Vulnerability Management Software

Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity bridges.

Why Capterra is Free

by FireMon

(0 reviews)
FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world. Learn more about FireMon FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures. Learn more about FireMon
Streamline the aggregation and correlation of asset, threat, vulnerability and ticket data. Gain better visibility into your organization's risk posture with advanced risk scoring algorithms that provide business context beyond CVSS scores, such as asset criticality. Help your IT team prioritize the right vulnerabilities and effectively communicate progress to all your stakeholders. Easily scale these processes to millions of assets and tens of millions of cyber vulnerabilities. Learn more about Vulnerability Management Software Gain greater risk intelligence by prioritizing your cyber vulnerabilities based on business criticality for more efficient remediation. Learn more about Vulnerability Management Software

by Skybox Security

(0 reviews)
Skybox Vulnerability Control supports a systematic approach to vulnerability management unlike any other vendor. Our solution is rooted in comprehensive visibility of your attack surface, using its context to analyze, prioritize and remediate your riskiest vulnerabilities fast. Learn more about Vulnerability Control Identify and prioritize risks to your network with comprehensive vulnerability scanning and analytics solutions. Learn more about Vulnerability Control

by Conventus

(0 reviews)
An automated, integrated, data-driven platform that provides the most effective method of prioritizing and remediating the vulnerabilities and exposures that represent the greatest risk to your business. NorthStars flexible scoring model empowers organizations with the freedom and transparency to decide what factors best reflect their business needs and risk appetite. NorthStar Delivers: - Single Source of Truth - Completely customizable scoring - Simplified and Faster Data Integrations Learn more about NorthStar Prioritize and remediate the vulnerabilities and exposures that matter most to your business. Learn more about NorthStar
Alert Logic's SIEMless Threat Management offering seamlessly connects an award-winning security platform, threat intelligence & expert defenders to provide the right level of security & compliance coverage for the right resources across your environments. Choose your level of coverage for asset discovery, vulnerability scanning, cloud configuration checks, threat monitoring, intrusion detection, log collection & monitoring, WAF defense & more - with 24/7 support & SOC services. Learn more about Alert Logic Vulnerability Mgmt Get Vulnerability Management as part of Alert Logic's SIEMless Threat Management offerings, connecting platform, intel & experts. Learn more about Alert Logic Vulnerability Mgmt
Protect your website or web application 365 days a year thanks to daily automated audits to detect your security flaws. Adopt the Offensive Cyber Security method to protect your business. Discover the high-performance web vulnerability scanner by HTTPCS: - Zero False Positive Guarantee - 100% Mapping (Headless Technology to crawl dynamic content) - Security Flaws listing : Top 10 OWASP, CVE and much more! - Countermeasures to apply - Replay the attacks to understand the risks incurred. Learn more about HTTPCS Security Without technical expertise, run automated security audits to detect security flaws on your site or web application. Support provided. Learn more about HTTPCS Security

by Cryptosense

(1 review)
Cryptosense Analyzer software helps our customers find security weaknesses in the cryptography they use in their infrastructure and applications, and then fix them before theyre exploited. Our software is currently used to analyze the systems that protect: the majority of interbank messages worldwide; more than half of all global Forex trades; the worlds largest financial transaction database; and the cryptography used by the worlds largest cloud providers. Learn more about Cryptosense Cryptosense provides software to detect and eliminate vulnerabilities caused by misuses of cryptography in apps and infrastructures. Learn more about Cryptosense

by ManageEngine

(35 reviews)
Patch Manager Plus is an automated patch management software that provides enterprises with a single interface for all patch management tasks. Works across platforms, helping you patch Windows, Mac, Linux & 300+ third-party applications. You can automate the scan for missing patches, test & approve for hassle-free patching, customize deployment policies to meet business needs, decline patches & generate vulnerability reports. Patch Manager Plus is now available both on cloud and on-premise. Learn more about Patch Manager Plus Patch Manager Plus is an automated patch management software to patch Windows, Mac, Linux updates and 300+ third-party applications. Learn more about Patch Manager Plus

by Acunetix

(27 reviews)
Acunetix leads the market in automatic web security testing technology that scans and audits all web applications including HTML5, JavaScript and Single Page Applications. Scans for 4500 vulnerabilities incl. SQLi and XSS among others. Used by Government, Military, Education, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies. Acunetix offers a cost-effective, simple, scalable, and high availability solution. Available on Windows, Linux and Online Learn more about Acunetix Vulnerability Management solution that scans your website, detects vulnerabilities like XSS or SQL Injection and offers remediation Learn more about Acunetix
Netsparker Security Scanner is an accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Netsparker's unique Proof-Based Scanning Technology allows you to allocate more time to fix the reported flaws by automatically exploiting the identified vulnerabilities in a read-only and safe way, and also produces a proof of exploitation. Therefore you can immediately see the impact of the vulnerability and do not have to manually verify it. Learn more about Netsparker Security Scanner Accurate solution that automatically identifies XSS, SQL Injection and other vulnerabilities in web applications. Learn more about Netsparker Security Scanner

