Best Vulnerability Scanner Software

Products Buyer's Guide
8.6
SaltStack
★★★★★

SaltStack

Systems and configuration management software

my opinion about saltstack - Bpagadala P.

Ease of use
7.7
Support
9.1
Ease of Setup
0.0

Languages supported: English

8.4
Acunetix by Invicti
★★★★★

Acunetix by Invicti

Acunetix Vulnerability Scanner automatically crawls and scans off-the-shelf and custom-built websites and web applications for SQL Injection, XSS, XXE, SSRF, Host Header Attacks & over 3000 other web vulnerabilities. It also provides a wide variety of reports to help developers and business owners alike to quickly identify a web application's threat surface, detect what needs to be fixed, and ensure conformance with several compliance standards.

Perfect solution for web developers - Lubos B.

Ease of use
8.5
Support
8.1
Ease of Setup
8.3

Languages supported: English

8.8
InsightVM (Nexpose)
★★★★★

InsightVM (Nexpose)

Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development to streamline and automate remediation efforts.

InsightVM (Nexpose) Review - Lem R.

Ease of use
8.8
Support
8.7
Ease of Setup
0.0
9.0
Netsparker by Invicti
★★★★★

Netsparker by Invicti

Netsparker is an automatic and easy-to-use web application security scanner to automatically find security flaws in websites, web applications and web services.

Market Leader - Volodymyr S.

Ease of use
9.0
Support
9.1
Ease of Setup
0.0

Languages supported: English

9.6
Pentest-Tools.com
★★★★★

Pentest-Tools.com

Pentest-Tools.com is the first online framework for penetration testing and vulnerability assessment. We help our customers to detect vulnerabilities in websites and network infrastructures while providing detailed reports and recommendations for remediation.

Extremely valuable tool with outstanding reporting - Stephen W.

Ease of use
9.5
Support
9.6
Ease of Setup
9.1

Languages supported: English

10.0
PT Application Inspector
★★★★★

PT Application Inspector

PT Application Inspector is designed to protect web applications of every scale: from landing pages and corporate portals to commerce, cloud services, and e-government systems.

Nice source code analyzer - User in Banking

Ease of use
Support
Ease of Setup
9.2
Detectify Deep Scan
★★★★★

Detectify Deep Scan

Detectify is a SaaS based website security service that analyzes and monitors the security level of a user's website by applying a broad range of emulated hacker attacks and provide report that describes the identified vulnerabilities and their potential risk in the hands of malicious hackers.

A non-developer with a WordPress hosted website's take on Deep Scanning with Detectify - Lindsey H.

Ease of use
9.5
Support
8.9
Ease of Setup
0.0

Languages supported: English

9.0
Snyk
★★★★★

Snyk

Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.

Simplest way to improve application security is using Snyk - Jean-Alexandre B.

Ease of use
8.6
Support
9.2
Ease of Setup
8.6
9.4
Defendify Cybersecurity Platform
★★★★★

Defendify Cybersecurity Platform

Defendify is the only all-in-one SaaS-delivered cybersecurity platform designed specifically for small and mid-sized businesses. As a single pane of glass, Defendify provides multiple layers of ongoing protection to continuously improve the strength of your security posture against evolving cyber threats.

Great set of tools at a reasonable price. - Ryan J.

Ease of use
9.7
Support
8.9
Ease of Setup
9.4

Languages supported: English

8.8
Kiuwan Code Security & Insights
★★★★★

Kiuwan Code Security & Insights

Provides an end-to-end Application Security platform to bring you objective data so you can make informed decisions regarding the security, risk, cost, activity, quality, maintainability, efficiency and dependencies of your applications.

Faster to integration with Jenkins - Rosnel A.

Ease of use
8.1
Support
8.9
Ease of Setup
0.0

Languages supported: English

8.6
BeyondTrust Vulnerability Management
★★★★★

BeyondTrust Vulnerability Management

Reduce risk with cross-platform vulnerability assessment and remediation, including built-in configuration compliance, patch management and compliance reporting.

Best Vulnerability tool to use in a nework - Hari K.

Ease of use
Support
Ease of Setup

Languages supported: English

10.0
Digital Defense Frontline.Cloud
★★★★★

Digital Defense Frontline.Cloud

Frontline.Cloud is the original Software as a Service (SaaS) securityplatform. Built for the cloud from the very start, Frontline.Cloudworks seamlessly and deploys easily for organizations of all sizes,and offers a variety of options all within one convenient platform:- Frontline VM™ – Vulnerability Management- Frontline WAS™ – Web Application Scanning- Frontline ATS™ – Active Threat Sweep- Frontline Pen Test™ – Online Reporting and Ethical ...

DDF is a great asset to protecting against vulnerabilities - Administrator in Media Production

Ease of use
Support
Ease of Setup
8.6
IBM Security QRadar
★★★★★

IBM Security QRadar

IBM QRadar is designed to collect logs, events, network flows and user behavior across your entire enterprise, correlates that against threat intelligence and vulnerability data to detect known threats, and applies advanced analytics to identify anomalies that may signal unknown threats. The solution then uniquely connects the end-to-end chain of activity associated with a single potential incident, and provides prioritized alerts based on ...

Excellent SIEM - Jonathan S.

Ease of use
8.2
Support
8.7
Ease of Setup
8.3

Languages supported: German, English, French, Italian, Japanese, Korean, Portuguese, Russian, Spanish, Chinese (Simplified)

8.8
AlienVault USM (from AT&T Cybersecurity)
★★★★★

AlienVault USM (from AT&T Cybersecurity)

AlienVault USM (from AT&T Cybersecurity) is a platform that provides five essential security capabilities in a single console to manage both compliance and threats, understanding the sensitive nature of IT environments, include active, passive and host-based technologies to match the requirements of each particular environment.

Security that is out of this world - Karl H.

Ease of use
8.2
Support
8.7
Ease of Setup
0.0

Languages supported: English

B2B Software Guide