• HOME
  • CATEGORIES

    • CATEGORIES

    • Browse All Categories
  • FOR VENDORS

    • FOR VENDORS

    • Log In to Vendor Portal
    • Get Started
  • REVIEWS

    • REVIEWS

    • Write a Review
    • Product Reviews
    • Vendor Directory
    • Product Comparisons
  • GARTNER PEER COMMUNITY™
  • GARTNER.COM
  • Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQPrivacyTerms of Service
    ©2026 Gartner, Inc. and/or its affiliates.
    All rights reserved.
  • Categories

    • Loading categories...

      Browse All Categories

      Loading markets...

  • For Vendors

    • Log In to Vendor Portal 

    • Get Started 

  • Write a Review

Join / Sign In
All Categories
/
Vulnerability Assessment

Vulnerability Assessment Reviews and Ratings

What are vulnerability assessment?

VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents.

Core capabilities include:

- Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria

- Establishing a baseline for systems, applications and databases to identify and track changes in state

- Reporting options for compliance, control frameworks and multiple roles

Standard capabilities include:

- Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment

- Guidance for remediating and configuring compensating controls

- Management of scanner instances, agents and gateways

- Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools

How Categories and Markets Are Defined
Highest Rated By Your Peers
For Willingness to Recommend
Logo of Intruder
Intruder
Logo of Falcon Spotlight
Falcon Spotlight
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
For 50M-1B USD Companies
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
Logo of Intruder
Intruder
Logo of Tenable Security Center
Tenable Security Center
For North America
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
Logo of Intruder
Intruder
Logo of Tenable Nessus
Tenable Nessus
Integration & Deployment
Logo of Intruder
Intruder
Logo of Arctic Wolf Managed Risk
Arctic Wolf Managed Risk
Logo of XM Cyber Exposure Management Platform
XM Cyber Exposure Management Platform

Product Listings

Filter by

Products 1 - 20 of 130
Sort by
Logo of InsightVM

InsightVM

By Rapid7

4.3
(739 Ratings)

Rapid7 InsightVM is an analytics-driven vulnerability management solution that provides continuous visibility into on-premises, cloud, and remote assets.

The solution uses an Active Risk Score, enriched with real-world threat intelligence, to prioritize the most critical vulnerabilities most likely to be exploited. This approach empowers security and IT teams to stop chasing low-priority issues and focus on the highest-impact, most critical risks.

To shift from reactive to proactive vulnerability resolution, InsightVM features automated remediation projects that integrate with ticketing systems like Jira and ServiceNow, streamlining collaboration and accelerating time-to-fix. The system provides live, customizable dashboards for tracking measurable risk reduction and compliance goals.

Show More Details
Logo of Tenable Nessus

Tenable Nessus

By Tenable

4.6
(640 Ratings)
customers choice 2025

Tenable Nessus is a vulnerability scanner that streamlines and automates the security assessment process. With continuously updated plugins, it proactively identifies threats across a variety of operating systems, devices and applications. Nessus detects vulnerabilities, including software flaws, misconfigurations, missing patches and malware. It performs deep scans across diverse environments while maintaining accuracy and minimal false positives. Its customizable scanning templates and actionable reporting enable teams to convert raw vulnerability data into strategic security decisions, complete with clear, prioritized remediation guidance.

Show More Details
Logo of Qualys VMDR

Qualys VMDR

By Qualys

4.4
(523 Ratings)

Qualys VMDR is a software that integrates vulnerability management, detection, and response capabilities into a single platform. The software enables organizations to identify assets across their environment, detect vulnerabilities, prioritize threats based on risk, and automate remediation workflows. Qualys VMDR assists in maintaining visibility by continuously scanning systems for potential security risks and providing actionable insights to address them. The software supports compliance efforts by helping users document security controls and produce audit-ready reports. By streamlining the processes of vulnerability assessment, threat detection, and response, Qualys VMDR aims to help organizations reduce security risks and improve operational efficiency in managing their IT infrastructure.

