• Categories

    • Loading categories...

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Vulnerability Assessment

Vulnerability Assessment Reviews and Ratings

What are vulnerability assessment?

VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents.

Core capabilities include:

- Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria

- Establishing a baseline for systems, applications and databases to identify and track changes in state

- Reporting options for compliance, control frameworks and multiple roles

Standard capabilities include:

- Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment

- Guidance for remediating and configuring compensating controls

- Management of scanner instances, agents and gateways

- Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Intruder
Intruder
Logo of Falcon Spotlight
Falcon Spotlight
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
For 50M-1B USD Companies
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
Logo of Intruder
Intruder
Logo of Tenable Security Center
Tenable Security Center
For North America
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
Logo of Intruder
Intruder
Logo of Tenable Vulnerability Management
Tenable Vulnerability Management
Integration & Deployment
Logo of Intruder
Intruder
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
Logo of Falcon Spotlight
Falcon Spotlight

Product Listings

Filter by

Products 1 - 20 of 131
Sort by
Logo of InsightVM

InsightVM

By Rapid7

4.3
(739 Ratings)

Rapid7, Inc. aims to create a safer digital world by simplifying and making cybersecurity simpler and more accessible. Rapid7 empowers security professionals worldwide to manage a modern attack surface through its technology, research, and broad, strategic expertise. Rapid7’s comprehensive security solutions help over 11,000 customers unite cloud risk management with threat detection and response to reduce attack surfaces and eliminate threats quickly and precisely.

Show More Details
Logo of Tenable Nessus

Tenable Nessus

By Tenable

4.6
(634 Ratings)
customers choice 2025

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.

Show More Details
Logo of Qualys VMDR

Qualys VMDR

By Qualys

4.4
(522 Ratings)

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings.

The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.

Show More Details
Logo of Tenable Vulnerability Management

Tenable Vulnerability Management

By Tenable

4.6
(321 Ratings)
customers choice 2025

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.

Show More Details
Logo of Tenable Security Center

Tenable Security Center

By Tenable

4.7
(291 Ratings)
customers choice 2025

Tenable is the exposure management company, exposing and closing the cybersecurity gaps that erode business value, reputation and trust. The company’s AI-powered exposure management platform radically unifies security visibility, insight and action across the attack surface, equipping modern organizations to protect against attacks from IT infrastructure to cloud environments to critical infrastructure and everywhere in between. By protecting enterprises from security exposure, Tenable reduces business risk for more than 44,000 customers around the globe.

Show More Details
Logo of Falcon Spotlight

Falcon Spotlight

By CrowdStrike

4.7
(167 Ratings)

CrowdStrike is a recognized entity in the cybersecurity space, specializing in enterprise risk management through the innovative application of technology. The company focuses primarily on protecting essential business risk areas such as endpoints, cloud workloads, identity, and data. Employing the state-of-the-art CrowdStrike Security Cloud and advanced AI technology, the firm provides effective solutions. Its CrowdStrike Falcon platform uses real-time indications of attack, threat intelligence, telemetry enhanced from diverse enterprise sources, and evolving adversary knowhow for high-grade detection, automated protection and healing, advanced threat tracking, and efficient vulnerability visibility. The Falcon platform, designed in the cloud with a singular lightweight-agent architecture, offers swift deployment, unique protection and performance, and reduced complexity. Therefore, CrowdStrike delivers a significant value proposition right from the beginning.

Show More Details
Logo of Arctic Wolf Managed Risk

Arctic Wolf Managed Risk

By Arctic Wolf Networks

4.9
(128 Ratings)

Arctic Wolf envisions a future without cyber risk. Every organization should be so effective at security operations that both the likelihood and impact of a cyber attack is minimized to the point where risk is essentially zero. Arctic Wolf's Mission: End Cyber Risk.

Show More Details
Logo of Saner CVEM

Saner CVEM

By SecPod

4.4
(111 Ratings)

SecPod is a cyber security company with a mission to prevent cyberattacks on organizations. Our continuous vulnerability and exposure management (CVEM) platform helps implement cyber hygiene measures, making it more difficult for attackers to access systems and companies' vital information.

