---
description: Page 2 - Compare the best Vulnerability Management Software in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 2 - Vulnerability Management Software - Price Comparison & Reviews - Capterra UK 2026
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](https://www.capterra.co.uk/directory/31062/vulnerability-management/software) > [Page 2](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2)

# Vulnerability Management Software

Canonical: https://www.capterra.co.uk/directory/31062/vulnerability-management/software

Page: 2 / 10\
Prev: [Previous page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)\
Next: [Next page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=3)

> Vulnerability Management software helps predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [System Mechanic Ultimate Defense](https://www.capterra.co.uk/software/1016140/iolo) — 4.7/5 (66 reviews) — System Mechanic Ultimate Defense is designed to provide a complete solution for all PC optimization needs.
2. [Syxsense](https://www.capterra.co.uk/software/141605/patch-manager) — 4.6/5 (61 reviews) — Syxsense delivers comprehensive vulnerability management, including security configuration management.
3. [Orca Security](https://www.capterra.co.uk/software/188445/orca-security) — 4.8/5 (60 reviews) — Within minutes, Orca's agentless platform detects vulnerabilities across the cloud and prioritizes your riskiest vulnerabilities.
4. [CrowdStrike](https://www.capterra.co.uk/software/147662/crowdstrike-falcon) — 4.7/5 (55 reviews) — Falcon Spotlight provides real-time visibility across your enterprise, giving you relevant and timely information to reduce exposure.
5. [Cohesity](https://www.capterra.co.uk/software/166007/cohesity) — 4.6/5 (53 reviews) — Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.
6. [Beagle Security](https://www.capterra.co.uk/software/198609/beagle-security) — 4.9/5 (51 reviews) — Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
7. [Zscaler](https://www.capterra.co.uk/software/175516/zscaler-internet-access) — 4.3/5 (48 reviews) — Zscaler simplifies vulnerability management with real-time traffic inspection, threat intelligence, and proactive risk mitigation.
8. [CanIPhish](https://www.capterra.co.uk/software/1019867/caniphish) — 4.8/5 (45 reviews) — CanIPhish provides the world's first self-service phishing simulation platform. Sign-up for free and access our platform in minutes.
9. [AWS Config](https://www.capterra.co.uk/software/205398/aws-config) — 4.6/5 (44 reviews) — Config Tool from AWS is a cloud-based that helps businesses assess, audit, and evaluate multi-account AWS environments.
10. [CyLock EVA](https://www.capterra.co.uk/software/1030934/cylock-anti-hacker) — 4.9/5 (42 reviews) — The first Click\&amp;Play Cyber Security platform. CyLock finds out if your systems are hacker safe in one click\!
11. [Risk Hawk](https://www.capterra.co.uk/software/1035322/risk-hawc) — 4.7/5 (42 reviews) — Cloud-based (SaaS) integrated risk management tool that helps handle controls, incidents, internal audits, compliance, and more.
12. [runZero](https://www.capterra.co.uk/software/201787/runzero) — 4.9/5 (37 reviews) — runZero is an exposure management platform providing unrivaled visibility across your entire internal and external attack surface.
13. [Kiuwan](https://www.capterra.co.uk/software/160729/kiuwan-code-security) — 4.4/5 (35 reviews) — Kiuwan | Code Scanning That’s Built for Developers and Trusted by Security Teams
14. [Runecast](https://www.capterra.co.uk/software/175477/runecast-analyzer) — 4.9/5 (34 reviews) — Proactive Best Practice \&amp; Security Analysis for AWS, Azure, GCP, Kubernetes, VMware, Windows and Linux OS.
15. [Qualys Cloud Platform](https://www.capterra.co.uk/software/82971/qualysguard-enterprise) — 4.0/5 (33 reviews) — Qualys VMDR – All-in-One Vulnerability Management, Detection, and Response.
16. [Dark Web ID](https://www.capterra.co.uk/software/188259/dark-web-id) — 3.7/5 (30 reviews) — Dark Web ID monitors the dark web and instantly alerts you when compromised business or personal credentials are found.
