πŸ“‚ Subcategories

πŸ”§ Tools in Vulnerability Management

RunZero

See everything. Unconditionally.

A network discovery and asset inventory platform that provides a complete and detailed view of your entire network.

For more tool information ➜

Bishop Fox Cosmos

Continuous Penetration Testing Platform.

A managed service combining attack surface management technology with expert-driven continuous penetration testing.

For more tool information ➜

Burp Suite

The leading toolkit for web security testing.

An integrated platform for performing security testing of web applications.

For more tool information ➜

Intruder

Find your weaknesses, before the hackers do.

A cloud-based vulnerability scanner that helps you find and fix security weaknesses in your external infrastructure.

For more tool information ➜

Nmap

The Network Mapper

A free and open-source utility for network discovery and security auditing.

For more tool information ➜

Wiz

The Cloud Security Platform

A cloud security platform that provides visibility and risk assessment across your entire cloud environment.

For more tool information ➜

Intruder

Effortless vulnerability scanning.

A cloud-based vulnerability scanner that finds cybersecurity weaknesses in your external infrastructure.

For more tool information ➜

Edgescan

Continuous Vulnerability Intelligence.

A managed vulnerability assessment and penetration testing solution combining smart technology with human intelligence.

For more tool information ➜

Aikido Security

All-in-one AppSec. For developers.

A developer-friendly platform that combines multiple security scanners to find and prioritize vulnerabilities.

For more tool information ➜

Nozomi Networks

The Leader in OT and IoT Security.

An OT and IoT security platform that provides asset discovery, vulnerability management, and threat detection for industrial control systems.

For more tool information ➜

Dragos

Safeguarding Civilization.

An industrial cybersecurity platform that provides asset visibility, threat detection, and response for industrial control systems.

For more tool information ➜

NinjaOne

The Unified IT Operations Platform.

A unified IT operations platform that provides endpoint management, remote monitoring and management (RMM), and IT asset management.

For more tool information ➜

Intruder

Continuous vulnerability scanning for your external infrastructure.

An online vulnerability scanner that finds cybersecurity weaknesses in your external attack surface, so you can fix them before a breach happens.

For more tool information ➜

Nucleus Security

Unified Vulnerability Management

A centralized platform for vulnerability management, aggregation, and orchestration.

For more tool information ➜

Intruder

Find your weaknesses, before the hackers do.

A proactive vulnerability scanner that finds cybersecurity weaknesses in your digital infrastructure.

For more tool information ➜

Brinqa

The Cyber Risk Management Platform

A comprehensive platform for managing cyber risk across all security programs.

For more tool information ➜

Wiz

The Cloud Security Platform

A cloud security platform that provides full-stack visibility and risk assessment for your cloud environment.

For more tool information ➜

Picus Security

The Pioneer of Breach and Attack Simulation.

A Security Validation and Exposure Management platform that helps organizations assess, prioritize, and address cyber risks.

For more tool information ➜

Trivy

A simple and comprehensive vulnerability scanner for containers and other artifacts.

An open-source vulnerability scanner for container images, filesystems, and Git repositories.

For more tool information ➜

CrowdStrike Falcon Exposure Management

See everything. Stop breaches.

A solution that provides a unified view of your organization's exposure to threats, helping you prioritize and remediate risks.

For more tool information ➜

Nucleus Security

The Unified Vulnerability Management Platform

A vulnerability management platform that unifies and automates the entire vulnerability lifecycle.

For more tool information ➜

Armis

The Asset Intelligence and Security Platform

An agentless device security platform that discovers and secures all types of assets in your environment.

For more tool information ➜

Wiz

The Cloud Security Platform.

An agentless platform that provides full-stack visibility and context to find, prioritize, and fix risks in the cloud.

For more tool information ➜

CrowdStrike Falcon Spotlight

Scan-free vulnerability management.

An endpoint-native vulnerability management solution that provides real-time visibility without active scanning.

For more tool information ➜

Nucleus Security

The Unified Vulnerability Management Platform.

A centralized platform to aggregate, prioritize, and manage vulnerabilities from all scanning tools.

