Vulnerability Management

Compare 121 vulnerability management tools to find the right one for your needs

πŸ“‚ Subcategories

πŸ”§ Tools

Compare and find the best vulnerability management for your needs

RunZero

See everything. Unconditionally.

A network discovery and asset inventory platform that provides a complete and detailed view of your entire network.

View tool details β†’

Bishop Fox Cosmos

Continuous Penetration Testing Platform.

A managed service combining attack surface management technology with expert-driven continuous penetration testing.

View tool details β†’

Burp Suite

The leading toolkit for web security testing.

An integrated platform for performing security testing of web applications.

View tool details β†’

Intruder

Find your weaknesses, before the hackers do.

A cloud-based vulnerability scanner that finds cybersecurity weaknesses in your digital infrastructure.

View tool details β†’

Nmap

The Network Mapper

A free and open-source utility for network discovery and security auditing.

View tool details β†’

Wiz

The Cloud Security Platform

A cloud security platform that provides visibility and risk context across the entire cloud stack.

View tool details β†’

Intruder

Effortless vulnerability scanning.

A cloud-based vulnerability scanner that finds cybersecurity weaknesses in your external infrastructure.

View tool details β†’

Edgescan

Continuous Vulnerability Intelligence.

A managed vulnerability assessment and penetration testing solution combining smart technology with human intelligence.

View tool details β†’

Aikido Security

All-in-one AppSec. For developers.

A developer-friendly platform that combines multiple security scanners to find and prioritize vulnerabilities.

View tool details β†’

Nozomi Networks

The Leader in OT and IoT Security.

An OT and IoT security platform that provides asset discovery, vulnerability management, and threat detection for industrial control systems.

View tool details β†’

Dragos

Safeguarding Civilization.

An industrial cybersecurity platform that provides asset visibility, threat detection, and response for industrial control systems.

View tool details β†’

NinjaOne

The Unified IT Operations Platform.

A unified IT operations platform that provides endpoint management, remote monitoring and management (RMM), and IT asset management.

View tool details β†’

Intruder

Continuous vulnerability scanning for your external infrastructure.

An online vulnerability scanner that finds cybersecurity weaknesses in your external attack surface, so you can fix them before a breach happens.

View tool details β†’

Nucleus Security

Unified Vulnerability Management

A centralized platform for vulnerability management, aggregation, and orchestration.

View tool details β†’

Intruder

Find your weaknesses, before the hackers do.

A proactive vulnerability scanner that finds cybersecurity weaknesses in your digital infrastructure.

View tool details β†’

JupiterOne

The Cyber Asset Attack Surface Management (CAASM) Platform

A platform that creates a graph-based model of all cyber assets to manage attack surfaces and compliance.

View tool details β†’

Brinqa

The Cyber Risk Management Platform

A comprehensive platform for managing cyber risk across all security programs.

View tool details β†’

Wiz

The Cloud Security Platform

A cloud security platform that provides full-stack visibility and risk assessment for your cloud environment.

View tool details β†’

Picus Security

The Pioneer of Breach and Attack Simulation.

A Security Validation and Exposure Management platform that helps organizations assess, prioritize, and address cyber risks.

View tool details β†’

Trivy

A simple and comprehensive vulnerability scanner for containers and other artifacts.

An open-source vulnerability scanner for containers, IaC, and more.

View tool details β†’

CrowdStrike Falcon Exposure Management

See everything. Stop breaches.

An exposure management solution from CrowdStrike that provides a unified view of risk across the enterprise.

View tool details β†’

Nucleus Security

The Unified Vulnerability Management Platform

A unified vulnerability management and prioritization platform.

View tool details β†’

Armis

The Asset Intelligence and Security Platform

An agentless cybersecurity asset management platform that discovers and secures all types of assets.

View tool details β†’

StackHawk

DAST and API Security Testing for Developers

A dynamic application and API security testing tool for developers.

View tool details β†’

Wiz

The Cloud Security Platform.

An agentless platform that provides full-stack visibility and context to find, prioritize, and fix risks in the cloud.

View tool details β†’

CrowdStrike Falcon Spotlight

Scan-free vulnerability management.

An endpoint-native vulnerability management solution that provides real-time visibility without active scanning.