17. [Saner CVEM](https://www.capterra.co.uk/software/152523/secpod) — 4.5/5 (29 reviews) — Accurately scan vulns in 5 mins. Assess, Prioritize and Immediately Patch them with the SanerNow Vulnerability Management Software.
18. [CyberArk Privileged Access Management Solutions](https://www.capterra.co.uk/software/119742/privileged-account-security-solution) — 4.3/5 (27 reviews) — Software to control access to administrative and privileged accounts, manage information leaks and overall risk by automating policies.
19. [Invicti](https://www.capterra.co.uk/software/171539/netsparker-web-application-security-scanner) — 4.7/5 (26 reviews) — Invicti, formerly Netsparker, is a DAST-first AppSec platform proving real risks, cutting noise, and securing everything at scale.
20. [AppTrana](https://www.capterra.co.uk/software/195294/apptrana) — 4.6/5 (24 reviews) — AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
21. [Netsurion](https://www.capterra.co.uk/software/80473/netsurion) — 3.6/5 (23 reviews) — Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.
22. [KACE](https://www.capterra.co.uk/software/177311/kace) — 4.0/5 (23 reviews) — KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
23. [Red Sentry](https://www.capterra.co.uk/software/1019242/red-sentry) — 4.8/5 (22 reviews) — Vulnerability management support that helps teams validate exploitability and prioritize remediation based on real risk.
24. [Snyk](https://www.capterra.co.uk/software/172252/snyk) — 4.6/5 (21 reviews) — Snyk's Developer Security Platform puts security expertise in the toolbox of every developer.
25. [Hackrate](https://www.capterra.co.uk/software/1020647/hackrate) — 5.0/5 (21 reviews) — Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community.

-----

Page: 2 / 10\
Prev: [Previous page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)\
Next: [Next page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=3)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.uk/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.uk/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.co.uk/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.co.uk/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.co.uk/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Capterra UK helps millions of people find the best business software. With software reviews, ratings, infographics, and the most comprehensive list of business software.","email":"info@capterra.co.uk","url":"https://www.capterra.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCEt7vQSPiPlPAblHdhJAqnA"]},{"name":"Capterra UK","url":"https://www.capterra.co.uk/","@id":"https://www.capterra.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Page 2 - Compare the best Vulnerability Management Software in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.","url":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2","about":{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2#breadcrumblist"},"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2#itemlist"},"publisher":{"@id":"https://www.capterra.co.uk/#organization"}},{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Vulnerability Management Software - Price Comparison &amp; Reviews - Capterra UK 2026","@context":"https://schema.org","@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=2#itemlist","@type":"ItemList","itemListElement":[{"name":"System Mechanic Ultimate Defense","position":1,"description":"System Mechanic Ultimate Defense provides PC performance optimization, system cleaning and protection against malicious attacks. This program helps prevent PC crashes, freezes and poor performance with two simple steps:1. System Mechanic cleans up junk files and shortcuts from your hard drive to free up space. System Mechanic removes registry errors that slow down your PC.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/05bc139e-0b2f-4fec-a081-1d162b8b8a7a.jpeg","url":"https://www.capterra.co.uk/software/1016140/iolo","@type":"ListItem"},{"name":"Syxsense","position":2,"description":"Syxsense delivers comprehensive vulnerability management, including security configuration management. Syxsense detects OS and third-party software and security configuration vulnerabilities, such as open ports, disabled firewalls, insecure passwords, and more. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e2068683-0dfb-4e13-8ab7-3de6ea98c2fe.png","url":"https://www.capterra.co.uk/software/141605/patch-manager","@type":"ListItem"},{"name":"Orca Security","position":3,"description":"Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely and effective manner.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dc4da2bc-b63d-49f4-a76e-5b0814fe7d80.jpeg","url":"https://www.capterra.co.uk/software/188445/orca-security","@type":"ListItem"},{"name":"CrowdStrike","position":4,"description":"As part of an integrated platform that prevents exploits and post-exploit activity, Falcon Spotlight allows you to research common vulnerabilities and exposures (CVEs) to examine threat actor profiles and targets.