---
description: Page 4 - Compare the best Vulnerability Management Software in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 4 - Vulnerability Management Software - Price Comparison & Reviews - Capterra UK 2026
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](https://www.capterra.co.uk/directory/31062/vulnerability-management/software) > [Page 4](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4)

# Vulnerability Management Software

Canonical: https://www.capterra.co.uk/directory/31062/vulnerability-management/software

Page: 4 / 10\
Prev: [Previous page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=3)\
Next: [Next page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=5)

> Vulnerability Management software helps predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [Sysdig](https://www.capterra.co.uk/software/153985/sysdig-cloud) — 4.4/5 (7 reviews) — Sysdig secures cloud innovation with the power of runtime insights.
2. [Appgate SDP](https://www.capterra.co.uk/software/219259/appgate) — 5.0/5 (7 reviews) — Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
3. [DriveLock](https://www.capterra.co.uk/software/219612/drivelock) — 4.6/5 (7 reviews) — DriveLock Vulnerability Management recognizes and control the risks associated with vulnerabilities.
4. [Bytesafe](https://www.capterra.co.uk/software/1019115/bytesafe) — 4.6/5 (7 reviews) — Manage Open Source supply chain threats intelligently with Bytesafe's cloud-native security platform.
5. [AppSec Education Platform](https://www.capterra.co.uk/software/182584/hackedu-secure-development-training) — 4.5/5 (6 reviews) — Security Journey offers hands-on secure coding training to help organizations lower vulnerabilities in code and meet PCI compliance.
6. [Reveelium](https://www.capterra.co.uk/software/183236/reveelium) — 4.5/5 (6 reviews) — Behavioural analysis tool to detect weak signals \&amp; anomalies in information systems using forensics \&amp; extensive research algorithms.
7. [Enginsight](https://www.capterra.co.uk/software/183883/enginsight) — 5.0/5 (6 reviews) — Recognize vulnerabilities and how a hacker could crack your system.
8. [Jazz Platform](https://www.capterra.co.uk/software/189135/jazz-platform) — 5.0/5 (6 reviews) — Machine learning \&amp; policy engine provide threat detection \&amp; response. Also used for threat hunting \&amp; automated security training.
9. [Trellix MOVE AntiVirus](https://www.capterra.co.uk/software/201981/Trellix-MOVE-AntiVirus) — 4.5/5 (6 reviews) — Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network.
10. [Uptycs](https://www.capterra.co.uk/software/202557/uptycs) — 4.7/5 (6 reviews) — Uptycs unified CNAPP and XDR secures your enterprise from endpoint through cloud, eliminating tool, team, and infrastructure silos.
11. [JFrog Xray](https://www.capterra.co.uk/software/1018276/jfrog-xray) — 4.3/5 (6 reviews) — Software composition analysis solution that scans your OSS dependencies for security vulnerabilities and license compliance issues.
12. [Machine Learning on AWS](https://www.capterra.co.uk/software/1029661/machine-learning-on-aws) — 4.7/5 (6 reviews) — Machine learning and artificial intelligence solutions from AWS that help companies analyze data and streamline business processes.
13. [Cyrisma](https://www.capterra.co.uk/software/1036781/cyrisma) — 4.5/5 (6 reviews) — A complete cyber risk management platform that enables organizations to identify \&amp; mitigate risk, while reducing costs and complexity.
14. [Axonius](https://www.capterra.co.uk/software/178568/axonius-cybersecurity-asset-management-platform) — 5.0/5 (5 reviews) — With Axonius, you can discover, track, prioritize, remediate, and report on all vulnerabilities across all devices in your environment.
15. [MisterScanner](https://www.capterra.co.uk/software/196439/abbey) — 2.6/5 (5 reviews) — Automated testing that sends you weekly security reports generated after testing the site.
16. [GuardRails](https://www.capterra.co.uk/software/199631/guardrails) — 5.0/5 (5 reviews) — Application security platform that empowers developers to create secure applications by providing continuous security.
17. [Holm Security VMP](https://www.capterra.co.uk/software/209427/holm-security-vmp) — 4.4/5 (5 reviews) — We help you identify vulnerabilities in your cyber security defenses, automatically. Cover technical and human assets in one platform.