View tool details β†’

Nucleus Security

The Unified Vulnerability Management Platform.

A centralized platform to aggregate, prioritize, and manage vulnerabilities from all scanning tools.

View tool details β†’

Orca Security

Agentless Cloud Security.

An agentless CNAPP that provides 100% coverage of cloud risks without any runtime overhead.

View tool details β†’

Armis

The Asset Intelligence and Security Company.

An agentless device security platform that discovers, monitors, and protects all managed, unmanaged, and IoT devices.

View tool details β†’

Axonius

The Cybersecurity Asset Management Platform.

A cybersecurity asset management platform that provides a comprehensive inventory of all assets, uncovers security gaps, and automates policy enforcement.

View tool details β†’

CrowdStrike Falcon Discover

IT hygiene for the entire enterprise.

Provides real-time visibility into the devices, users, and applications in your network to identify and eliminate malicious or noncompliant activity.

View tool details β†’

JupiterOne

The Cyber Asset Attack Surface Management (CAASM) Platform.

A CAASM platform that provides a unified view of your cyber assets and their relationships, enabling you to manage your attack surface and reduce risk.

View tool details β†’

Claroty

Secure All Cyber-Physical Systems.

A cyber-physical systems (CPS) security platform that provides visibility, protection, and monitoring for OT, IoT, and IoMT environments.

View tool details β†’

CyCognito

The External Attack Surface Management Platform.

An external attack surface management platform that helps you discover, test, and protect your entire external attack surface.

View tool details β†’

CrowdStrike Falcon Surface

See what the adversary sees.

An EASM solution that provides continuous, real-time visibility into an organization's known and unknown exposed assets.

View tool details β†’

CyCognito

Solve your exposure management challenges.

An external attack surface and exposure management platform that maps, tests, and prioritizes risks across the entire organization.

View tool details β†’

ImmuniWeb Discovery

Attack Surface Management and Dark Web Monitoring.

An AI-driven platform for external attack surface management, dark web monitoring, and phishing detection.

View tool details β†’

Wiz

The Cloud Security Platform.

An agentless cloud security platform that provides full-stack visibility and identifies critical risks in the cloud.

View tool details β†’

Orca Security

Agentless-First Cloud Security. That Just Works.

An agentless CNAPP that provides full-stack visibility into cloud risks without the overhead of agents.

View tool details β†’

CrowdStrike Falcon Horizon

Cloud Security Posture Management

A CSPM solution that detects and prevents cloud misconfigurations, control plane threats, and ensures compliance.

View tool details β†’

OWASP ZAP

The world's most widely used web app scanner.

An open-source web application security scanner.

View tool details β†’

Snyk

Developer security that works.

A developer-first security platform for finding and fixing vulnerabilities in code, open source, containers, and IaC.

View tool details β†’

Microsoft Defender Vulnerability Management

Discover, prioritize, and remediate vulnerabilities and misconfigurations in one place.

A vulnerability management solution from Microsoft that is part of the Defender suite.

View tool details β†’

XM Cyber

The Exposure Management Company

An exposure management platform that helps you understand and remediate your security risks from an attacker's perspective.

View tool details β†’

Nikto

Web Server Scanner

An open-source web server scanner that performs comprehensive tests against web servers for multiple items.

View tool details β†’

Cisco Vulnerability Management (formerly Kenna Security)

Prioritize what matters. Remediate faster.

A risk-based vulnerability management platform that uses data science to prioritize vulnerabilities.

View tool details β†’

Vulcan Cyber

The Cyber Risk Management Platform.

An exposure management platform that helps correlate assets, prioritize risks, and orchestrate remediation.

View tool details β†’

Microsoft Defender Vulnerability Management

Discover, prioritize, and remediate vulnerabilities in real time.

Provides continuous vulnerability discovery, risk-based prioritization, and built-in remediation tools.

View tool details β†’

Armis

The Asset Intelligence and Security Company.

An agentless platform that discovers and secures all types of assets, including IT, IoT, OT, and medical devices.

View tool details β†’

Snyk

Developer security.

A platform that helps developers find and fix vulnerabilities in code, open source, containers, and IaC.

View tool details β†’

Lacework

Data-driven cloud security.