For more tool information ➜

Orca Security

Agentless Cloud Security.

An agentless CNAPP that provides 100% coverage of cloud risks without any runtime overhead.

For more tool information ➜

Armis

The Asset Intelligence and Security Company.

An agentless device security platform that discovers, monitors, and protects all managed, unmanaged, and IoT devices.

For more tool information ➜

Axonius

The Cybersecurity Asset Management Platform.

A cybersecurity asset management platform that provides a comprehensive inventory of all assets, uncovers security gaps, and automates policy enforcement.

For more tool information ➜

CrowdStrike Falcon Discover

IT hygiene for the entire enterprise.

Provides real-time visibility into the devices, users, and applications in your network to identify and eliminate malicious or noncompliant activity.

For more tool information ➜

JupiterOne

The Cyber Asset Attack Surface Management (CAASM) Platform.

A CAASM platform that provides a unified view of your cyber assets and their relationships, enabling you to manage your attack surface and reduce risk.

For more tool information ➜

Claroty

Secure All Cyber-Physical Systems.

A cyber-physical systems (CPS) security platform that provides visibility, protection, and monitoring for OT, IoT, and IoMT environments.

For more tool information ➜

CyCognito

The External Attack Surface Management Platform.

An external attack surface management platform that helps you discover, test, and protect your entire external attack surface.

For more tool information ➜

CrowdStrike Falcon Surface

See what the adversary sees.

An EASM solution that provides continuous, real-time visibility into an organization's known and unknown exposed assets.

For more tool information ➜

CyCognito

Solve your exposure management challenges.

An external attack surface and exposure management platform that maps, tests, and prioritizes risks across the entire organization.

For more tool information ➜

ImmuniWeb Discovery

Attack Surface Management and Dark Web Monitoring.

An AI-driven platform for external attack surface management, dark web monitoring, and phishing detection.

For more tool information ➜

Wiz

The Cloud Security Platform.

An agentless cloud security platform that provides full-stack visibility and identifies critical risks in the cloud.

For more tool information ➜

Orca Security

Agentless-First Cloud Security. That Just Works.

An agentless CNAPP that provides full-stack visibility into cloud risks without the overhead of agents.

For more tool information ➜

CrowdStrike Falcon Horizon

Cloud Security Posture Management

A CSPM solution that detects and prevents cloud misconfigurations, control plane threats, and ensures compliance.

For more tool information ➜

JupiterOne

The Cyber Asset Attack Surface Management (CAASM) Platform

A platform that creates a graph-based model of all cyber assets to manage attack surfaces and compliance.

For more tool information ➜

OWASP ZAP

The world's most widely used web app scanner.

An open-source web application security scanner.

For more tool information ➜

Snyk

Developer security that works.

A developer-first security platform that helps you find and fix vulnerabilities in your code, open source dependencies, containers, and IaC.

For more tool information ➜

Microsoft Defender Vulnerability Management

Discover, prioritize, and remediate vulnerabilities and misconfigurations in one place.

A built-in capability of Microsoft Defender for Endpoint that provides vulnerability management for your devices.

For more tool information ➜

XM Cyber

The Exposure Management Company

An exposure management platform that helps you understand and remediate your security risks from an attacker's perspective.

For more tool information ➜

Cisco Vulnerability Management (formerly Kenna Security)

Prioritize what matters. Remediate faster.

A risk-based vulnerability management platform that uses data science to prioritize vulnerabilities.

For more tool information ➜

Vulcan Cyber

The Cyber Risk Management Platform.

An exposure management platform that helps correlate assets, prioritize risks, and orchestrate remediation.

For more tool information ➜

Microsoft Defender Vulnerability Management

Discover, prioritize, and remediate vulnerabilities in real time.

Provides continuous vulnerability discovery, risk-based prioritization, and built-in remediation tools.

For more tool information ➜

Armis

The Asset Intelligence and Security Company.

An agentless platform that discovers and secures all types of assets, including IT, IoT, OT, and medical devices.

For more tool information ➜

Snyk

Developer security.

A platform that helps developers find and fix vulnerabilities in code, open source, containers, and IaC.