Show More Details
Logo of Tenable Vulnerability Management

Tenable Vulnerability Management

By Tenable

4.6
(321 Ratings)
customers choice 2025

Tenable Vulnerability Management provides a risk-based approach to identifying, prioritizing, and remediating vulnerabilities across your entire attack surface. Powered by Nessus technology and AI-driven analytics, it goes beyond CVSS scores to assess exploitability, asset criticality, and business impact—so you can focus on what matters most. With continuous visibility, automated scanning, and real-time risk insights, security teams can quickly expose and close critical vulnerabilities before they’re exploited. Advanced asset identification ensures accurate tracking in dynamic environments, while intuitive dashboards, comprehensive reporting, and seamless third-party integrations help streamline workflows. As a cloud-based solution, Tenable Vulnerability Management scales with your organization, empowering security teams to maximize efficiency, reduce risk, and improve resilience against evolving threats.

Show More Details
Logo of Tenable Security Center

Tenable Security Center

By Tenable

4.7
(291 Ratings)
customers choice 2025

Tenable Security Center is an on-premises vulnerability management platform that provides complete visibility into your attack surface, helping security teams identify, prioritize, and remediate risks efficiently. Powered by Nessus technology, it delivers real-time insights through advanced analytics, customizable dashboards, and automated reporting. Security Center integrates with Tenable’s scanning solutions to track compliance, monitor assets, and reduce cyber exposure. With Vulnerability Priority Rating (VPR), it combines threat intelligence, asset criticality, and exploitability data to focus on the most pressing risks. Its scalable architecture supports large, dynamic environments, ensuring accurate assessments and streamlined remediation. By delivering actionable intelligence and centralized risk management, Tenable Security Center empowers organizations to strengthen security and minimize business-impacting breaches.

Show More Details
Logo of Falcon Spotlight

Falcon Spotlight

By CrowdStrike

4.7
(175 Ratings)

Falcon Spotlight is a software developed by CrowdStrike that provides vulnerability assessment capabilities for organizations seeking to strengthen their cybersecurity posture. The software continuously scans endpoints to identify potential vulnerabilities in operating systems and applications, offering real-time insights into security exposures. It integrates with existing security workflows and platforms to support rapid detection and prioritization of vulnerabilities based on risk. Falcon Spotlight enables IT and security teams to manage patching and remediation activities efficiently, helping reduce the attack surface and improve compliance. The software addresses the business challenge of maintaining visibility into vulnerabilities across an organization's environment, supporting efforts to prevent exploitation and minimize operational risk.

Show More Details
Logo of Arctic Wolf Managed Risk

Arctic Wolf Managed Risk

By Arctic Wolf Networks

4.9
(128 Ratings)

Delivered by security experts - Concierge Security® Team; the Arctic Wolf® Managed Risk solution enables you to define and contextualize your attack surface coverage across your networks, endpoints, and cloud environments; provides you with the risk priorities in your environment; and advises you on your remediation actions to ensure that you are benchmarking against configuration best practices and continually hardening your security posture.

Show More Details
Logo of Saner CVEM

Saner CVEM

By SecPod

4.5
(114 Ratings)

Saner CVEM is a continuous vulnerability and exposure management software designed to identify, assess, priroitize and remediate security vulnerabilities in IT environments. The software enables organizations to continuously scan endpoints for vulnerabilities and track exposure by leveraging comprehensive vulnerability databases.

Saner CVEM also supports compliance management and provides detailed reporting for visibility into security posture. The software assists organizations in addressing security gaps and maintaining the integrity of their digital assets by facilitating proactive vulnerability management operations.

Show More Details
Logo of Intruder

Intruder

By Intruder

4.7
(97 Ratings)

Intruder helps lean security teams proactively uncover and fix weaknesses by unifying attack surface management, cloud security and continuous vulnerability scanning in one intuitive platform. With compliance-ready reports and actionable results prioritized by severity and exploit likelihood, Intruder helps 3,000+ customers focus on fixing what matters. Integrating seamlessly with AWS, Azure, Google Cloud, Slack, Jira and more, Intruder makes exposure management simple, effective and scalable for growing teams.

