Vulnerability Assessment Reviews and Ratings
What are vulnerability assessment?
VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents.
Core capabilities include:
- Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria
- Establishing a baseline for systems, applications and databases to identify and track changes in state
- Reporting options for compliance, control frameworks and multiple roles
Standard capabilities include:
- Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment
- Guidance for remediating and configuring compensating controls
- Management of scanner instances, agents and gateways
- Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools
Product Listings
Filter by
Rapid7 InsightVM is an analytics-driven vulnerability management solution that provides continuous visibility into on-premises, cloud, and remote assets.
The solution uses an Active Risk Score, enriched with real-world threat intelligence, to prioritize the most critical vulnerabilities most likely to be exploited. This approach empowers security and IT teams to stop chasing low-priority issues and focus on the highest-impact, most critical risks.
To shift from reactive to proactive vulnerability resolution, InsightVM features automated remediation projects that integrate with ticketing systems like Jira and ServiceNow, streamlining collaboration and accelerating time-to-fix. The system provides live, customizable dashboards for tracking measurable risk reduction and compliance goals.
Tenable Nessus is a vulnerability scanner that streamlines and automates the security assessment process. With continuously updated plugins, it proactively identifies threats across a variety of operating systems, devices and applications. Nessus detects vulnerabilities, including software flaws, misconfigurations, missing patches and malware. It performs deep scans across diverse environments while maintaining accuracy and minimal false positives. Its customizable scanning templates and actionable reporting enable teams to convert raw vulnerability data into strategic security decisions, complete with clear, prioritized remediation guidance.
Qualys VMDR is a software that integrates vulnerability management, detection, and response capabilities into a single platform. The software enables organizations to identify assets across their environment, detect vulnerabilities, prioritize threats based on risk, and automate remediation workflows. Qualys VMDR assists in maintaining visibility by continuously scanning systems for potential security risks and providing actionable insights to address them. The software supports compliance efforts by helping users document security controls and produce audit-ready reports. By streamlining the processes of vulnerability assessment, threat detection, and response, Qualys VMDR aims to help organizations reduce security risks and improve operational efficiency in managing their IT infrastructure.
Tenable Vulnerability Management provides a risk-based approach to identifying, prioritizing, and remediating vulnerabilities across your entire attack surface. Powered by Nessus technology and AI-driven analytics, it goes beyond CVSS scores to assess exploitability, asset criticality, and business impact—so you can focus on what matters most. With continuous visibility, automated scanning, and real-time risk insights, security teams can quickly expose and close critical vulnerabilities before they’re exploited. Advanced asset identification ensures accurate tracking in dynamic environments, while intuitive dashboards, comprehensive reporting, and seamless third-party integrations help streamline workflows. As a cloud-based solution, Tenable Vulnerability Management scales with your organization, empowering security teams to maximize efficiency, reduce risk, and improve resilience against evolving threats.
Tenable Security Center is an on-premises vulnerability management platform that provides complete visibility into your attack surface, helping security teams identify, prioritize, and remediate risks efficiently. Powered by Nessus technology, it delivers real-time insights through advanced analytics, customizable dashboards, and automated reporting. Security Center integrates with Tenable’s scanning solutions to track compliance, monitor assets, and reduce cyber exposure. With Vulnerability Priority Rating (VPR), it combines threat intelligence, asset criticality, and exploitability data to focus on the most pressing risks. Its scalable architecture supports large, dynamic environments, ensuring accurate assessments and streamlined remediation. By delivering actionable intelligence and centralized risk management, Tenable Security Center empowers organizations to strengthen security and minimize business-impacting breaches.
Falcon Spotlight is a software developed by CrowdStrike that provides vulnerability assessment capabilities for organizations seeking to strengthen their cybersecurity posture. The software continuously scans endpoints to identify potential vulnerabilities in operating systems and applications, offering real-time insights into security exposures. It integrates with existing security workflows and platforms to support rapid detection and prioritization of vulnerabilities based on risk. Falcon Spotlight enables IT and security teams to manage patching and remediation activities efficiently, helping reduce the attack surface and improve compliance. The software addresses the business challenge of maintaining visibility into vulnerabilities across an organization's environment, supporting efforts to prevent exploitation and minimize operational risk.
Delivered by security experts - Concierge Security® Team; the Arctic Wolf® Managed Risk solution enables you to define and contextualize your attack surface coverage across your networks, endpoints, and cloud environments; provides you with the risk priorities in your environment; and advises you on your remediation actions to ensure that you are benchmarking against configuration best practices and continually hardening your security posture.
Saner CVEM is a continuous vulnerability and exposure management software designed to identify, assess, priroitize and remediate security vulnerabilities in IT environments. The software enables organizations to continuously scan endpoints for vulnerabilities and track exposure by leveraging comprehensive vulnerability databases.
Saner CVEM also supports compliance management and provides detailed reporting for visibility into security posture. The software assists organizations in addressing security gaps and maintaining the integrity of their digital assets by facilitating proactive vulnerability management operations.
Intruder helps lean security teams proactively uncover and fix weaknesses by unifying attack surface management, cloud security and continuous vulnerability scanning in one intuitive platform. With compliance-ready reports and actionable results prioritized by severity and exploit likelihood, Intruder helps 3,000+ customers focus on fixing what matters. Integrating seamlessly with AWS, Azure, Google Cloud, Slack, Jira and more, Intruder makes exposure management simple, effective and scalable for growing teams.