For more tool information ➜

Lacework

Data-driven cloud security.

A CNAPP that uses anomaly detection to identify threats across cloud workloads, accounts, and containers.

For more tool information ➜

Balbix

The AI-Powered Cyber Posture Automation Platform.

Uses AI to automate asset discovery, vulnerability management, and cyber risk quantification.

For more tool information ➜

Microsoft Defender for Endpoint

Comprehensive endpoint protection for a secure, productive hybrid work experience.

An enterprise endpoint security platform that helps organizations prevent, detect, investigate, and respond to advanced threats.

For more tool information ➜

Lansweeper

The IT Asset Management Platform.

An IT asset management platform that discovers and inventories all of your IT assets, providing a single source of truth for your entire IT environment.

For more tool information ➜

Device42

The Hybrid Cloud Discovery and Dependency Mapping Platform.

A comprehensive IT asset management and dependency mapping platform that provides a single source of truth for your entire IT ecosystem.

For more tool information ➜

Invicti

The Application Security Company.

An application security testing platform that helps you secure your web applications, APIs, and microservices.

For more tool information ➜

Mandiant Attack Surface Management

Gain an attacker's view of your exposures.

Part of the Mandiant Advantage platform, it provides visibility into external assets and vulnerabilities, backed by Mandiant's threat intelligence.

For more tool information ➜

IBM Security Randori

Think like an attacker.

A cloud-native attack surface management platform that helps businesses discover and prioritize their most critical external risks.

For more tool information ➜

Detectify

Application security testing reimagined.

A cloud-based attack surface management tool that leverages insights from elite ethical hackers for automated vulnerability scanning.

For more tool information ➜

HackerOne Assets

Discover, inventory, and secure your entire attack surface.

An attack surface management solution that helps organizations map their digital footprint and prioritize security testing.

For more tool information ➜

SecurityScorecard

The global leader in cybersecurity ratings.

A security ratings platform that provides continuous monitoring and assessment of an organization's and its vendors' cybersecurity posture.

For more tool information ➜

Bitsight

AI-powered intelligence that outsmarts cyber risk.

A cyber risk intelligence platform that provides security ratings, external attack surface management, and third-party risk management.

For more tool information ➜

Red Hat Ansible Automation Platform

A flexible, scalable, and comprehensive enterprise automation platform.

An enterprise automation platform that can be used for configuration management, application deployment, and security automation.

For more tool information ➜

Cisco Vulnerability Management (formerly Kenna Security)

Risk-Based Vulnerability Management

A risk-based vulnerability management platform that helps you prioritize and remediate the vulnerabilities that matter most.

For more tool information ➜

Syxsense

Unified Security and Endpoint Management

A cloud-based platform that combines endpoint management and security in a single solution.

For more tool information ➜

Cymulate

Move beyond theory to continuously ingest data, correlate relevant context, validate and prioritize defense optimization based on real-world threat context.

A SaaS-based Extended Security Posture Management (XSPM) platform that helps manage exposure to cyber threats.

For more tool information ➜

ManageEngine Vulnerability Manager Plus

Threat and vulnerability management software

An end-to-end vulnerability management solution that provides visibility, assessment, and remediation.

For more tool information ➜

AttackIQ

Validate your cybersecurity readiness.

A leading provider of Breach and Attack Simulation (BAS) solutions for continuous security validation.

For more tool information ➜

SafeBreach

Test Control Efficacy with the Best in BAS.

A pioneer in breach and attack simulation (BAS) that provides a platform to test defenses before attackers can exploit them.

For more tool information ➜

Tenable Nessus

The #1 Vulnerability Assessment Solution

A widely-used vulnerability scanner for identifying security vulnerabilities, misconfigurations, and malware on a variety of network devices.

For more tool information ➜

Rapid7 InsightVM

Vulnerability Management That Works for You

A vulnerability management solution that provides visibility into risk, prioritizes vulnerabilities, and automates remediation.

For more tool information ➜

Invicti

Application Security for Every Organization

A web application security platform that helps organizations secure their entire web presence.