Show More Details
Logo of Tripwire IP360

Tripwire IP360

By Fortra

4.1
(93 Ratings)

Tripwire IP360 is a software that provides network vulnerability management by identifying and assessing vulnerabilities across a range of assets including on-premises, cloud, and hybrid environments. The software enables organizations to gain visibility into their network landscape, prioritize vulnerabilities based on business risk, and manage security posture through comprehensive asset discovery, accurate vulnerability scanning, and flexible reporting capabilities. Tripwire IP360 aids organizations in maintaining compliance with industry standards and supports risk management strategies by delivering actionable intelligence to inform remediation efforts and reduce exposure to potential threats.

Show More Details
Logo of GFI LanGuard

GFI LanGuard

By Aurea SMB Solutions (GFI Software)

4.2
(86 Ratings)
Show More Details
Logo of Holm Security Next-Gen Vulnerability Management

Holm Security Next-Gen Vulnerability Management

By Holm Security

4.5
(86 Ratings)

Holm Security Next-Gen Vulnerability Management is a software that provides organizations with tools to identify, assess, and manage vulnerabilities across their IT infrastructure. The software features automated scanning of networks, systems, web applications, and cloud environments to detect security risks. It delivers prioritization of vulnerabilities based on severity and business impact, enabling efficient remediation planning. The software offers reporting and analytics to help organizations track progress over time and comply with regulatory requirements. By supporting integrations with other security and IT management solutions, it assists in continuous monitoring to reduce exposure to threats and improve overall cybersecurity posture. The software addresses the business problem of reducing potential risks associated with exploitable vulnerabilities in digital assets.

Show More Details
Logo of Fortra Vulnerability Management

Fortra Vulnerability Management

By Fortra

4.3
(74 Ratings)

Fortra Vulnerability Management software provides organizations with tools to identify, assess, and prioritize vulnerabilities across networked environments. The software supports continuous scanning, automated detection, and risk analysis to help businesses address security gaps. By integrating reporting and remediation workflows, the software assists teams in managing vulnerability lifecycle processes, helping to reduce exposure and organize mitigation efforts. Features include the capability to create detailed vulnerability inventories, tracking trends over time, and generating compliance reports. The software is designed to enable security teams to systematically address vulnerabilities aligned with organizational policies and regulatory requirements.

Show More Details
Logo of WithSecure Elements Vulnerability Management

WithSecure Elements Vulnerability Management

By WithSecure

4.6
(72 Ratings)

WithSecure Elements Vulnerability Management is a software designed to identify, classify, and prioritize security vulnerabilities across IT environments. The software enables continuous vulnerability scanning and assessment of networked assets including servers, endpoints, and cloud resources. It provides automated detection through a centralized dashboard, reporting tools, and actionable insights to assist organizations in addressing exposures before they can be exploited. The software supports workflow integration by allowing users to track remediation progress and monitor compliance with security policies. By facilitating regular assessments and clear reporting, this software helps organizations strengthen their cyber resilience and manage risks associated with exploitable security weaknesses.

Show More Details
Logo of Tanium Autonomous IT Platform

Tanium Autonomous IT Platform

By Tanium

4.7
(60 Ratings)

Tanium Platform is an endpoint management and security software that provides organizations with visibility and control across their IT environments. The software enables management of endpoints at scale, offering real-time data collection, monitoring, and automated responses to incidents and vulnerabilities. It facilitates patch management, compliance reporting, and asset discovery while supporting the detection and remediation of threats. Tanium Platform helps address business challenges related to operational visibility, system management, and security posture by consolidating information from endpoints and allowing administrators to make informed decisions and execute actions across distributed environments.

Show More Details
Logo of RidgeBot

RidgeBot

By Ridge Security

4.7
(46 Ratings)

RidgeBot by Ridge Security uses AI to automate security validation and provides automated penetration testing as well as continuous vulnerabilities validation. RidgeBot delivers continuous threat exposure management by automatically testing an organization’s entire Internet Protocol (IP)-based attack surfaces, including network infrastructure, applications, websites, IoT, and OT. RidgeBot pinpoints the most critical vulnerabilities (CVE based and non-CVE based) using ethical hacking techniques. RidgeBot maintains a library of over 36,000 plugins to launch complex penetration tests and attack simulations, with detailed reporting of results and remediation recommendation.