\n\nFalcon Spotlight provides real-time visibility across your enterprise giving you relevant and timely information you need to reduce your exposure to attacks with zero impact on your endpoints.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e223712f-b823-4608-92e0-14d1f76a5f6e.png","url":"https://www.capterra.co.uk/software/147662/crowdstrike-falcon","@type":"ListItem"},{"name":"Cohesity","position":5,"description":"Cohesity is a leader in AI-powered data security and management. Cohesity makes it easy to secure, protect, manage, and get value from data—across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale. Cohesity solutions can be delivered as a service, self-managed, or provided by a Cohesity-powered partner. Cohesity is headquartered in San Jose, CA and is trusted by the world’s largest enterprises, including six of the Fortune 10 and 42 of the Fortune 100.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2be927d0-6de9-4021-a3f8-fc6032e2a62b.png","url":"https://www.capterra.co.uk/software/166007/cohesity","@type":"ListItem"},{"name":"Beagle Security","position":6,"description":"Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. \n\nThe DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d64bd889-0939-4439-8b97-c160f6f51aa8.png","url":"https://www.capterra.co.uk/software/198609/beagle-security","@type":"ListItem"},{"name":"Zscaler","position":7,"description":"Zscaler redefines vulnerability management with its cloud-native Zero Trust platform, providing continuous visibility and protection against emerging threats. \n\nBy inspecting all traffic in real time, Zscaler identifies potential vulnerabilities across users, applications, and devices, ensuring your organization stays one step ahead of attackers. Its advanced threat intelligence, combined with automated policy enforcement, helps mitigate risks and remediate vulnerabilities before they can be exploited.\n\nZscaler offers seamless integration with endpoint and workload security tools, empowering teams to proactively manage vulnerabilities across SaaS, cloud, and on-premise environments. With centralized reporting and global scalability, you gain a clear view of your security posture while protecting distributed workforces. Simplify vulnerability management and protect your organization against evolving risks with Zscaler’s industry-leading cloud security platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7a6796f9-1449-4617-8dd6-deb7827a0caa.png","url":"https://www.capterra.co.uk/software/175516/zscaler-internet-access","@type":"ListItem"},{"name":"CanIPhish","position":8,"description":"Train your users and reduce their phish click risk by up to 90% with an easy-to-use market-leading platform.\n\nOur platform does this by utilising real-world techniques and phishing material to phish and train employees. We track all interactions from emails viewed, to payloads clicked to credentials and endpoints compromised. We allow you to then identify which users are prone to phishing material and target them for future training.\n\nWe use a modern approach to combat a modern threat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/294e2fd0-bfe4-47be-8c18-2e094c380971.png","url":"https://www.capterra.co.uk/software/1019867/caniphish","@type":"ListItem"},{"name":"AWS Config","position":9,"description":"Config Tool is an Amazon Web Services (AWS) product that helps users manage their AWS configurations. The tool allows users to select cookie preferences, customize cookies, and manage privacy settings on the AWS website. Config Tool gives users control over essential, performance, functional, and advertising cookies. It provides options to accept all cookies, continue without accepting, or customize cookie preferences. Config Tool aims to deliver a smooth user experience by enabling customized privacy and cookie consent on AWS.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4f9f087b-3a9a-43b0-a1ce-9ef2f59358d4.png","url":"https://www.capterra.co.uk/software/205398/aws-config","@type":"ListItem"},{"name":"CyLock EVA","position":10,"description":"CyLock is a software designed to defend your systems from hacker attacks, identifying weaknesses on your systems and websites, providing information to address vulnerabilities (those used by cyber criminal to access to your computers).