For more tool information ➜

Sysdig Secure

Cloud security, powered by runtime insights.

A cloud-native security platform that provides threat detection, vulnerability management, and compliance for containers, Kubernetes, and cloud.

For more tool information ➜

Tenable.io

The Cyber Exposure Management Platform

Provides visibility across the modern attack surface and insights to prioritize and remediate vulnerabilities.

For more tool information ➜

Rapid7 InsightVM

Clarity and confidence to manage vulnerability risk.

A risk-based vulnerability management solution that provides visibility, prioritized guidance, and automation.

For more tool information ➜

Brinqa

The Cyber Risk Management Platform.

A platform for building a knowledge graph of all security and business data to manage cyber risk.

For more tool information ➜

Palo Alto Networks Prisma Cloud

The industry’s most complete Cloud-Native Application Protection Platform (CNAPP).

A comprehensive CNAPP that provides security and compliance coverage from code to cloud.

For more tool information ➜

Veracode

Secure the apps that power your world.

A unified platform that provides comprehensive, automated application security from development to production.

For more tool information ➜

Ivanti Neurons for RBVM (RiskSense)

Risk-Based Vulnerability Management.

A risk-based vulnerability management solution that prioritizes threats and automates remediation.

For more tool information ➜

Tenable.io Asset Inventory

See every asset, everywhere. In the cloud and on-premises.

Provides comprehensive asset visibility across your entire attack surface, including cloud, on-premises, and OT environments.

For more tool information ➜

Rapid7 InsightVM

Vulnerability management that works. From discovery to remediation.

A vulnerability management solution that provides discovery, assessment, prioritization, and remediation of vulnerabilities.

For more tool information ➜

Palo Alto Networks Cortex Xpanse

Know Your Attack Surface. Own It.

An attack surface management solution that discovers, evaluates, and mitigates risks across your entire internet-facing footprint.

For more tool information ➜

SysAid

The AI-powered IT service management platform.

An AI-powered IT service management (ITSM) platform that helps you automate your IT and deliver better service.

For more tool information ➜

Palo Alto Networks Cortex Xpanse

Active Attack Surface Management for the Modern Enterprise.

Provides a complete and accurate view of your global internet-facing assets to discover, evaluate, and mitigate your attack surface.

For more tool information ➜

Rapid7 InsightVM

Vulnerability Management and Risk Assessment.

A vulnerability management solution that includes features for discovering and assessing assets across the entire attack surface.

For more tool information ➜

Bugcrowd Attack Surface Management

Find, monitor, and secure digital assets before attackers strike.

An EASM solution that combines automated scanning with insights from a global community of ethical hackers.

For more tool information ➜

UpGuard

The #1 Cyber Risk Posture Management Software Platform.

A platform that unifies attack surface management, vendor risk management, and security ratings.

For more tool information ➜

Tenable.sc

On-Prem Vulnerability Management. Redefined.

On-premises vulnerability management platform for comprehensive visibility and measurement of cyber risk.

For more tool information ➜

Rapid7 InsightVM

Clarity and Action to Reduce Risk

A vulnerability risk management solution that provides visibility, prioritized risk scoring, and remediation workflows.

For more tool information ➜

Palo Alto Networks Prisma Cloud

The industry’s most complete cloud-native application protection platform.

A comprehensive CNAPP that provides security and compliance coverage from code to cloud.

For more tool information ➜

Tenable.io

The Cyber Exposure Company

Provides comprehensive vulnerability data and insights to help you understand and reduce your cyber risk.

For more tool information ➜

Qualys VMDR

Vulnerability Management, Detection and Response

A cloud-based platform that provides continuous vulnerability management, detection, and response across the hybrid IT environment.

For more tool information ➜

OpenVAS

The Open Source Vulnerability Scanner

A powerful open-source vulnerability scanner that provides a comprehensive set of network vulnerability tests.

For more tool information ➜

Qualys VMDR

Vulnerability Management, Detection and Response.

A cloud-native solution that unifies discovery, assessment, detection, and response in a single workflow.

For more tool information ➜

Qualys Asset Inventory

A complete, continuously updated inventory of all your IT assets, wherever they reside.