Tripwire IP360 is a software that provides network vulnerability management by identifying and assessing vulnerabilities across a range of assets including on-premises, cloud, and hybrid environments. The software enables organizations to gain visibility into their network landscape, prioritize vulnerabilities based on business risk, and manage security posture through comprehensive asset discovery, accurate vulnerability scanning, and flexible reporting capabilities. Tripwire IP360 aids organizations in maintaining compliance with industry standards and supports risk management strategies by delivering actionable intelligence to inform remediation efforts and reduce exposure to potential threats.
Holm Security Next-Gen Vulnerability Management is a software that provides organizations with tools to identify, assess, and manage vulnerabilities across their IT infrastructure. The software features automated scanning of networks, systems, web applications, and cloud environments to detect security risks. It delivers prioritization of vulnerabilities based on severity and business impact, enabling efficient remediation planning. The software offers reporting and analytics to help organizations track progress over time and comply with regulatory requirements. By supporting integrations with other security and IT management solutions, it assists in continuous monitoring to reduce exposure to threats and improve overall cybersecurity posture. The software addresses the business problem of reducing potential risks associated with exploitable vulnerabilities in digital assets.
Fortra Vulnerability Management software provides organizations with tools to identify, assess, and prioritize vulnerabilities across networked environments. The software supports continuous scanning, automated detection, and risk analysis to help businesses address security gaps. By integrating reporting and remediation workflows, the software assists teams in managing vulnerability lifecycle processes, helping to reduce exposure and organize mitigation efforts. Features include the capability to create detailed vulnerability inventories, tracking trends over time, and generating compliance reports. The software is designed to enable security teams to systematically address vulnerabilities aligned with organizational policies and regulatory requirements.
WithSecure Elements Vulnerability Management is a software designed to identify, classify, and prioritize security vulnerabilities across IT environments. The software enables continuous vulnerability scanning and assessment of networked assets including servers, endpoints, and cloud resources. It provides automated detection through a centralized dashboard, reporting tools, and actionable insights to assist organizations in addressing exposures before they can be exploited. The software supports workflow integration by allowing users to track remediation progress and monitor compliance with security policies. By facilitating regular assessments and clear reporting, this software helps organizations strengthen their cyber resilience and manage risks associated with exploitable security weaknesses.
Tanium Platform is an endpoint management and security software that provides organizations with visibility and control across their IT environments. The software enables management of endpoints at scale, offering real-time data collection, monitoring, and automated responses to incidents and vulnerabilities. It facilitates patch management, compliance reporting, and asset discovery while supporting the detection and remediation of threats. Tanium Platform helps address business challenges related to operational visibility, system management, and security posture by consolidating information from endpoints and allowing administrators to make informed decisions and execute actions across distributed environments.
RidgeBot by Ridge Security uses AI to automate security validation and provides automated penetration testing as well as continuous vulnerabilities validation. RidgeBot delivers continuous threat exposure management by automatically testing an organization’s entire Internet Protocol (IP)-based attack surfaces, including network infrastructure, applications, websites, IoT, and OT. RidgeBot pinpoints the most critical vulnerabilities (CVE based and non-CVE based) using ethical hacking techniques. RidgeBot maintains a library of over 36,000 plugins to launch complex penetration tests and attack simulations, with detailed reporting of results and remediation recommendation.
Microsoft Defender Vulnerability Management is a software that enables organizations to identify, assess, and remediate vulnerabilities across their digital environments. The software delivers continuous vulnerability discovery and prioritization by analyzing devices, operating systems, and applications for security weaknesses. It provides risk-based insights, threat intelligence integration, and recommendations for remediation actions. Microsoft Defender Vulnerability Management supports automated asset inventory, real-time risk assessment, and contextual guidance to address potential threats. The software is designed to assist security teams in reducing organizational attack surface and streamlining the vulnerability management lifecycle.
XM Cyber Exposure Management Platform is a software designed to continuously identify, analyze, and prioritize security risks within enterprise environments. It models potential attack paths across hybrid networks, highlighting vulnerabilities and misconfigurations that could be exploited by threats. The software integrates data from multiple security tools to provide actionable insights, focusing remediation efforts on issues that pose the highest risk to critical assets. XM Cyber Exposure Management Platform aims to improve the efficiency of security operations by automating risk prioritization and streamlining incident response processes, helping organizations to mitigate threats before they can impact business operations.
ESOF is a software developed by TAC Security that provides organizations with risk-based vulnerability management and cybersecurity solutions. It assists in identifying, prioritizing, and mitigating vulnerabilities across various IT assets including networks, applications, and cloud environments. The software integrates security data from multiple endpoints to centralize risk visibility and enables users to automate security workflows, track remediation efforts, and measure cyber risk scores. ESOF aims to streamline the vulnerability assessment process and supports compliance with regulatory standards by generating audit-ready reports and analytics. Its functionalities are designed to help businesses enhance their cybersecurity posture and reduce exposure to threats by facilitating informed risk management decisions.
Qualys CyberSecurity Asset Management software provides automated discovery, inventory, and classification of IT, cloud, and internet-connected assets within an organization. The software identifies devices across the environment, associates context such as asset ownership and location, and tracks changes to configurations and vulnerabilities. It integrates asset data with security monitoring and compliance workflows to help organizations prioritize remediation efforts and reduce risk exposure. The software delivers visibility into unmanaged or unauthorized assets, supports policy enforcement, and enhances the response to potential cyber threats by allowing organizations to continuously monitor the security posture of their asset landscape.