18. [Microsoft Defender for Identity](https://www.capterra.co.uk/software/219693/microsoft-defender-for-identity) — 4.8/5 (5 reviews) — Microsoft Defender for Identity helps protect the identity security landscape.
19. [PingSafe](https://www.capterra.co.uk/software/1036019/pingsafe) — 5.0/5 (5 reviews) — All-in-one cloud security platform with an attacker intelligence approach.
20. [Xygeni Security](https://www.capterra.co.uk/software/1043740/xygeni) — 5.0/5 (5 reviews) — AI-driven vulnerability management with exploit-focused prioritization, unified risk visibility, automated remediation across the SDLC.
21. [Reporter](https://www.capterra.co.uk/software/1061461/reporter) — 4.6/5 (5 reviews) — Enterprise pentest reporting software with self-hosted deployment, customizable reports, and full control over security assessment data
22. [Security Manager by FireMon](https://www.capterra.co.uk/software/142894/security-manager) — 4.3/5 (4 reviews) — FireMon delivers real-time visibility into and control over complex network security infrastructures, policies and risk postures.
23. [Unified VRM](https://www.capterra.co.uk/software/130575/unified-vrm) — 4.3/5 (4 reviews) — Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.
24. [UpGuard](https://www.capterra.co.uk/software/159010/upguard) — 4.5/5 (4 reviews) — UpGuard is a cloud-based risk management solution that helps businesses secure data, monitor risks, track threats, and more.
25. [Sonatype Lifecycle](https://www.capterra.co.uk/software/171030/nexus-lifecycle) — 4.0/5 (4 reviews) — Get automatic and continuous monitoring that alerts you to open source vulnerabilities so you can find and fix faster.

-----

Page: 4 / 10\
Prev: [Previous page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=3)\
Next: [Next page](https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=5)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.uk/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.uk/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.co.uk/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.co.uk/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.co.uk/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.co.uk/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.co.uk/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Capterra UK helps millions of people find the best business software. With software reviews, ratings, infographics, and the most comprehensive list of business software.","email":"info@capterra.co.uk","url":"https://www.capterra.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCEt7vQSPiPlPAblHdhJAqnA"]},{"name":"Capterra UK","url":"https://www.capterra.co.uk/","@id":"https://www.capterra.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Page 4 - Compare the best Vulnerability Management Software in the UK. Capterra offers the most comprehensive reviews from verified users, prices, and a complete description of all relevant features. Use our filters to find the best rated software for your business needs.","url":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4","about":{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4#breadcrumblist"},"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.co.uk/#website"},"inLanguage":"en-GB","mainEntity":{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4#itemlist"},"publisher":{"@id":"https://www.capterra.co.uk/#organization"}},{"@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 4","position":3,"item":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 4 - Vulnerability Management Software - Price Comparison &amp; Reviews - Capterra UK 2026","@context":"https://schema.org","@id":"https://www.capterra.co.uk/directory/31062/vulnerability-management/software?page=4#itemlist","@type":"ItemList","itemListElement":[{"name":"Sysdig","position":1,"description":"In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights and open source Falco. We correlate signals across cloud workloads, identities, and services to uncover hidden attack paths and prioritize real risk. From prevention to defense, Sysdig helps enterprises focus on what matters: innovation.\n\nSysdig. Secure Every Second.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/989c840a-86f8-4d4f-8089-33f11cfea35e.png","url":"https://www.capterra.co.uk/software/153985/sysdig-cloud","@type":"ListItem"},{"name":"Appgate SDP","position":2,"description":"Appgate SDP, the industry’s most comprehensive universal ZTNA solution, is purpose-built on a direct-routed software-defined perimeter model. It can secure all user-to-resource and resource-to-resource connections across every enterprise use case including remote, on-premises, multi-cloud, cloud native, legacy applications and infrastructure, IoT and OT.\n\nAppgate helps organizations and government agencies worldwide start and accelerate their Zero Trust journey while planning for the future.