33 results
Why Capterra is free
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Learn more about ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive security features including vulnerability assessment, automated patch management, security configuration management, high-risk software audit, antivirus audit, and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Learn more about Nessus

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus endpoint security all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Learn more about Syxsense

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Learn more about Acunetix

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Helps businesses continuously identify the security posture of applications through automated security scans and manual Pen-Testing.
AppTrana is a fully managed Web application firewall, that includes Web application scanning for getting visibility of application-layer vulnerabilities; instant and managed Risk-based protection with its WAF, Managed DDOS and Bot Mitigation service, and Web site acceleration with a bundled CDN or can integrate with existing CDN. All of this backed with a 24x7 Managed Security Expert service to provide custom rules and policy updates with zero false positive guarantee and promise. Learn more about AppTrana

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Learn more about Qualys Cloud Platform

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Netsparker Enterprise is a comprehensive automated web vulnerability scanning solution.
Netsparker (by Invicti) is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Netsparker allows organizations with complicated environments to automate their web security with confidence. With Netsparker, security teams can: - Automate security tasks and save hundreds of ho Learn more about Netsparker

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Got more than 100 cloud assets? Orca Security provides workload-deep security and compliance for AWS, Azure, and GCP without the gaps in coverage, alert fatigue, and operational costs of agents. With Orca, there are no overlooked assets, no DevOps headaches, and no performance hits on live environments. It detects vulnerabilities, malware, misconfigurations, lateral movement risk, weak and leaked passwords, and high-risk data such as PII, then prioritizes risk based on environmental context. Learn more about Orca Security

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Learn more about USM Anywhere

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.
Probely helps security engineers and software developers automate security testing with a web app security scanner. Increase the speed of software delivery by seamlessly integrate security testing into your development cycle. We make security engineers do less of the tedious work to allow them to focus on critical threats. We make software developers more independent by having step-by-step instructions on where and how to fix each vulnerability according to the programming language. Learn more about Probely

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero security known vulnerabilities
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnerability management features, Cyber Chief will help your software team secure their applications and infrastructure, even if there is zero application security qualifications or experience on your team. Cyber Chief is cloud-based and has military-grade security controls so that your security secret Learn more about Cyber Chief

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
United Kingdom Local product
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
If you want to assess your online assets' vulnerabilities, Security for Everyone is the tool for you whether you are a tech expert or a digital asset owner who does not have any coding experience. You can have: 1-Automated vulnerability assessment, 2- API integration, 3- Manual scanning options. Whichever opiton you choose, your vulnerabilities will be shown with video and pdf outputs. You can either send them to an expert or use them yourself to make your fixing process easier. Learn more about Security for Everyone

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
HackerOne is the industry standard for hacker-powered security.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. Learn more about HackerOne

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Expose exploits automatically with Red Sentry’s cloud and external penetration testing, vulnerability scanning, and asset monitoring.
Annual penetration tests are expensive and time-consuming, and they don’t help with vulnerabilities that pop up a week after the pentest is complete. Red Sentry is better – it’s an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable. You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Learn more about Red Sentry

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
United Kingdom Local product
Intruder is a proactive vulnerability scanner that finds weaknesses in your exposed systems and helps with their remediation.
Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems. It saves you time by proactively scanning for new threats as well as offering a unique threat prioritisation solution. Our vulnerability scanner uses the same underlying engine as the big banks do, so you can enjoy the same level of security, but with none of the complexity. Intruder also integrates with AWS, Google Cloud Platform and Microsoft Azure cloud providers. Learn more about Intruder

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Hybrid approach to vulnerability scanning with accurate security assessment results.
Hybrid approach to vulnerability scanning with accurate security assessment results.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with Learn more about Detectify

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Simplify the management of your vulnerabilities Monitor all of your vulnerabilities, from their detection to their correction.
Cyberwatch Vulnerability Manager provides you with a global and continuous overview of your vulnerabilities Cyberwatch makes an inventory of your technologies, detects the vulnerabilities of your servers, workstations, network equipment, containers, and reviews them based on your business requirements. Cyberwatch allows you to gain visibility and prioritize risks, to build a simple and motivating action plan for your team, and to deploy the adapted security fixes for your vulnerabilities. Learn more about Cyberwatch Vulnerability Manager

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Strobes is a Risk-centric Vulnerability Management Platform with 45+ open-source vulnerability assessment scanners!
Strobes a risk centric and ML based Vulnerability Management Platform. It is empowered with machine learning to analyze and deduplicate the vulnerabilities, thus reducing the number by manifolds. All the deduplicated vulnerabilities are scored using our unique Scoring Engine. Eight comprehensive scoring parameters such as Exploit Availability, Vulnerability Age, Patch Availability, etc. are leveraged to produce the final score. Learn more about Strobes

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Easy-to-use SaaS network, website and code vulnerability scanner for small and medium enterprises
Vulkyrie believes that basic vulnerability discovery should be free. Importantly, solutions should be easy-to-use for small and medium enterprises who may not have the resources and expertise of large companies. Our Free Plan offers a cloud-based solution for unlimited network and website vulnerability scanning. With our Pro Plan, you get a static code analyzer for scanning your software code. Learn more about Vulkyrie

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale.
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more.
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
The industry’s ONLY vulnerability management solution for storage & backup systems, helping you protect your most valuable data.
Ransomware gangs are now targeting storage & backup systems. StorageGuard is the industry’s ONLY vulnerability management solution for storage & backup systems, helping organizations protect their most valuable data - and ensure recoverability. StorageGuard helps you automatically detect, prioritize and remediate vulnerabilities and security misconfigurations - for your enterprise storage & backup systems. Learn more about StorageGuard

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Attack surface management solution that automatically scans services, IPS, domains, networks and more for ransomware and other attacks.
Attack surface management solution that automatically scans services, IPS, domains, networks, and more for ransomware and other attacks.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Trend Micro Cloud One™: automated, flexible, all-in-one security on AWS. Try it yourself with a free, 30-day trial.
1 platform. 7 security services. Trend Micro Cloud One™ has cloud builders on AWS covered with security services for all your needs—from file storage security to open source security, and everything in between. Turn-key integrations into your CI/CD pipelines, customizable APIs, and automated deployment, enable you to go further. Try it yourself with a free, 30-day trial. Learn more about Trend Micro Cloud One

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning.
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Allows companies to monitor and fix vulnerabilities within their network.
Allows companies to monitor and fix vulnerabilities within their network.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.​ It is operating under the NIST Cybersecurity Framework. CODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment. Learn more about CODA Footprint

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities.
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities and enhance the security and compliance of applications across AWS.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
United Kingdom Local product
Uleska

Uleska

(0) United Kingdom Local product
Uleska helps security and dev teams manage application security at scale by automating and orchestrating their preferred security tools
Uleska helps security and development teams manage application security at scale by automating and orchestrating their preferred security tools within CI/CD. With Uleska, teams can confidently start an AppSec program using open-source, commercial, and custom tools and then quickly change, add or scale tools as the technology and business needs evolve. Uleska also brings speed and scale when integrating into development tools, and reporting of metrics and risk. Learn more about Uleska

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Trava integrates vulnerability risk assessment tools, risk mitigation services, and cyber insurance into one comprehensive platform.
Trava was founded with the important mission to protect small and medium-sized businesses from the potential damage of cyber threats. By integrating vulnerability risk assessment (understanding risk), risk mitigation services, and cyber insurance (transferring risk) into one convenient and comprehensive cyber risk management platform, Trava enables business owners and IT professionals to operate secure, productive businesses without fear of interruption or loss caused by cyber incidents. Learn more about Trava

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database.
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database.

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API