Show More Details
Logo of Microsoft Defender Vulnerability Management

Microsoft Defender Vulnerability Management

By Microsoft

4.3
(44 Ratings)

Microsoft Defender Vulnerability Management is a software that enables organizations to identify, assess, and remediate vulnerabilities across their digital environments. The software delivers continuous vulnerability discovery and prioritization by analyzing devices, operating systems, and applications for security weaknesses. It provides risk-based insights, threat intelligence integration, and recommendations for remediation actions. Microsoft Defender Vulnerability Management supports automated asset inventory, real-time risk assessment, and contextual guidance to address potential threats. The software is designed to assist security teams in reducing organizational attack surface and streamlining the vulnerability management lifecycle.

Show More Details
Logo of XM Cyber Exposure Management Platform

XM Cyber Exposure Management Platform

By XM Cyber

4.7
(44 Ratings)

XM Cyber Exposure Management Platform is a software designed to continuously identify, analyze, and prioritize security risks within enterprise environments. It models potential attack paths across hybrid networks, highlighting vulnerabilities and misconfigurations that could be exploited by threats. The software integrates data from multiple security tools to provide actionable insights, focusing remediation efforts on issues that pose the highest risk to critical assets. XM Cyber Exposure Management Platform aims to improve the efficiency of security operations by automating risk prioritization and streamlining incident response processes, helping organizations to mitigate threats before they can impact business operations.

Show More Details
Logo of ESOF

ESOF

By TAC Security

4.5
(39 Ratings)

ESOF is a software developed by TAC Security that provides organizations with risk-based vulnerability management and cybersecurity solutions. It assists in identifying, prioritizing, and mitigating vulnerabilities across various IT assets including networks, applications, and cloud environments. The software integrates security data from multiple endpoints to centralize risk visibility and enables users to automate security workflows, track remediation efforts, and measure cyber risk scores. ESOF aims to streamline the vulnerability assessment process and supports compliance with regulatory standards by generating audit-ready reports and analytics. Its functionalities are designed to help businesses enhance their cybersecurity posture and reduce exposure to threats by facilitating informed risk management decisions.

Show More Details
Logo of Qualys CyberSecurity Asset Management

Qualys CyberSecurity Asset Management

By Qualys

4.4
(34 Ratings)

Qualys CyberSecurity Asset Management software provides automated discovery, inventory, and classification of IT, cloud, and internet-connected assets within an organization. The software identifies devices across the environment, associates context such as asset ownership and location, and tracks changes to configurations and vulnerabilities. It integrates asset data with security monitoring and compliance workflows to help organizations prioritize remediation efforts and reduce risk exposure. The software delivers visibility into unmanaged or unauthorized assets, supports policy enforcement, and enhances the response to potential cyber threats by allowing organizations to continuously monitor the security posture of their asset landscape.

Show More Details

Gartner Research

Market Guide for Vulnerability Assessment
Gartner Peer Insights 'Voice of the Customer': Vulnerability Assessment

Top Trending Products

Falcon SpotlightTenable NessusAutoSecTTanium Autonomous IT PlatformInsightVMQualys VMDRIntruderAppCheckMicrosoft Defender Vulnerability ManagementRapidFort Platform

Popular Product Comparisons

Qualys VMDR vs Tenable NessusTenable Nessus vs Tenable Vulnerability ManagementInsightVM vs Tenable NessusGreenbone Vulnerability Management vs Tenable NessusTenable Nessus vs Tenable Security CenterMicrosoft Defender Vulnerability Management vs Tenable Vulnerability ManagementInsightVM vs Qualys VMDR

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences, and should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

This site is protected by hCaptcha and its Privacy Policy and Terms of Use apply.


Software reviews and ratings for EMMS, BI, CRM, MDM, analytics, security and other platforms - Peer Insights by Gartner
Community GuidelinesListing GuidelinesBrowse VendorsRules of EngagementFAQsPrivacyTerms of Use

©2026 Gartner, Inc. and/or its affiliates.

All rights reserved.