A CNAPP that uses anomaly detection to identify threats across cloud workloads, accounts, and containers.

View tool details β†’

Balbix

The AI-Powered Cyber Posture Automation Platform.

Uses AI to automate asset discovery, vulnerability management, and cyber risk quantification.

View tool details β†’

Microsoft Defender for Endpoint

Comprehensive endpoint protection for a secure, productive hybrid work experience.

An enterprise endpoint security platform that helps organizations prevent, detect, investigate, and respond to advanced threats.

View tool details β†’

Lansweeper

The IT Asset Management Platform.

An IT asset management platform that discovers and inventories all of your IT assets, providing a single source of truth for your entire IT environment.

View tool details β†’

Device42

The Hybrid Cloud Discovery and Dependency Mapping Platform.

A comprehensive IT asset management and dependency mapping platform that provides a single source of truth for your entire IT ecosystem.

View tool details β†’

Invicti

The Application Security Company.

An application security testing platform that helps you secure your web applications, APIs, and microservices.

View tool details β†’

Mandiant Attack Surface Management

Gain an attacker's view of your exposures.

Part of the Mandiant Advantage platform, it provides visibility into external assets and vulnerabilities, backed by Mandiant's threat intelligence.

View tool details β†’

IBM Security Randori

Think like an attacker.

A cloud-native attack surface management platform that helps businesses discover and prioritize their most critical external risks.

View tool details β†’

Detectify

Application security testing reimagined.

A cloud-based attack surface management tool that leverages insights from elite ethical hackers for automated vulnerability scanning.

View tool details β†’

HackerOne Assets

Discover, inventory, and secure your entire attack surface.

An attack surface management solution that helps organizations map their digital footprint and prioritize security testing.

View tool details β†’

SecurityScorecard

The global leader in cybersecurity ratings.

A security ratings platform that provides continuous monitoring and assessment of an organization's and its vendors' cybersecurity posture.

View tool details β†’

Bitsight

AI-powered intelligence that outsmarts cyber risk.

A cyber risk intelligence platform that provides security ratings, external attack surface management, and third-party risk management.

View tool details β†’

Red Hat Ansible Automation Platform

A flexible, scalable, and comprehensive enterprise automation platform.

An enterprise automation platform that can be used for configuration management, application deployment, and security automation.

View tool details β†’

Cisco Vulnerability Management (formerly Kenna Security)

Risk-Based Vulnerability Management

A risk-based vulnerability management platform that helps you prioritize and remediate the vulnerabilities that matter most.

View tool details β†’

Syxsense

Unified Security and Endpoint Management

A cloud-based platform that combines endpoint management and security in a single solution.

View tool details β†’

Cymulate

Move beyond theory to continuously ingest data, correlate relevant context, validate and prioritize defense optimization based on real-world threat context.

A SaaS-based Extended Security Posture Management (XSPM) platform that helps manage exposure to cyber threats.

View tool details β†’

Tenable.io

The Cyber Exposure Company

Provides comprehensive vulnerability data and insights to help you understand and reduce your cyber risk.

View tool details β†’

ManageEngine Vulnerability Manager Plus

Threat and vulnerability management software

An end-to-end vulnerability management solution that provides visibility, assessment, and remediation.

View tool details β†’

AttackIQ

Validate your cybersecurity readiness.

A leading provider of Breach and Attack Simulation (BAS) solutions for continuous security validation.

View tool details β†’

SafeBreach

Test Control Efficacy with the Best in BAS.

A pioneer in breach and attack simulation (BAS) that provides a platform to test defenses before attackers can exploit them.

View tool details β†’

Tenable Nessus

The #1 Vulnerability Assessment Solution

A widely used vulnerability scanner for identifying security vulnerabilities, misconfigurations, and malware.

View tool details β†’

Rapid7 InsightVM

Vulnerability Management That Works for You

A vulnerability management solution that provides visibility into risk across the entire IT environment.

View tool details β†’

Invicti

Application Security for Every Organization

A web application security scanner that provides automated vulnerability scanning and management.

View tool details β†’

Sysdig Secure

Cloud security, powered by runtime insights.