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1fa2bf14-befc-42fe-969e-d95499f99853.png","url":"https://www.capterra.co.uk/software/219259/appgate","@type":"ListItem"},{"name":"DriveLock","position":3,"description":"DriveLock Vulnerability Management\nidentifies vulnerabilities on end devices, makes them visible and prevents potential malware attacks. It provides a comprehensive overview of your infrastructure, reveals your attack surface and enables you to manage and measure your cyber risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/92086413-9e57-4df9-91d3-639683a13f85.jpeg","url":"https://www.capterra.co.uk/software/219612/drivelock","@type":"ListItem"},{"name":"Bytesafe","position":4,"description":"Bytesafe allows enterprises to increase their software supply chain security posture with automated best practices - and a unified workflow for security and developer teams. The Dependency Firewall enables enterprises to enforce open source usage policies and avoid threats by effectively blocking open source vulnerabilities and non-compliant licenses.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/27c22bec-6e47-479d-9856-efd5d3be4fba.jpeg","url":"https://www.capterra.co.uk/software/1019115/bytesafe","@type":"ListItem"},{"name":"AppSec Education Platform","position":5,"description":"HackEDU acquired Security Journey in spring 2022 and today helps organizations reduce application security vulnerabilities. \n\nThe HackEDU Secure Coding Training Platform offers interactive, secure coding training to help software developers lower code vulnerability risk. HackEDU’s hands-on training covers over 115 topics in Python, Java, C/C++, Ruby, .NET, C#, PHP, and more.\n\nUnlike other offerings, our learning platform uses real tools, applications, and sandbox coding exercises to teach develo","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3e61eda4-2ac0-463b-9092-c252446d15ed.png","url":"https://www.capterra.co.uk/software/182584/hackedu-secure-development-training","@type":"ListItem"},{"name":"Reveelium","position":6,"description":"SaaS on-premise behavioural analysis engine to detect weak signals & anomalies in information systems using forensics & extensive research algorithms.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ba5344ce-17f5-48e8-8fa0-f36ee9b4d37a.png","url":"https://www.capterra.co.uk/software/183236/reveelium","@type":"ListItem"},{"name":"Enginsight","position":7,"description":"24/7 AUTOMATIC VULNERABILITY SCAN\nDetect and close vulnerabilities\nWhat specific vulnerabilities (CVEs) are there in my IT infrastructure? With Enginsight's vulnerability scanner, you can see the affected assets and patch them immediately. The severity rating helps with prioritization. This means you always have an overview of the security status of your IT.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8f4c9feb-2874-42ea-8d73-f275223c7f0c.png","url":"https://www.capterra.co.uk/software/183883/enginsight","@type":"ListItem"},{"name":"Jazz Platform","position":8,"description":"Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17843bcd-67c1-4f4c-a83c-ce0c5d84b94c.png","url":"https://www.capterra.co.uk/software/189135/jazz-platform","@type":"ListItem"},{"name":"Trellix MOVE AntiVirus","position":9,"description":"Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5700729d-4545-48f2-8e86-1d0644ee6233.jpeg","url":"https://www.capterra.co.uk/software/201981/Trellix-MOVE-AntiVirus","@type":"ListItem"},{"name":"Uptycs","position":10,"description":"The Uptycs unified CNAPP and XDR platform helps businesses looking to enhance their cybersecurity across cloud and on-prem environments. One solution provides you with asset inventory, audit, compliance, vulnerability scanning, and threat detection and response. Eliminate tool, team, and infrastructure silos to reduce response times to breaches and attacks. Uptycs helps you make better risk decisions about vulnerabilities and threats. Shift your cybersecurity up with Uptycs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/233d3187-84ec-4451-a902-6d711accffa8.png","url":"https://www.capterra.co.uk/software/202557/uptycs","@type":"ListItem"},{"name":"JFrog Xray","position":11,"description":"JFrogs Xray DevSecOps tool is a software composition analysis solution that scans your OSS dependencies for security vulnerabilities and license compliance violations. It uses deep recursive scanning techniques to scan repositories, build packages, and container images. Easily integrates across your software development pipeline and automates protection of your code and prevents unwanted security and license compliance risks entering your production software.