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6ff7bbb7-cbee-4198-9323-e6feaa8d9dd4.png","url":"https://www.capterra.co.uk/software/1030934/cylock-anti-hacker","@type":"ListItem"},{"name":"Risk Hawk","position":11,"description":"Cloud-based integrated risk management tool that helps handle risks (ERM, IFC, ICFR, ORM), controls, incidents, policy management, Internal Audits, action plans, regulatory compliance, Third Party Risk Management, contract management, and more. Also available for on-premise installation. Supports single sign-on, bespoke workflow configurations & dashboards and guarantees high adoptability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/987b3dcc-b347-473c-9830-2046024a7496.png","url":"https://www.capterra.co.uk/software/1035322/risk-hawc","@type":"ListItem"},{"name":"runZero","position":12,"description":"Built on a foundation of deep, comprehensive visibility, runZero surfaces exposures that traditional vulnerability and attack surface tools simply miss. Our discovery methods and novel fingerprinting break through the limits of agent, authentication, and attribution-only approaches to reveal the risks others can’t, even in OT and IoT environments. With proprietary scanning designed and proven safe for even the most sensitive devices, runZero ensures that no matter the device or the risk, you see what others miss, detect what others can’t, and leave no threat unchecked.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8911edc-294f-4cc5-aacd-639ecfdbdc99.png","url":"https://www.capterra.co.uk/software/201787/runzero","@type":"ListItem"},{"name":"Kiuwan","position":13,"description":"Fast, Flexible Code Security!\n\nKiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. \n\nOur toolset includes Static Application Security Testing (SAST), Software Composition Analysis (SCA), Software Governance and Code Quality, empowering your team to quickly identify and remediate vulnerabilities.\n\nTop features:\n✅ Extensive language support: Over 30 programming languages.\n✅ Detailed action plans: Prioritize remediation with tailored action plans.\n✅ Code Security: Seamless Static Application Security Testing (SAST) integration.\n✅ Insights: On-demand or continuous scanning Software Composition Analysis (SCA) to help reduce third-party threats.\n✅ One-click Software Bill of Materials (SBOM) generation.\n\n\nCode Smarter. Secure Faster. Ship Sooner","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a8dcb3c0-541d-479f-a555-bed59bc42274.png","url":"https://www.capterra.co.uk/software/160729/kiuwan-code-security","@type":"ListItem"},{"name":"Runecast","position":14,"description":"An AI-powered solution that allows businesses to keep their workloads secure and compliant anywhere.  Your teams can do more with a single platform that checks your cloud infrastructure, for increased visibility, security and time saving. \nRunecast helps reduce operational overheads, increase clarity and easily assess infrastructure vulnerabilities and manage regulatory compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d21b54d1-b23a-4a89-aeb2-015c03e1e5ed.png","url":"https://www.capterra.co.uk/software/175477/runecast-analyzer","@type":"ListItem"},{"name":"Qualys Cloud Platform","position":15,"description":"Qualys VMDR enables organizations to automatically discover every asset in their environment, including unmanaged assets appearing on the network, inventory all hardware and software, and classify and tag critical assets. \n\nVMDR continuously assesses these assets for the latest vulnerabilities and applies the latest threat intel analysis to prioritize actively exploitable vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/296fda38-71c2-40bb-91b2-b8813c1a7c14.png","url":"https://www.capterra.co.uk/software/82971/qualysguard-enterprise","@type":"ListItem"},{"name":"Dark Web ID","position":16,"description":"Dark Web ID helps MSPs and IT teams proactively protect their organizations and customers from cybersecurity incidents. It monitors the dark web 24/7/365 and issues alerts when credentials or PII are found up on the dark web, allowing you to take defensive measures before cybercriminals attack.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6de1646f-1b5d-40f7-ada6-4494ba1c0a0c.png","url":"https://www.capterra.co.uk/software/188259/dark-web-id","@type":"ListItem"},{"name":"Saner CVEM","position":17,"description":"In > 5 MIN, SanerNow automatically and accurately scans your entire network. Post that it assesses and prioritizes vulnerabilities based on their severity i.e. CVSS score. \n\nSanerNow comes with the world's largest SCAP repository and with 190,000+ continuous checks. These features ensure that your organization remains secure from ever-evolving cyber attacks. \n\nWith SanerNow, you can also patch vulnerabilities instantly. It supports all OSs and 550+ Third-Party Apps (Most in industry).