A cloud-native security platform that provides threat detection, vulnerability management, and compliance for containers, Kubernetes, and cloud.

View tool details β†’

Prisma Cloud

The Cloud Native Application Protection Platform

A comprehensive Cloud Native Application Protection Platform (CNAPP) from Palo Alto Networks.

View tool details β†’

Tenable.io

The Cyber Exposure Management Platform

Provides visibility across the modern attack surface and insights to prioritize and remediate vulnerabilities.

View tool details β†’

Rapid7 InsightVM

Clarity and confidence to manage vulnerability risk.

A risk-based vulnerability management solution that provides visibility, prioritized guidance, and automation.

View tool details β†’

Brinqa

The Cyber Risk Management Platform.

A platform for building a knowledge graph of all security and business data to manage cyber risk.

View tool details β†’

Palo Alto Networks Prisma Cloud

The industry’s most complete Cloud-Native Application Protection Platform (CNAPP).

A comprehensive CNAPP that provides security and compliance coverage from code to cloud.

View tool details β†’

Veracode

Secure the apps that power your world.

A unified platform that provides comprehensive, automated application security from development to production.

View tool details β†’

Ivanti Neurons for RBVM (RiskSense)

Risk-Based Vulnerability Management.

A risk-based vulnerability management solution that prioritizes threats and automates remediation.

View tool details β†’

Tenable.io Asset Inventory

See every asset, everywhere. In the cloud and on-premises.

Provides comprehensive asset visibility across your entire attack surface, including cloud, on-premises, and OT environments.

View tool details β†’

Rapid7 InsightVM

Vulnerability management that works. From discovery to remediation.

A vulnerability management solution that provides discovery, assessment, prioritization, and remediation of vulnerabilities.

View tool details β†’

Palo Alto Networks Cortex Xpanse

Know Your Attack Surface. Own It.

An attack surface management solution that discovers, evaluates, and mitigates risks across your entire internet-facing footprint.

View tool details β†’

SysAid

The AI-powered IT service management platform.

An AI-powered IT service management (ITSM) platform that helps you automate your IT and deliver better service.

View tool details β†’

Palo Alto Networks Cortex Xpanse

Active Attack Surface Management for the Modern Enterprise.

Provides a complete and accurate view of your global internet-facing assets to discover, evaluate, and mitigate your attack surface.

View tool details β†’

Rapid7 InsightVM

Vulnerability Management and Risk Assessment.

A vulnerability management solution that includes features for discovering and assessing assets across the entire attack surface.

View tool details β†’

Bugcrowd Attack Surface Management

Find, monitor, and secure digital assets before attackers strike.

An EASM solution that combines automated scanning with insights from a global community of ethical hackers.

View tool details β†’

UpGuard

The #1 Cyber Risk Posture Management Software Platform.

A platform that unifies attack surface management, vendor risk management, and security ratings.

View tool details β†’

Tenable.sc

On-Prem Vulnerability Management. Redefined.

On-premises vulnerability management platform for comprehensive visibility and measurement of cyber risk.

View tool details β†’

Rapid7 InsightVM

Clarity and Action to Reduce Risk

A vulnerability risk management solution that provides visibility, prioritized risk scoring, and remediation workflows.

View tool details β†’

Palo Alto Networks Prisma Cloud

The industry’s most complete cloud-native application protection platform.

A comprehensive CNAPP that provides security and compliance coverage from code to cloud.

View tool details β†’

Qualys VMDR

Vulnerability Management, Detection and Response

A cloud-based platform for vulnerability management, providing asset discovery, vulnerability assessment, and remediation.

View tool details β†’

OpenVAS

The Open Source Vulnerability Scanner

A powerful open-source vulnerability scanner with a comprehensive feature set.

View tool details β†’

Checkmarx

Make security intrinsic to everything you do

An application security testing platform that provides SAST, SCA, IAST, and DAST solutions.

View tool details β†’

Qualys VMDR

Vulnerability Management, Detection and Response.

A cloud-native solution that unifies discovery, assessment, detection, and response in a single workflow.

View tool details β†’

Qualys Asset Inventory

A complete, continuously updated inventory of all your IT assets, wherever they reside.

Provides a single source of truth for all IT assets across on-premises, cloud, and remote environments.

