GetApp offers free software discovery and selection resources for professionals like you. Our service is free because software vendors pay us when they generate web traffic and sales leads from GetApp users. Because we’re committed to help you find the right solution for your business needs, we list all software vendors on our website, and give them the opportunity to feature their solutions and collect user reviews. At GetApp, our comprehensive software listings, verified user reviews, software evaluation scorecards, product comparison pages and articles will empower you to make confident and well-informed purchase decisions.
Here's our list of apps for Vulnerability Management Software. Filters help you narrow down the results to find exactly what you’re looking for.
Heimdal Patch & Asset Management is an automated patch management tool for Windows, Linux and 3rd party software that helps you manage vulnerabilities and strengthens your security. Its' inbuilt asset tracking capabilities offer full visibility into your software inventory.
Read more about Heimdal Patch & Asset Management
Syxsense is an endpoint security software designed to help SecOps departments, managed service providers (MSPs), and IT professionals maintain threat prevention through authorization scanning, third-party patching, communication blocking from infected devices, and continuous collaboration.
Read more about Syxsense
Invicti, formerly Netsparker, web application security scanning solution automatically identifies XSS, SQL Injection and other vulnerabilities in websites, web applications and web services and lets enterprise-class businesses automate and scale their web security program.
Read more about Invicti
ESOF VMDR is a risk-based vulnerability management platform having cyber score calculation. It provides complete details of the vulnerabilities present in your entire IT stack to security teams. Besides this, it also gives the previous five years' history of vulnerabilities since boarding.
Read more about ESOF VMDR
Astra’s Pentest suite is a solution for companies looking for an automated vulnerability scan, manual penetration testing, or both. With 3000+ tests, it scans the user's assets for CVEs in OWASP top 10, SANS 25, and covers all the tests required for ISO 27001, SOC2, HIPAA, and GDPR compliance.
Read more about Astra Pentest
We provide a Software Security platform designed to bring you objective data so you can make informed decisions regarding the security risks faced by your applications. SAST and open source management of your entire portfolio.
Read more about Kiuwan
Automox is a cloud-based cyber hygiene and patch management solution that helps enterprises streamline endpoint protection and minimize cyber threats across all devices. The centralized platform provides users with an overview of devices requiring patch approvals, system updates, or troubleshooting.
Read more about Automox
Runecast is a secure, real-time issue analysis solution for VMware + AWS hybrid cloud, to automate security and audit compliance, identify and prioritize vulnerabilities, analyze logs for patterns, align with Best Practices, and simulate upgrades against the VMware HCL.
Read more about Runecast Analyzer
Efficiently Reduce Organizational Security Risk with TOPIA's leading vulnerability management platform that provides an efficient way to patch-less and get more.
TOPIA enables companies to analyze, prioritize, and act against software vulnerabilities with or without a security patch.
Read more about TOPIA
With Rencore, users can automate Microsoft 365 Governance, ranging from mid-level businesses to large enterprises worldwide while providing maximum flexiblity. Rencore integrates with Microsoft Teams, SharePoint, Azure, and Power Platform and is used for monitoring end-user acivity, governance planning, automated fixing and deviation discovery.
Read more about Rencore Governance
Pentera is the category leader for Automated Security Validation, allowing organizations to stress-test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale.
Read more about Pentera
Bytesafe is a firewall for dependencies. Using the source code and vulnerability management platform, businesses can protect applications, stay in control and keep unwanted dependencies out of the organization.
Read more about Bytesafe
Sonrai Public Cloud Security Platform is an identity and data governance software for AWS, Azure, Google Cloud, and Kubernetes. Its automated workflow capabilities enable security teams to scale and respond to the threats, giving them the ability to accelerate their remediation efforts and reduce false positives.
Read more about Sonrai Public Cloud Security Platform
FlexNet Code Insight is designed to help development, legal, and security teams handle open source software (OSS) through automated scans. It enables organizations to manage license compliance and security risks by identifying vulnerabilities during the entire application production lifecycle.
Read more about FlexNet Code Insight
ESOF AppSec provides vulnerability management for businesses by enabling them to undergo penetration testing and complete a DevSecOps lifecycle, eliminating all threats and risks. Therefore, it surrounds every endpoint from where these threats get inherited in the IT stack.
Read more about ESOF App Sec
Teleport lets you manage your infrastructure from your laptop, tablet or phone. It provides secure SSH and SFTP access to any server from your browser or the command line. You can use Teleport to securely manage any server, anywhere in the world.
Read more about Teleport
NorthStar is a powerful, fully-integrated security platform that allows users to manage the information security risk of your organization in an automated, flexible and reliable way.
Read more about NorthStar
Malwarebytes is a network security software that enables businesses to identify and detect potential cyberthreats across networks or enterprise servers. The cloud-based Malwarebytes Nebula platform lets administrators gain visibility into threat patterns from the centralized dashboard.