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/71d1e410-0802-43c3-a7b3-dfabe7e032c0.png","url":"https://www.capterra.co.uk/software/152523/secpod","@type":"ListItem"},{"name":"CyberArk Privileged Access Management Solutions","position":18,"description":"CyberArk Privileged Access Management Solutions secure privileged credentials across on-premises, cloud, and hybrid environments. It offers capabilities such as continuous account management, session isolation, and activity remediation. \n\nThe Privileged Access Manager centralizes control over privileged accounts, while the Endpoint Privilege Manager enforces least privilege on desktops and servers. The Vendor Privileged Access Manager enables secure, passwordless vendor access, and the Cloud Entitlements Manager oversees cloud permissions. The solution protects against breaches by securing identities and credentials, facilitating compliance, and enabling digital business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e64cd799-8ecc-42d4-ad8c-c52ef4914cdd.png","url":"https://www.capterra.co.uk/software/119742/privileged-account-security-solution","@type":"ListItem"},{"name":"Invicti","position":19,"description":"Invicti Security, formerly Netsparker, delivers application security with zero noise through a DAST-first approach that focuses on real, exploitable vulnerabilities in your running applications. The platform combines enterprise-grade dynamic application security testing (DAST), API security, web asset and API discovery, IAST, and dynamic SCA with static application security testing (SAST), static software composition analysis (SCA), and container security—all within a single, scalable solution. With proof-based scanning, Invicti automatically confirms exploitable vulnerabilities, to reduce false positives and speed remediation. Teams can prioritize real risk, reduce alert fatigue, and confidently secure their entire attack surface. Invicti integrates into modern development pipelines for continuous scanning and actionable insights across the SDLC. Trusted by leading enterprises, Invicti empowers security and DevOps teams to fix what matters most—quickly, accurately, and at scale.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d386ac3d-34c6-4fa7-a326-728dc8167276.png","url":"https://www.capterra.co.uk/software/171539/netsparker-web-application-security-scanner","@type":"ListItem"},{"name":"AppTrana","position":20,"description":"Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees.\n\nIndusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/47a09778-f8a2-42f1-be8d-484d32b38c5d.png","url":"https://www.capterra.co.uk/software/195294/apptrana","@type":"ListItem"},{"name":"Netsurion","position":21,"description":"Netsurion® delivers complete cybersecurity confidence through wider attack surface coverage, deeper threat detection, and faster incident response. Netsurion’s Managed XDR solution combines our 24x7 SOC and our Open XDR platform in a co-managed service that gives you the ultimate flexibility to adapt and grow while maintaining a secure environment. Headquartered in Ft. Lauderdale, FL with a global team of security analysts and engineers, Netsurion is a leader in Managed Extended Detection & Resp","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7425e21c-45d3-4792-a80a-eaf5f6229329.png","url":"https://www.capterra.co.uk/software/80473/netsurion","@type":"ListItem"},{"name":"KACE","position":22,"description":"KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30ec5e4a-8d78-42f3-ae66-3a8b2687d3b9.png","url":"https://www.capterra.co.uk/software/177311/kace","@type":"ListItem"},{"name":"Red Sentry","position":23,"description":"Red Sentry supports vulnerability management programs by helping organizations identify, validate, and prioritize security vulnerabilities based on real-world risk. The service complements automated scanning by determining which findings are exploitable and require remediation.\n\nSecurity experts perform targeted testing to assess vulnerabilities across applications, APIs, cloud environments, and networks. This approach helps teams focus remediation efforts on issues with demonstrated impact rather than theoretical or low-risk findings.\n\nResults are delivered in structured reports that include severity ratings, evidence of exploitation, and remediation guidance. These outputs help security and IT teams manage risk more effectively, improve remediation workflows, and support internal security reviews and compliance initiatives.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/394d0ea1-a32b-4c88-b6f6-14d618fdffab.png","url":"https://www.capterra.co.uk/software/1019242/red-sentry","@type":"ListItem"},{"name":"Snyk","position":24,"description":"Snyk is the leader in developer security. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0b834ddb-8c1a-4529-9ac4-28e194ec2eaf.png","url":"https://www.capterra.co.uk/software/172252/snyk","@type":"ListItem"},{"name":"Hackrate","position":25,"description":"Hackrate Bug Bounty platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.\n\nA bug bounty is about using the power of crowdsourced security to secure your business. During a bug bounty program, a company offers rewards to ethical hackers for reporting vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ed22b2cf-56b6-4703-bfd3-8678cf718471.png","url":"https://www.capterra.co.uk/software/1020647/hackrate","@type":"ListItem"}],"numberOfItems":25}
</script>
