All categoriesLaunch brief →
Vulnerability Scanner
https://www.capterra.com/vulnerability-scanner-software/Niches in this category - the functional product types blended into "Vulnerability Scanner" (18)
Cybersecurity Posture & Vulnerability Management72Application Security Testing & DevSecOps Platform5SOAR & Security Incident Response Platform3Digital Risk Protection & External Attack Surface Management3Cyber Risk Quantification Platform2Asset & Equipment Tracking Software2Identity & Access Management (IAM/IGA)2Security Compliance Automation Platform2Software Composition Analysis & Open Source Security Platform1AML & Transaction Monitoring Software1Digital Accessibility & ADA Compliance Software1AI Code Generation & Developer Assistant1Agile & Software Development Collaboration Tool1Active Directory & Microsoft 365 Auditing Software1Cloud Access Security Broker (CASB) & SaaS Security Posture Management1Penetration Testing & Bug Bounty Platform1Integrated GRC Platform1Password Manager & Enterprise Credential Vault1
106 products3 pages scraped of 3107 in category2 sponsored0 shortlisted
| # | Product | Rating | Reviews | Rec | Ease / Svc / Feat / Value | Description |
|---|---|---|---|---|---|---|
| 1 | 4.7 | 6 | - | 4.8 / 5.0 / 4.2 / 5.0 | Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities fast. Learn more about Aikido Security | |
| 2 | 4.9 | 330 | 92% | 4.9 / 4.9 / 4.8 / 4.6 | The AI-Powered Accessibility Widget automatically finds/fixes web accessibility issues 24/7 for continuous ADA and WCAG compliance. Learn more about UserWay Accessibility Widget | |
| 3 | 4.7 | 93 | - | 4.6 / 4.3 / 4.6 / 4.5 | Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities. Learn more about Nessus | |
| 4 | 4.6 | 61 | - | 4.5 / 4.6 / 4.5 / 4.6 | Syxsense delivers comprehensive vulnerability scanning, including security configurations. Learn more about Syxsense | |
| 5 | 4.8 | 60 | - | 4.7 / 4.8 / 4.7 / 4.6 | Comprehensive, AI-driven cloud security platform for AWS, Azure, GCP, and others, that’s easy to use and brings value from day one. Learn more about Orca Security | |
| 6 | 4.9 | 51 | - | 4.7 / 4.9 / 4.8 / 4.8 | Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them. Learn more about Beagle Security | |
| 7 | 4.9 | 42 | - | 4.9 / 4.8 / 4.7 / 4.9 | The first Click&Play Cyber Security platform. CyLock finds out if your systems are hacker safe in one click! Learn more about CyLock EVA | |
| 8 | 4.6 | 36 | - | 4.5 / 4.4 / 4.5 / 4.5 | A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Learn more about ManageEngine Vulnerability Manager Plus | |
| 9 | 4.4 | 35 | - | 4.5 / 4.4 / 4.6 / 4.2 | Kiuwan | Code Scanning That’s Built for Developers and Trusted by Security Teams Learn more about Kiuwan | |
| 10 | 4.4 | 35 | - | 4.4 / 4.2 / 4.2 / 4.0 | Acunetix is web app and API security software that automates testing, finds vulnerabilities, and integrates into development. Learn more about Acunetix | |
| 11 | 4 | 33 | - | 4.0 / 4.0 / 4.2 / 3.9 | Monitors the vulnerability management process, tracks remediation and ensures policy compliance. Learn more about Qualys Cloud Platform | |
| 12 | 4.5 | 29 | - | 4.4 / 4.6 / 4.6 / 4.5 | SecPod Saner is a Continuous Vulnerability and Exposure Management Solution that is preventing cynical cyberattacks. Learn more about Saner CVEM | |
| 13 | 4.7 | 26 | - | 4.5 / 4.5 / 4.4 / 4.2 | Invicti, formerly Netsparker, is a DAST-first AppSec platform proving real risks, cutting noise, and securing everything at scale. Learn more about Invicti | |
| 14 | 4.6 | 24 | - | 4.5 / 4.8 / 4.4 / 4.5 | AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions. Learn more about AppTrana | |
| 15 | 4 | 23 | - | 4.0 / 3.9 / 4.0 / 3.9 | KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface. Learn more about KACE | |
| 16 | 4.9 | 22 | - | 4.8 / 4.9 / 4.8 / 5.0 | vRx is a consolidated Vulnerability Remediation platform. Start mitigating vulnerable threats, remotely & automatically. Learn more about vRx | |
| 17 | 5 | 21 | - | 4.9 / 4.9 / 4.8 / 5.0 | Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community. Learn more about Hackrate | |
| 18 | 4.8 | 20 | - | 5.0 / 4.7 / 4.7 / 4.9 | Our Active Directory Audit Tool is free and runs on Windows Server 2008 & later. The audit results are provided in a clickable report. Learn more about Specops Password Auditor | |
| 19 | 4.8 | 18 | - | 4.7 / 4.8 / 4.8 / 4.8 | Reduce the time required to manage critical changes and repetitive tasks across complex, multi-vendor networks. Learn more about SolarWinds Network Configuration Manager | |
| 20 | 5 | 16 | - | 4.9 / 5.0 / 5.0 / 4.9 | GlitchSecure is real-time continuous security testing platform that you helps identify and remediate software vulnerabilities. Learn more about GlitchSecure | |
| 21 | 4.9 | 16 | - | 4.7 / 5.0 / 4.8 / 4.9 | EcoTrust is a CAASM platform prioritizing critical business cyber risks, integrating AI for advanced security. Learn more about EcoTrust | |
| 22 | 4.8 | 16 | - | 4.9 / 4.5 / 4.6 / 4.6 | Superior protection with continuous threat hunting and monitoring via 24/7 managed detection & response service and 6-minute MTTR. Learn more about ESET PROTECT MDR | |
| 23 | 4.1 | 16 | - | 4.1 / 4.1 / 4.1 / 3.8 | Sigrid simplifies the vulnerability scanning process with its powerful platform that provides ongoing monitoring and detailed analysis Learn more about Sigrid | |
| 24 | 4.4 | 14 | - | 4.4 / 4.3 / 4.4 / 4.1 | Security management platform offering fully integrated security controls for threat detection and compliance management. Learn more about USM Anywhere | |
| 25 | 4.8 | 13 | - | 4.9 / 5.0 / 4.5 / 4.9 | Hexiosec ASM scans the Internet to discover your online infrastructure, assets and shadow IT. Learn more about Hexiosec ASM |