by Sandline

(6 reviews)
Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies Learn more about Centraleyezer Vulnerability Management that facilitates collaboration between Security Analysts, Management and Asset Owners and risk prioritization. Learn more about Centraleyezer

by Praetorian

(0 reviews)
As a collective of highly technical engineers and developers offering deep security expertise, Praetorian solves the toughest challenges faced by todays leading organizations across an ever-evolving digital threat landscape. Our solutions enable clients to find, fix, stop, and ultimately solve cybersecurity problems across their entire enterprise and product portfolios. Our solutions enable clients to find, fix, stop, and solve cybersecurity problems across their enterprise and product portfolios.

by Kenna Security

(0 reviews)
Kenna Security integrates vulnerability scan data with big data analytics and multiple exploit feeds to predict the risk of a vulnerability being exploited. It calculates risk scores for your enterprise, organizations and critical asset groups. Remediation guidance prioritizes patches that have the greatest risk reduction. Actionable results are achieved within hours of installing scan data. Kenna Security uses exploit intelligence feeds to identify vulnerabilities being exploited in the wild and put your company at risk.

by Cyberwatch

(0 reviews)
Server vulnerability monitoring solution with integrated patch management functionality. Server vulnerability monitoring solution with integrated patch management functionality.

by AlienVault

(10 reviews)
AlienVault Unified Security Management (USM) delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Security management platform offering fully integrated security controls for threat detection and compliance management.
Symantec Control Compliance Suite (CCS) delivers the core assessment technologies to enable security and compliance programs, as well as support IT operations in the data center. Control Compliance Suite delivers asset autodiscovery, automates security assessments across procedural, technical, and third-party controls, and calculates and aggregates risk scores according to business-defined threshholds. Add-on that allows organizations to perform supervisory review of broker-dealer email to ensure compliance with regulatory bodies.

by CHECKMARX

(0 reviews)
Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software, seamlessly integrated into development process. Checkmarx can be integrated at every step of the SDLC, which leads to less vulnerabilities, reduced fixes to older code, lower costs and, most importantly, far more secure applications. Allows to achieve PCI DSS Compliance. Free Demo available on web site. Checkmarx is a provider of state-of-the-art web application security solution: static code analysis software.

by NopSec

(0 reviews)
NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner agnostic) and subsequently helps you remediate the threats that matter the most. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence including malware, exploit, patching and social media feeds to predict the true probability of attacks. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.

by Tenable Network Security

(38 reviews)
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.

by Kiuwan

(30 reviews)
We provide an end-to-end Software Security platform to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. We make tough decisions easier and this translates in cost reduction, risk mitigation, objective measurement, with the broadest language coverage and third party intergations to name but a few of the possibilities brought about by our platform. SAST and open source management of your entire portfolio. DevSecOps platform with SAST and SCA, IDE integration and distributed analysis to shield your applications from external threats

by Rapid7

(9 reviews)
InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction. Market leading vulnerability management solution providing complete ecosystem visibility, prioritized & automated remediation workflows

by Probe.ly

(9 reviews)
https://probely.com - Probe.ly finds vulnerabilities or security issues in web applications and provides guidance on how to fix them. Probe.ly was built having developers in mind. Despite its sleek and intuitive web interface, Probe.ly follows an API-First development approach, providing all features through an API. Get Secure! Finds vulnerabilities or security issues in web applications and provides guidance on how to fix them.

by Qualys

(7 reviews)
Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring. Vulnerability management system which scans the current network, analyzes risks, and prepares reports through constant monitoring.

by Greenbone Networks GmbH

(6 reviews)
A set of SSL-secured vulnerability management tools including system scanner and access control manager. A set of SSL-secured vulnerability management tools including system scanner and access control manager.

by Snyk

(4 reviews)
Snyk is a developer-first security solution that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and Docker images. The Snyk solution integrates its comprehensive proprietary vulnerability database maintained by its expert security research team in Israel and London. Use Open Source. Stay Secure. Continuously find & fix vulnerabilities in your dependencies.

by HackerOne

(2 reviews)
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. THE MOST TRUSTED HACKER-POWERED SECURITY PLATFORM - From implementing the basics of a vulnerability disclosure process to supercharging

by Twistlock

(1 review)
Twistlock is the leading provider of container and cloud native cybersecurity solutions for the modern enterprise. From precise, actionable vulnerability management to automatically deployed runtime protection and firewalls, Twistlock protects applications across the development lifecycle and into production. Purpose built for containers, serverless, and other leading technologies - Twistlock gives developers the speed they want, and CISOs the control they need. Twistlock is the leading cloud native cybersecurity platform for the modern enterprise

by Micro Focus

(1 review)
User behavior analytics and vulnerability management solution that helps identify internal and external threats. User behavior analytics and vulnerability management solution that helps identify internal and external threats.