SecPod SanerNow's CVEM platform provides continuous visibility to IT infrastructure. It identifies vulnerabilities, misconfigurations, and security risk exposures, mitigates loopholes to reduce the attack surface, measures compliance, and helps automate remediation. Our product philosophy is offering an easy-to-use solution with fast time to value that improves an organization's IT risk posture at a lower total cost of ownership Vs. using point solutions.

Show More Details
Logo of Intruder

Intruder

By Intruder

4.7
(96 Ratings)

Intruder helps lean security teams proactively uncover and fix weaknesses by unifying attack surface management, cloud security and continuous vulnerability scanning in one intuitive platform. With compliance-ready reports and actionable results prioritized by severity and exploit likelihood, Intruder helps 3,000+ customers focus on fixing what matters. Integrating seamlessly with AWS, Azure, Google Cloud, Slack, Jira and more, Intruder makes exposure management simple, effective and scalable for growing teams.

Show More Details
Logo of Tripwire IP360

Tripwire IP360

By Fortra

4.1
(93 Ratings)

HelpSystems, now rebranded as Fortra, focuses on addressing the increasing complexity of data protection in an era of escalating cyber threats. In an environment where the only certainty is change, the company acknowledges the necessity of adaptability for sustainable growth. Guided by feedback, Fortra takes on problem-solving and delivers tailored solutions to help organizations deal with their cybersecurity challenges effectively. Specializing in areas such as data security, infrastructure protection, managed services, and threat research and intelligence, the company strives to enhance security maturity and simultaneously reduce the operational challenges associated with it. The fundamental belief driving Fortra is the conviction that no problem is insurmountable. The company is committed to forging a secure future in cybersecurity.

Show More Details
Logo of Holm Security Next-Gen Vulnerability Management

Holm Security Next-Gen Vulnerability Management

By Holm Security

4.5
(86 Ratings)

Holm Security's Next-Gen Vulnerability Management Platform (VMP) creates the foundation for a systematic, risk-based, and proactive cyber defense against modern threats. Working with exposure management, we provide the insight you need to understand and minimize your attack surface before vulnerabilities are exploited.

Our platform is composed of integrated products featuring one workflow and risk model. The unified interface offers a comprehensive risk overview, streamlined workflow, and consistent risk model across all attack vectors, enabling teams and individuals to efficiently prioritize and remediate vulnerabilities. Powered by AI for faster and broader coverage of vulnerabilities and extensive threat intelligence.

Made in Europe.

Show More Details
Logo of GFI LanGuard

GFI LanGuard

By Aurea SMB Solutions (GFI Software)

4.5
(85 Ratings)
Show More Details
Logo of Fortra Vulnerability Management

Fortra Vulnerability Management

By Fortra

4.3
(74 Ratings)

HelpSystems, now rebranded as Fortra, focuses on addressing the increasing complexity of data protection in an era of escalating cyber threats. In an environment where the only certainty is change, the company acknowledges the necessity of adaptability for sustainable growth. Guided by feedback, Fortra takes on problem-solving and delivers tailored solutions to help organizations deal with their cybersecurity challenges effectively. Specializing in areas such as data security, infrastructure protection, managed services, and threat research and intelligence, the company strives to enhance security maturity and simultaneously reduce the operational challenges associated with it. The fundamental belief driving Fortra is the conviction that no problem is insurmountable. The company is committed to forging a secure future in cybersecurity.

Show More Details
Logo of WithSecure Elements Vulnerability Management

WithSecure Elements Vulnerability Management

By WithSecure

4.5
(72 Ratings)

WithSecure, formerly F-Secure Business. IT service providers, MSSPs and businesses trust us for outcome-based cyber security that protects and enables their operations.

WithSecure’s AI-driven protection secures endpoints and cloud collaboration, and intelligent detection and response capabilities are powered by experts who identify business risks by proactively hunting for threats and confronting live attacks. WithSecure’s consultants partner with enterprises and tech challengers to build resilience through evidence-based security advice. With more than 30 years of experience in building technology that meets business objectives, WithSecure has built its portfolio to grow with our partners through flexible commercial models.

