Recommended solutions for
What is Vulnerability Management?
Vulnerability management is the perpetual loop of discovering, prioritizing, and fixing security weaknesses before attackers weaponize them. Accurate asset inventories and risk-based patching keep this treadmill both manageable and impactful.
Ask a Cybernaut
Get a 15‑min session to find out which cybersecurity tools are best for your stack.
Speak with an advisor10 results
Sorted by
Cisco Vulnerability Management
Cisco Vulnerability Management identifies and prioritizes security risks across networks and endpoints. It integrates with Cisco security products to provide continuous visibility and automated remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution
API access
Darktrace
Darktrace uses machine learning to detect and respond to cyber threats by analyzing network behavior. It continuously monitors for unusual activity to identify potential vulnerabilities and emerging risks in real time.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution
IBM Security
IBM Security provides tools to identify, assess, and prioritize vulnerabilities across IT environments. It integrates with existing workflows to support continuous monitoring and remediation efforts.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Point solution
Platform solution
InsightVM
InsightVM provides real-time visibility into network vulnerabilities and risk exposure. It integrates with existing IT infrastructure to prioritize remediation based on threat context and asset criticality.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution
API access
Nessus
Nessus identifies security vulnerabilities, misconfigurations, and compliance issues across various systems and devices. It supports customizable scanning templates and integrates with multiple platforms for streamlined vulnerability assessment.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Point solution
API access

OpenVAS
OpenVAS is a tool for identifying security vulnerabilities in networked systems. It includes a regularly updated feed of Network Vulnerability Tests (NVTs) to detect potential security issues.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Open-source or third-party tools
Qualys Vulnerability Management
Qualys Vulnerability Management identifies and assesses security weaknesses across IT assets. It integrates with cloud and on-premises environments to provide detailed vulnerability reports and prioritization based on risk.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution
API access
Tanium XEM Core
Tanium XEM Core provides real-time visibility and control over endpoint vulnerabilities across an enterprise network. It integrates asset discovery with risk prioritization to support efficient remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution
Tenable.io
Tenable.io provides asset discovery, vulnerability assessment, and risk prioritization across IT environments. It integrates with cloud platforms and container technologies to support visibility and management of diverse infrastructure components.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution
API access
Tripwire IP360
Tripwire IP360 identifies and assesses security vulnerabilities across networked assets. It provides detailed risk scoring and supports integration with other security tools for streamlined remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Platform solution