Best Risk-Based Vulnerability Management Software

Products Buyer's Guide
8.8
Kenna Security
★★★★★

Kenna Security

Kenna.VM, the company's flagship risk-based vulnerability management (RBVM) solution, gives organizations full-stack visibility and shows security and IT teams which infrastructure vulnerabilities they should remediate, when, and why. Kenna Security's powerful RBVM portfolio also includes Kenna.AppSec—an application security tool designed to accurately assess, track, and prioritize app vulnerabilities by risk—and Kenna.VI, a comprehensive, ...

Kenna does many things well but didn't suit our needs - Tim W.

Ease of use
8.6
Support
8.7
Ease of Setup
8.6

Languages supported: English

8.2
ServiceNow Security Operations
★★★★★

ServiceNow Security Operations

ServiceNow Security Operations is an Enterprise Security Response engine offering security incident response, vulnerability response, configuration compliance, and threat intelligence. It's built on the intelligent workflows, automation, orchestration, and deep connection with IT of the ServiceNow platform.

Very powerful tool - Oussama R.

Ease of use
6.1
Support
8.5
Ease of Setup
0.0
8.6
Tenable.io
★★★★★

Tenable.io

Tenable.io is the only cybersecurity company that empowers customers to gain control of their risk by knowing and prioritizing vulnerabilities across their entire attack surface including traditional, cloud, mobile and DevOps environments.

Tenable is easy to run with a clean interface. A bit of setup is required at the beginning. - Michael N.

Ease of use
8.6
Support
8.5
Ease of Setup
9.0

Languages supported: English

8.8
InsightVM (Nexpose)
★★★★★

InsightVM (Nexpose)

Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development to streamline and automate remediation efforts.

InsightVM (Nexpose) Review - Lem R.

Ease of use
8.8
Support
8.7
Ease of Setup
0.0
9.2
Brinqa
★★★★★

Brinqa

Brinqa empowers customers to own their cyber risk with a unique, knowledge-driven approach to cybersecurity challenges. Brinqa Cyber Risk Graph - the knowledge graph for cybersecurity - connects all relevant security and business data, establishes a common risk language, and powers cybersecurity insights and outcomes. Brinqa Cyber Risk Services apply this knowledge to uniquely inform risk management strategies, standardize security data ...

Good cybersecuerity - Joren V.

Ease of use
Support
Ease of Setup

Languages supported: English

9.6
Nucleus
★★★★★

Nucleus

Nucleus aggregates all vulnerability scans and information in the enterprise, automates vulnerability management workflows, and provides the business intelligence to track performance of the organization's vulnerability management program and holistically monitor enterprise risk.

Best Vulnerability management platform - Amber S.

Ease of use
Support
Ease of Setup

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

10.0
Digital Defense Frontline.Cloud
★★★★★

Digital Defense Frontline.Cloud

Frontline.Cloud is the original Software as a Service (SaaS) securityplatform. Built for the cloud from the very start, Frontline.Cloudworks seamlessly and deploys easily for organizations of all sizes,and offers a variety of options all within one convenient platform:- Frontline VM™ – Vulnerability Management- Frontline WAS™ – Web Application Scanning- Frontline ATS™ – Active Threat Sweep- Frontline Pen Test™ – Online Reporting and Ethical ...

DDF is a great asset to protecting against vulnerabilities - Administrator in Media Production

Ease of use
Support
Ease of Setup
8.8
Resolver
★★★★★

Resolver

All implementations include training and advice on the most effective way to manage your processes within the application.

One stop shop for Security Command & Control - Mike F.

Ease of use
8.2
Support
9.0
Ease of Setup
7.9

Languages supported: English

Platforms: Mac, Win, Linux

Price: $$$$$

Business Size: 1

9.0
Qualys VMDR
★★★★★

Qualys VMDR

Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.

Easy of vulnerability detection and Report generation - Administrator in Online Media

Ease of use
Support
Ease of Setup
9.0
ESOF
★★★★★

ESOF

Prioritize remediation based on AI algorithm calculated cyber score, and get continuous reports on your security posture and security team performance.

Vulnerability Management Suit (VulMan) - Administrator in Investment Banking

Ease of use
Support
Ease of Setup
7.0
Argos™ Threat Intelligence Platform
★★★★★

Argos™ Threat Intelligence Platform

Gathering targeted and actionable intelligence, Argos pools both technological and human resources to generate real-time incidents of targeted attacks, data leakage and stolen credentials compromising your organization.

Useful and protects the brand - User in Computer & Network Security

Ease of use
Support
Ease of Setup
10.0
Tripwire IP360
★★★★★

Tripwire IP360

Tripwire provides an enterprise-class vulnerability management solution that accurately prioritizes risk so you can take action on your most exposed assets.

Effective shield against external threats from the web - Wallys G.

Ease of use
Support
Ease of Setup
0.0
Vicarius
★★★★★

Vicarius

Efficiently reduce organizational security risk With hundreds of new software and OS vulnerabilities detected each month, reducing organizational security risk can become overwhelming. TOPIA's vulnerability management toolbox provides a smart prioritization and fast remediation with or without a security patch. All-in-one vulnerability management - analyze, prioritize, and remediate cyber threats before they're exploited.

Customer Satisfaction Eminent - David K.

Ease of use
Support
Ease of Setup

Languages supported: English

0.0
NopSec Unified VRM
★★★★★

NopSec Unified VRM

NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that matter. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence – including malware, exploit, patching and social media feeds to predict the true probability ...

-

Ease of use
Support
Ease of Setup

Languages supported: English

B2B Software Guide