Provides a single source of truth for all IT assets across on-premises, cloud, and remote environments.

For more tool information ➜

ServiceNow IT Asset Management

Automate the full lifecycle of your IT assets.

An IT asset management solution that helps organizations manage the entire lifecycle of their hardware, software, and cloud assets.

For more tool information ➜

Forescout

Automated Cybersecurity for the Enterprise of Things.

A cybersecurity platform that provides continuous discovery, assessment, and control of all connected devices across the enterprise.

For more tool information ➜

ManageEngine AssetExplorer

Complete IT asset management software.

A web-based IT asset management software that helps you monitor and manage all of your IT assets from a single place.

For more tool information ➜

SolarWinds Hybrid Cloud Observability

Full-stack observability for hybrid IT.

A full-stack observability solution that provides visibility into the performance of your applications, infrastructure, and networks, across on-premises and cloud environments.

For more tool information ➜

Tenable.asm

See your external attack surface from the attacker's perspective.

An external attack surface management solution that provides continuous visibility and assessment of internet-facing assets.

For more tool information ➜

Qualys VMDR

Vulnerability Management, Detection and Response

A cloud-based app that provides a unified solution for asset discovery, vulnerability assessment, and remediation.

For more tool information ➜

Check Point CloudGuard

Comprehensive Prevention-First Cloud Security

A unified cloud native security platform for automated posture management, threat prevention, and workload protection.

For more tool information ➜

Progress Chef

Automate. Innovate. Accelerate.

An automation platform for building, deploying, and managing infrastructure and applications, with a strong focus on compliance.

For more tool information ➜

Microsoft Defender for Cloud

Protect multicloud and hybrid environments with integrated security from code to cloud.

A unified cloud-native application protection platform (CNAPP) for Azure, AWS, and Google Cloud.

For more tool information ➜

Qualys VMDR

Vulnerability Management, Detection and Response

A comprehensive solution that combines vulnerability management, detection, and response in a single platform.

For more tool information ➜

Rapid7 InsightVM

Vulnerability Management and Endpoint Analytics

A vulnerability management solution that provides visibility into risk across your entire environment.

For more tool information ➜

Mandiant Advantage Security Validation

Test your security effectiveness with intel-led validation.

A SaaS platform from Google Cloud that combines Mandiant's threat intelligence and expertise with automated security validation.

For more tool information ➜

Acunetix

The Web Application Security Scanner You Can Rely On

An automated web application security testing tool that helps you find and fix vulnerabilities in your websites, web applications, and APIs.

For more tool information ➜

Skybox Security

The Leader in Security Posture Management

A security posture management platform that provides visibility and context across your entire hybrid environment.

For more tool information ➜

Checkmarx One

The unified AppSec platform.

An application security platform that provides SAST, SCA, IaC, and API security in a single solution.

For more tool information ➜

Qualys CyberSecurity Asset Management

See your entire attack surface, continuously maintain your CMDB, and track EOL/EOS software.

A solution that combines internal and external asset discovery to provide a unified inventory and security posture assessment.

For more tool information ➜

Puppet Enterprise

The standard for infrastructure automation and delivery.

An infrastructure automation tool for configuration management, compliance enforcement, and continuous delivery.

For more tool information ➜

Anchore

Secure Your Software Supply Chain

A software supply chain security platform that helps you secure your containerized applications.

For more tool information ➜

Microsoft Defender External Attack Surface Management

Gain visibility into your external attack surface.

Defines an organization's unique internet-exposed attack surface and discovers unknown resources to proactively manage security posture.

For more tool information ➜

Clair

Vulnerability Static Analysis for Containers

An open-source project for the static analysis of vulnerabilities in application containers.

For more tool information ➜

CIS-CAT Pro Assessor

Automated Configuration Assessment Tool

The official tool from the Center for Internet Security (CIS) for assessing system configurations against CIS Benchmarks.

For more tool information ➜

OpenSCAP

NIST Certified SCAP 1.2 Toolkit

An open-source framework for implementing and enforcing the Security Content Automation Protocol (SCAP).

For more tool information ➜