Read more about Malwarebytes for Business
PDQ Deploy is the best way to automate your patch management. Update third-party software, deploy custom scripts, and make impactful configuration changes in minutes. With 200+ ready-to-deploy applications right out of the box.
Read more about PDQ Deploy
Nessus is a cloud-based vulnerability assessment solution designed to help security practitioners identity and resolve vulnerabilities to protect organizations against various security risks. It comes with pre-defined templates which can be customized by users to scan for critical vulnerabilities.
Read more about Nessus
SiteGround is a cloud-based vulnerability management tool that helps businesses leverage AI technology to monitor and identify potential issues across servers. The application automatically prevents botnet attacks across all servers to prevent unauthorized access and secure other hosting resources.
Read more about SiteGround
Traditional agent-based vulnerability management solutions are unfit for cloud. DevOps doesn't want to be bothered with deploying and maintaining agents on VMs, in containers, and in serverless configurations. Orca detects vulnerabilities, malware, misconfigurations, and more.
Read more about Orca Security
Dark Web ID is a cloud-based cybersecurity tool, which monitors the dark web and alerts businesses to any risks or threats. The platform can be used by MSPs or enterprises to prevent data breaches and ensure sensitive employee or company data is not available on the dark web.
Read more about Dark Web ID
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.
Read more about Qualys Cloud Platform
Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in real-time to prevent data loss. Features include event recording, alerts, prioritization, credential management, and access control.
Read more about Falcon
SanerNow is an integrated platform that helps businesses secure system devices and monitor potential threats across digital assets via patch management, endpoint detection & response (EDR), and more. Key features include regulatory compliance, asset management, audit trails, and reporting.
Read more about SanerNow
AWS Config is a configuration and vulnerability management software that helps businesses manage continuous audits, operational troubleshooting, compliance monitoring, and more from within a unified platform. It allows staff members to automatically send updates of all configuration changes including resource updation, creation, and deletion.
Read more about AWS Config
DataDome Anti-bot Protection software is a cloud-based platform designed to help businesses identify and prevent bot attacks in real-time using in-memory pattern databases along with machine learning (ML) and artificial intelligence (AI) technologies.
Read more about DataDome
KACE is a Unified Endpoint Management solution that offers a single point of control for managing IT systems across the entire organization, inside or outside your network. This comprehensive solution takes the stress out of keeping devices secure and compliant so you can do more.
Read more about KACE
DriveStrike is a cloud-based data and device protection solution which helps businesses of all sizes with data security and compliance. Key features include incident management, policy management, automated device recognition, real time monitoring, and remote locking.
Read more about DriveStrike
Snyk is a cloud-based application security and testing platform, which helps enterprises discover and fix vulnerabilities across open source libraries, containers, or codes throughout the development process. Features include runtime monitoring, reporting, exploitability indicators, alerts, and prioritization.
Read more about Snyk
Alert Logic MDR is a managed detection and response platform that helps businesses identify, investigate, and eliminate active threats across networks, applications, and endpoint devices. Features include asset discovery, PCI scanning, behavior tracking, web log analytics & real-time reporting.
Read more about Alert Logic MDR
vRealize Automation (vRA) is a web-based configuration management software designed to help organizations streamline IT services requests made by authorized administrators, business users or developers from a secure portal whilst maintaining compliance with industrial policies.
Read more about vRealize Automation
USM Anywhere is a cloud-based threat detection and response software designed to help IT professionals automatically collect and analyze data across cloud, on-premise, and hybrid environments. Powered by Alien Labs, the platform lets security teams leverage data from leverages from the Open Threat Exchange (OTX) to gain threat intelligence.
Read more about USM Anywhere
IncMan SOAR is a cloud-based and on-premise platform, which enables enterprises to manage, evaluate, and plan various security operation tasks such as threat hunting and investigation, triage and escalation, incident qualification, and more using machine learning and automation capabilities.
Read more about IncMan SOAR
Complete data is the basis for managing IT assets, optimizing costs and minimizing risks.
TThe integration of different data sources and the preparation of concise dashboards and reports serve as a decision-making base and enable you to effectively manage data with the highest data quality.
Read more about RayVentory
Automated certificate management solution, capable of detecting all SSL/TLS assets, even unknown. It scans your networks and checks for potential weaknesses and vulnerabilities to be addressed. It provides in-dashboard system health overview, single inventory, expiration reporting and more.
Read more about Keyhub
Vendors bid for placement within our listings. This option sorts the directory by those bids, highest to lowest. Vendors who bid for placement can be identified by the blue “Visit Website” button on their listing.
Sorts products as a function of their overall star rating, normalized for recency and volume of reviews, from highest to lowest.