by baramundi Software USA

(1 review)
Modular, scalable and highly cost-effective Unified Endpoint Management system for comprehensive IT management, security and workflow automation. Modules work together via a single database in a single user interface. Select any of 18 available modules now and add others as needed for OS Install & Cloning, Patch Management, Vulnerability Management, MDM, Remote Control, Inventory, VM Management, SNMP Device Management, Application Control, Disaster Recovery, Personal Backup and more. Modular system for automated OS and software deployment, patching, compliance, device inventory & configuration, MDM, backup/restore.
Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security. Vulnerability management app that reveals weaknesses of working network, prioritizes them, and selects appropriate level of security.
Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention. Vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention.

by Isograph

(0 reviews)
Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes. Attack probability analysis tool that helps predict hacking attacks and develop prevention schemes.

by Sentinel IPS

(0 reviews)
Sentinel IPS makes intrusion prevention easy to manage. Our intrusion detection and intrusion prevention tools keep malware, ransomware, and a variety of other network attacks from impacting your business. Simply install our IDS device and we'll do the rest! If you ever have problems, our team is standing by 24 hours to diagnose and get you back up and running. Sentinel intrusion detection & prevention systems keep malware, ransomware and many other network attacks from impacting your business.

by Cybersecurity Help

(0 reviews)
Hybrid approach to vulnerability scanning with accurate security assessment results. Hybrid approach to vulnerability scanning with accurate security assessment results.

by Mageni Security

(0 reviews)
Mageni is a powerful vulnerability scanning and vulnerability management solution that empowers you to find, prioritize, remediate and manage vulnerabilities before they are exploited by hackers. Mageni is a powerful vulnerability management solution that empowers you to find, prioritize, remediate and manage vulnerabilities.

by SecludIT

(0 reviews)
Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments. Agentless technology for automating discovery and monitoring of networks, servers, and other applications in varied environments.

by VigiTrust

(0 reviews)
Security accreditation management system that helps organizations comply with information security regulations. Security accreditation management system that helps organizations comply with information security regulations.
SWAT is a continuous vulnerability management solution for Web applications allowing a full vulnerability coverage thanks to the combination of vulnerability scanning tools and Outpost24 experienced security technicians. SWAT adjusts its scanning to new threats discovred and adapts to any changes in the application. All deployment and maintenance is performed by Outpost24 experts team and the customer support is available 24/7. More info > https://outpost24.com/swat Continuous vulnerability management solution that combines automated scanning, manual penetration testing and app learning.
Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results. Scan engine that identifies external network vulnerabilities: add/remove targets, control frequency, and review results.

by Neverfail

(0 reviews)
Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach with true continuous data protection. CE delivers near-zero recovery times by monitoring the health of your applications and instantly failing over if a threat is detected. Simply put, we can help you prepare for and protect your applications, servers, and data from disaster and unplanned outages. Continuity Engine is a business continuity software that protects your most mission-critical applications with a goal of zero downtime.

by 10Security

(0 reviews)
Security program and vulnerability management tool that allows you to manage your application security program. Security program and vulnerability management tool that allows you to manage your application security program.

by Demisto

(0 reviews)
An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack. An on-prem and hosted solution that enables standardized, coordinated responses across your security product stack.

by TraceSecurity

(0 reviews)
A software tool that empowers you to reduce vulnerability with minimal resources. A software tool that empowers you to reduce vulnerability with minimal resources.

by Software Secured

(0 reviews)
SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code. SaaS-based software platform that helps software development teams identify more vulnerabilities faster in their own code.

by CloudFabrix

(0 reviews)
With cfxRealize you get continuous visibility and intelligence to optimize hardware and software assets usage and spend. Also enables faster adoption of new hardware and software consumption models. .

by ITrust.fr

(0 reviews)
IKare assists all company sizes to sustainably improve their IT security level. IKare assists all company sizes to sustainably improve their IT security level.

by RiskSense

(0 reviews)
FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management. FROM MAYHEM TO MEASURABLE. Take Control of Your Cyber Risk. Risk-Based Vulnerability Management.
Vulnerability Management enables IT security teams to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, cloud, container, and virtual infrastructuresdelivering risk analysis in context. Vulnerability Management allows IT security professionals to scan working system, detect weaknesses, and prevent intrusions.

by Humming Heads

(0 reviews)
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.

by Brinqa

(0 reviews)
Brinqa is a leading provider of unified risk management enabling stakeholders, governance organizations, and infrastructure security teams to effectively manage technology risk at the speed of business. Brinqa software and cloud services leverage an organizations existing investment in systems, security, and governance programs to identify, measure, manage and monitor risk. Brinqas award-winning software and cloud services are trusted by global Fortune 500 companies. Leverages a company's existing investment in systems, security & governance programs to mitigate, remediate and avoid risk.