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6d37a633-6ef6-4581-b3b0-16a522ce1526.png","url":"https://www.capterra.co.uk/software/1018276/jfrog-xray","@type":"ListItem"},{"name":"Machine Learning on AWS","position":12,"description":"With AWS machine learning (ML), you can make accurate predictions, gain deeper insights from your data, reduce operational overhead, and improve the customer experience. \n\nAWS helps you at every stage of your ML adoption journey with the most comprehensive set of artificial intelligence (AI) and ML services, infrastructure, and implementation resources. \n\nDownload our free eBook to see how other businesses like yours use AWS Machine Learning services.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae5bee60-2857-4188-b257-d2a0e1406f05.jpeg","url":"https://www.capterra.co.uk/software/1029661/machine-learning-on-aws","@type":"ListItem"},{"name":"Cyrisma","position":13,"description":"Cyrisma is a unified platform to identify, prioritize, and mitigate cyber risk.\n\nPlatform features include:\n\n- Vulnerability Management \n- Sensitive Data Discovery\n- Secure Configuration\n- Dark Web Monitoring\n- Risk Monetization\n- Risk Mitigation\n- Risk Assessment Reporting and Scorecards\n\nCyrismais easy to use & competitively priced, and makes cyber risk management simple and more effective.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8df3081a-083e-49b0-93ec-d2a1faf0b8e0.png","url":"https://www.capterra.co.uk/software/1036781/cyrisma","@type":"ListItem"},{"name":"Axonius","position":14,"description":"Vulnerability management starts with a credible, comprehensive asset inventory. Axonius identifies vulnerabilities and maps them to assets, providing context that helps prioritize their importance based on asset criticality.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/68039c5f-2ebb-48b8-a0c8-06706c50dcf7.png","url":"https://www.capterra.co.uk/software/178568/axonius-cybersecurity-asset-management-platform","@type":"ListItem"},{"name":"MisterScanner","position":15,"description":"Automated testing that sends you weekly security reports generated after testing the site.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/253fe9ec-b38e-4626-83a3-0a6b4e03e079.png","url":"https://www.capterra.co.uk/software/196439/abbey","@type":"ListItem"},{"name":"GuardRails","position":16,"description":"GuardRails provides the perfect customizable Vulnerability Management security solution for organizations that need a flexible approach to their internal process. With thousands of possible coding vulnerabilities, you can stay ahead of threats and weaknesses in your organizations software by tracking which ones matter the most and need the most prior attention!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1f625515-6e4f-4af3-8560-e94181abe258.png","url":"https://www.capterra.co.uk/software/199631/guardrails","@type":"ListItem"},{"name":"Holm Security VMP","position":17,"description":"Holm Security's Next-Gen Vulnerability Management Platform helps our customers to identify and remediate vulnerabilities in their IT environment. The platform provides complete coverage, and comprehensive insight in order to automatically detect vulnerabilities, assess risk and prioritize remediation for every asset in your organization, including humans.\n\nSecure your cyber security posture through complete asset coverage and unified vulnerability management, all in one platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a83f49aa-46d4-42b8-88ee-e5cb317604a6.png","url":"https://www.capterra.co.uk/software/209427/holm-security-vmp","@type":"ListItem"},{"name":"Microsoft Defender for Identity","position":18,"description":"Microsoft Defender for Identity helps protect the identity security landscape. Help Security Operations teams protect on-premises identities and correlate signals with Microsoft 365 using Microsoft Defender for Identity. With Microsoft Defender for Identity, you can be:\n-Proactive: Helps eliminate on-premises vulnerabilities to prevent attacks before they happen.\n-Efficient: Helps Security Operations teams use their time effectively by understanding the greatest threats.\n-Focused: Helps SecOps","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bb14a291-9099-4669-89a8-7efe917a7dce.png","url":"https://www.capterra.co.uk/software/219693/microsoft-defender-for-identity","@type":"ListItem"},{"name":"PingSafe","position":19,"description":"PingSafe is an industry-leading Cloud Security platform with a comprehensive knowledge of the attackers’ modus operandi. Analyze critical vulnerabilities on Cloud and seal them before the attackers get a sniff.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1abe1a03-1ede-4c35-b9da-74bf4cf8f1fd.png","url":"https://www.capterra.co.uk/software/1036019/pingsafe","@type":"ListItem"},{"name":"Xygeni Security","position":20,"description":"Xygeni Vulnerability Management provides continuous, AI-driven visibility across code, dependencies, CI/CD pipelines, infrastructure, and containers. It detects exploitable vulnerabilities, misconfigurations, and supply-chain risks early, before they impact production.