View tool details β†’

ServiceNow IT Asset Management

Automate the full lifecycle of your IT assets.

An IT asset management solution that helps organizations manage the entire lifecycle of their hardware, software, and cloud assets.

View tool details β†’

Forescout

Automated Cybersecurity for the Enterprise of Things.

A cybersecurity platform that provides continuous discovery, assessment, and control of all connected devices across the enterprise.

View tool details β†’

ManageEngine AssetExplorer

Complete IT asset management software.

A web-based IT asset management software that helps you monitor and manage all of your IT assets from a single place.

View tool details β†’

SolarWinds Hybrid Cloud Observability

Full-stack observability for hybrid IT.

A full-stack observability solution that provides visibility into the performance of your applications, infrastructure, and networks, across on-premises and cloud environments.

View tool details β†’

Tenable.asm

See your external attack surface from the attacker's perspective.

An external attack surface management solution that provides continuous visibility and assessment of internet-facing assets.

View tool details β†’

Qualys VMDR

Vulnerability Management, Detection and Response

A cloud-based app that provides a unified solution for asset discovery, vulnerability assessment, and remediation.

View tool details β†’

Check Point CloudGuard

Comprehensive Prevention-First Cloud Security

A unified cloud native security platform for automated posture management, threat prevention, and workload protection.

View tool details β†’

Progress Chef

Automate. Innovate. Accelerate.

An automation platform for building, deploying, and managing infrastructure and applications, with a strong focus on compliance.

View tool details β†’

Microsoft Defender for Cloud

Protect multicloud and hybrid environments with integrated security from code to cloud.

A unified cloud-native application protection platform (CNAPP) for Azure, AWS, and Google Cloud.

View tool details β†’

Qualys VMDR

Vulnerability Management, Detection and Response

A comprehensive solution that combines vulnerability management, detection, and response in a single platform.

View tool details β†’

Rapid7 InsightVM

Vulnerability Management and Endpoint Analytics

A vulnerability management solution that provides visibility into risk across your entire environment.

View tool details β†’

Mandiant Advantage Security Validation

Test your security effectiveness with intel-led validation.

A SaaS platform from Google Cloud that combines Mandiant's threat intelligence and expertise with automated security validation.

View tool details β†’

Acunetix

The Web Application Security Scanner You Can Rely On

An automated web application security testing tool that audits your web applications by checking for vulnerabilities.

View tool details β†’

Skybox Security

The Leader in Security Posture Management

A security posture management platform that provides visibility and context across your entire hybrid environment.

View tool details β†’

Checkmarx One

The unified AppSec platform.

An application security platform that provides SAST, SCA, IaC, and API security in a single solution.

View tool details β†’

Qualys CyberSecurity Asset Management

See your entire attack surface, continuously maintain your CMDB, and track EOL/EOS software.

A solution that combines internal and external asset discovery to provide a unified inventory and security posture assessment.

View tool details β†’

Puppet Enterprise

The standard for infrastructure automation and delivery.

An infrastructure automation tool for configuration management, compliance enforcement, and continuous delivery.

View tool details β†’

Anchore

Secure Your Software Supply Chain

A platform for container security and compliance.

View tool details β†’

Microsoft Defender External Attack Surface Management

Gain visibility into your external attack surface.

Defines an organization's unique internet-exposed attack surface and discovers unknown resources to proactively manage security posture.

View tool details β†’

Clair

Vulnerability Static Analysis for Containers

An open-source project for the static analysis of vulnerabilities in application containers.

View tool details β†’

Grype

A vulnerability scanner for container images and filesystems

An open-source vulnerability scanner for container images and filesystems from Anchore.

View tool details β†’

Syft

CLI tool and library for generating a Software Bill of Materials from container images and filesystems

An open-source tool for generating a Software Bill of Materials (SBOM).

View tool details β†’

CIS-CAT Pro Assessor

Automated Configuration Assessment Tool

The official tool from the Center for Internet Security (CIS) for assessing system configurations against CIS Benchmarks.

View tool details β†’

OpenSCAP

NIST Certified SCAP 1.2 Toolkit

An open-source framework for implementing and enforcing the Security Content Automation Protocol (SCAP).

View tool details β†’