RBVM

Users also considered
Sonatype Lifecycle logo

OSS Application Security and Dependency Management Solution

learn more
Sonatype Lifecycle controls open source risk across the SDLC to help application security scale their operations to the speed of development.

Eliminate unnecessary work
Improve efficiency and speed
Enhance productivity

Read more about Sonatype Lifecycle

Users also considered
Apiiro logo

AppSec management tool to secure cloud software development.

learn more
Apiiro is re-inventing the secure development lifecycle for agile and cloud-native development. It helps businesses transform application security into multidimensional application risk.

Read more about Apiiro

Users also considered
SAINT Security Suite logo

Cybersecurity and vulnerability assessment solution

learn more
SAINT Security Suite is a cybersecurity solution that helps businesses uncover, assess, and mitigate security risks across the entire security infrastructure. The platform provides granular, tailored reports that facilitate informed decision-making.

Read more about SAINT Security Suite

Users also considered
DeepSurface logo

Risk-based predictive vulnerability management platform

learn more
DeepSurface is a risk-based predictive vulnerability management platform for cybersecurity, delivering critical insights and actionable recommendations to the most vulnerable assets. It uses machine learning to detect vulnerabilities, provide prioritization, and manage critical patching—without causing disruption.

Read more about DeepSurface

Users also considered
CySight logo

Network Intelligence

learn more
CySight enables organizations to tackle the increasing density, complexity, and expanse of modern physical and cloud networking. Deploying cyber network intelligence, CySight allows network and security teams to substantially accelerate incident response by eliminating blindspots, analyzing network telemetry to discover anomalies, uncover cyber-threats, and quantifying asset usage and performance.

Read more about CySight

Users also considered