App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

Vulnerability Management Software - Page 2

181 software options

Sponsored

Filter results

Features



Pricing model




User rating


Personalize your search

Any industry

Any business size

Risk Hawk logo

Risk Hawk

4.7
(31)

Risk, compliance and audit management software

learn more
Integrated Risk Management system to actively manage all risks & KRIs, controls, incidents, policies, audits, action plans, resources, compliance registers, case queues such as whistleblowing, complaints, SARs, media reports, and regulatory notifications and facilitates linking these to each other.

Read more about Risk Hawk

Users also considered
CyLock Anti-Hacker logo

CyLock Anti-Hacker

5.0
(23)

Cloud-based cyber security platform

learn more
CyLock’s AntiHacker is a software developed by our researchers to allow you to analyse corporate IT security from a hacker’s point of view and proposes the most effective remedies to avoid possible attacks.

Read more about CyLock Anti-Hacker

Users also considered
Hackrate Bug Bounty Platform logo

Hackrate Bug Bounty Platform

5.0
(20)

Companies need ethical hackers more than ever

learn more
Secure platform to keep vulnerability reports centralized and easily manageable.

Read more about Hackrate Bug Bounty Platform

Users also considered
Acunetix logo

Acunetix

4.4
(34)

All-in-one automated web application security solution

learn more
Acunetix (by Invicti) is a vulnerability management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation.

Read more about Acunetix

Users also considered
vRx logo

vRx

4.9
(19)

Simplified Vulnerability Remediation

learn more
Efficiently Reduce Organizational Security Risk with vRx's leading vulnerability management platform that provides an efficient way to patch-less and get more.
vRx enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.

Read more about vRx

Users also considered
Falcon logo

Falcon

4.6
(25)

Network monitoring and endpoint protection platform

learn more
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.

Read more about Falcon

Users also considered
SanerNow logo

SanerNow

4.5
(27)

Integrated platform for endpoint protection across devices

learn more
SecPod SanerNow is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets via patch management, endpoint detection & response (EDR), and more. Key features include regulatory compliance, asset management, audit trails, and reporting.

Read more about SanerNow

Users also considered
AppTrana logo

AppTrana

4.6
(24)

Application Security Management Solution

learn more
AppTrana helps businesses monitor, detect, block & protect applications and websites against hack attempts, security threats & DDoS attacks. The vulnerability detection functionality lets users conduct automated security scans to ensure safety against unknown vulnerabilities.

Read more about AppTrana

Users also considered
DriveStrike logo

DriveStrike

4.9
(16)

Data and device protection for businesses of all sizes

learn more
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.

Read more about DriveStrike

Users also considered
AWS Config logo

AWS Config

4.7
(21)

Configuration and vulnerability management software

learn more
AWS Config is a configuration and vulnerability management software that helps businesses manage continuous audits, operational troubleshooting, compliance monitoring, and more from within a unified platform. It allows staff members to automatically send updates of all configuration changes including resource updation, creation, and deletion.

Read more about AWS Config

Users also considered
Zscaler logo

Zscaler

4.3
(35)

Cloud-based secure internet and web gateway

learn more
Zscaler is a cloud-based secure internet and web gateway designed to help businesses manage IT security across multiple devices, users, corporate infrastructure, and locations. Its ByteScan engine inspects each inbound and outbound byte, Secure Sockets Layer (SSL) traffic, and other inline content from within a unified platform.

Read more about Zscaler

Users also considered
Snyk logo

Snyk

4.8
(16)

Cloud-based security platform to track & fix vulnerabilities

learn more
Snyk is a cloud-based application security and testing platform, which helps enterprises discover and fix vulnerabilities across open source libraries, containers, or codes throughout the development process. Features include runtime monitoring, reporting, exploitability indicators, alerts, and prioritization.

Read more about Snyk

Users also considered
Cyber Chief logo

Cyber Chief

5.0
(12)

Release cloud software with zero known vulnerabilities

learn more
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero known security vulnerabilities

Read more about Cyber Chief

Users also considered
ManageEngine Vulnerability Manager Plus logo

ManageEngine Vulnerability Manager Plus

4.7
(17)

Vulnerability management with built-in remediation

learn more
ManageEngine Vulnerability Manager Plus is a prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.

Read more about ManageEngine Vulnerability Manager Plus

Users also considered
Probely logo

Probely

4.9
(13)

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
6clicks logo

6clicks

4.9
(13)

Unlimited user licensing. AI-powered. Integrated content.

learn more
6clicks offers a suite of services including a curated and customizable content library, world-first AI engine and risk intelligence social network that revolutionizes the way organizations mature their cyber security, data privacy, and compliance capabilities.

Read more about 6clicks

Users also considered
IncMan SOAR logo

IncMan SOAR

4.9
(13)

Security orchestration, automation and response platform

learn more
IncMan SOAR is a cloud-based and on-premise platform, which enables enterprises to manage, evaluate, and plan various security operation tasks such as threat hunting and investigation, triage and escalation, incident qualification, and more using machine learning and automation capabilities.

Read more about IncMan SOAR

Users also considered
Amazon CloudWatch logo

Amazon CloudWatch

4.6
(16)

Application performance management software for DevOps

learn more
Amazon CloudWatch is a vulnerability management software designed to help DevOps engineers, IT managers, and site reliability engineers (SREs) observe and manage AWS resources. Administrators can gain insights into operational data to visualize logs and utilize machine learning algorithms to detect anomalous behavior across environments.

Read more about Amazon CloudWatch

Users also considered
DataDome logo

DataDome

4.5
(17)

Anti-bot protection software to block unwanted traffic

learn more
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.

Read more about DataDome

Users also considered
Keyhub logo

Keyhub

4.8
(12)

Cloud-based certificate lifecycle management automation

learn more
Automated certificate management solution, capable of detecting all SSL/TLS assets, even unknown. It scans your networks and checks for potential weaknesses and vulnerabilities to be addressed. It provides in-dashboard system health overview, single inventory, expiration reporting and more.

Read more about Keyhub

Users also considered
BackupAssist logo

BackupAssist

4.8
(11)

Data Protection Engineered For Technical Experts!

learn more
Protect Windows systems and Office 365 Data from cyberthreats, natural disaster, human error and sabotage. On-premise and cloud backup solutions that perform automatic, scheduled backups to a variety of backup devices.

Read more about BackupAssist

Users also considered
CyberArk Privileged Access Manager logo

CyberArk Privileged Access Manager

4.3
(20)

Secure & protect privileged account credentials

learn more
CyberArk Privileged Account Security helps control access to administrative & privileged accounts to reduce information leaks & risk by automating policies

Read more about CyberArk Privileged Access Manager

Users also considered
Alert Logic MDR logo

Alert Logic MDR

4.5
(14)

Managed detection and response (MDR) platform

learn more
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.

Read more about Alert Logic MDR

Users also considered
SolarWinds Patch Manager logo

SolarWinds Patch Manager

4.3
(18)

Vulnerability management software

learn more
SolarWinds Patch Manager is a server monitoring software that helps businesses manage the process of patching systems and applications. It provides a centralized platform for managing, deploying, and reporting on patches for Windows and third-party applications.

Read more about SolarWinds Patch Manager

Users also considered
KACE logo

KACE

4.0
(24)

Unified Endpoint Management by KACE. Where Next Meets Now.

learn more
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.

Read more about KACE

Users also considered