\n\nAI-powered reachability, prioritization, and posture correlation eliminate alert fatigue and surface real business risk. Automated remediation through Auto-Fix and DevAI reduces mean time to remediation while maintaining delivery velocity.\n\nUnified within Xygeni ASPM, vulnerability data is correlated into a single risk view for governance, compliance, and executive reporting, delivering confidence and control in complex, AI-driven environments.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/89af94ed-f3da-45da-bf77-00bd8539d976.jpeg","url":"https://www.capterra.co.uk/software/1043740/xygeni","@type":"ListItem"},{"name":"Reporter","position":21,"description":"Security Reporter is an enterprise-grade pentest reporting software designed to streamline and standardize the penetration testing and security assessment reporting workflow. The platform supports security teams and pentesting providers in managing findings, producing professional reports, and delivering consistent results across complex environments.\nKey capabilities include a centralized content and vulnerability library, customizable report templates, multi-language reporting, and native imports from more than 140 security testing tools. These features support efficient vulnerability management, accurate reporting, and repeatable assessment processes.\nSecurity Reporter is offered exclusively as a self-hosted, on-premise solution, ensuring full control over sensitive security data and supporting common compliance and data governance requirements. By reducing manual reporting effort and minimizing errors, the platform improves productivity and shortens reporting cycles.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/39187ebb-10be-44d0-a23f-63de6870df60.png","url":"https://www.capterra.co.uk/software/1061461/reporter","@type":"ListItem"},{"name":"Security Manager by FireMon","position":22,"description":"FireMon is the #1 network security management solution for hybrid cloud. FireMon delivers continuous security for multi-cloud enterprise environments through a powerful fusion of vulnerability management, compliance and orchestration. Since creating the first-ever network security policy management solution, FireMon has continued to deliver real-time visibility into and control over complex network security infrastructures, policies and risk postures for nearly 1,700 customers around the world.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/dbe74db9-075d-43bf-a3b4-e19f99198c80.png","url":"https://www.capterra.co.uk/software/142894/security-manager","@type":"ListItem"},{"name":"Unified VRM","position":23,"description":"NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner-agnostic) and subsequently helps you remediate the threats that matter the most. \nUnified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence  including malware, exploit, patching and social media feeds to predict the true probability of attacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bb9a32f2-5602-4831-9bd5-bb589a1c9ee7.png","url":"https://www.capterra.co.uk/software/130575/unified-vrm","@type":"ListItem"},{"name":"UpGuard","position":24,"description":"UpGuard is a third-party risk and attack surface management platform that helps organizations secure sensitive data and monitor potential threats. The platform features AI-powered capabilities that analyze vendor evidence, map controls, identify risks, and generate assessment reports. UpGuard includes daily scanning and vendor monitoring functionality to detect risks early and streamline assessment processes. The system offers comprehensive risk assessments through automated scanning and security questionnaire analysis, providing organizations with a complete view of vendor risks. For attack surface management, UpGuard delivers continuous monitoring, scanning, and alert notifications. It also includes credential and data leak detection through dark web scanning and proprietary sources. UpGuard combines these features to give organizations clear visibility into their cyber risk landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2b043470-0d95-4c09-949e-89e5efbbe5cc.png","url":"https://www.capterra.co.uk/software/159010/upguard","@type":"ListItem"},{"name":"Sonatype Lifecycle","position":25,"description":"Sonatype's Nexus Platform scales open source security monitoring across the software supply chain and reclaims time spent fighting risks in the software development life cycle.\n\nSoftware developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/235422da-fc87-4523-bcc0-32eaad933197.jpeg","url":"https://www.capterra.co.uk/software/171030/nexus-lifecycle","@type":"ListItem"}],"numberOfItems":25}
</script>