Show More Details
Logo of Tanium Platform

Tanium Platform

By Tanium

4.7
(58 Ratings)

Tanium focuses on providing a comprehensive solution to monitor, control, and protect all networked endpoints. The primary business problem it solves pertains to the need for centralized management of all such endpoints for businesses. Pioneering the Converged Endpoint Management (XEM) platform, Tanium aims to deliver efficient system administration and security measures across diverse networked environments.

Show More Details
Logo of RidgeBot

RidgeBot

By Ridge Security

4.7
(46 Ratings)

Ridge Security provides an innovative solution for security testing through its product, RidgeBot, an Intelligent Penetration Testing Robot. RidgeBot utilizes advanced techniques to breach systems, similar to those used by hackers. When integrated into a system, RidgeBot seeks out, exploits and documents any vulnerabilities it uncovers. It operates within a predefined scope and can instantly adapt to highly complex structures. Ridge Security's offerings serve enterprise and web application teams, ISVs, government entities, educational institutions or any other party tasked with maintaining software security, allowing them to test their systems in an affordable and efficient manner.

Show More Details
Logo of XM Cyber Exposure Management Platform

XM Cyber Exposure Management Platform

By XM Cyber

4.7
(44 Ratings)

XM Cyber is a continuous exposure management company that focuses on reducing risk by focusing on the fixes with the highest impact on risk. XM Cyber provides a transformative approach to exposure management by identifying potential vulnerabilities, identity exposures and misconfigurations in AWS, Azure, GCP, and on prem environments. Mapping all potential attack paths into an attack graph allows prioritizing exposure remediation based on its exploitability and impact on critical assets. The primary objective is to facilitate the most effective remediation of exposures with minimum effort. XM Cyber has expanded its operations to North America, EMEA, APJ, and LATAM.

Show More Details
Logo of Microsoft Defender Vulnerability Management

Microsoft Defender Vulnerability Management

By Microsoft

4.4
(42 Ratings)

Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. Microsoft is dedicated to advancing human and organizational achievement.

Microsoft Security helps protect people and data against cyberthreats to give peace of mind.

Show More Details
Logo of ESOF

ESOF

By TAC Security

4.5
(39 Ratings)

TAC Security, a globally recognized entity in vulnerability management, protects numerous large-scale businesses and governmental institutions worldwide. Through the handling of over five million vulnerabilities, this organization makes use of its AI-based vulnerability management platform called ESOF. This platform is a risk-based vulnerability management solution with an inherent Cyber Risk Quantification (CRQ). TAC Security operates from its main office in San Francisco, CA, with additional branches in Mumbai, Pune, Bangalore, and Chandigarh, India.

Show More Details
Logo of Qualys CyberSecurity Asset Management

Qualys CyberSecurity Asset Management

By Qualys

4.4
(34 Ratings)

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of disruptive cloud-based security, compliance and IT solutions with more than 10,000 subscription customers worldwide, including a majority of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and automate their security and compliance solutions onto a single platform for greater agility, better business outcomes, and substantial cost savings.

The Qualys Cloud Platform leverages a single agent to continuously deliver critical security intelligence while enabling enterprises to automate the full spectrum of vulnerability detection, compliance, and protection for IT systems, workloads and web applications across on premises, endpoints, servers, public and private clouds, containers, and mobile devices.

Show More Details

Gartner Research

Market Guide for Vulnerability Assessment
Gartner Peer Insights 'Voice of the Customer': Vulnerability Assessment

Top Trending Products

Qualys CyberSecurity Asset ManagementIONIX Attack Surface ManagementSaner CVEMIntruderTanium PlatformTenable NessusTenable Vulnerability ManagementESOFQualys VMDRMicrosoft Defender Vulnerability Management

Popular Product Comparisons

Qualys VMDR vs Tenable NessusTenable Nessus vs Tenable Vulnerability ManagementInsightVM vs Tenable NessusGreenbone Vulnerability Management vs Tenable NessusTenable Nessus vs Tenable Security CenterInsightVM vs Qualys VMDR

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2025 Gartner, Inc. and/or its affiliates.

All rights reserved.