Vulnerability Assessment Reviews and Ratings

What are vulnerability assessment?

VA solutions identify, categorize and prioritize vulnerabilities as well as orchestrate their remediation or mitigation. Their primary focus is vulnerability and security configuration assessments for enterprise risk identification and reduction, and reporting against various compliance standards. VA can be delivered via on-premises, hosted and cloud-based solutions, and it may use appliances and agents. Core capabilities include: - Discovery, identification and reporting on device, OS, software vulnerabilities and configuration against security-related criteria - Establishing a baseline for systems, applications and databases to identify and track changes in state - Reporting options for compliance, control frameworks and multiple roles Standard capabilities include: - Pragmatic remediation prioritization with the ability to correlate vulnerability severity, asset context and threat context that then presents a better picture of true risk for your specific environment - Guidance for remediating and configuring compensating controls - Management of scanner instances, agents and gateways - Direct integration with, or API access to, asset management tools, workflow management tools and patch management tools

Products In Vulnerability Assessment Market

"Accelerating Analysis and Response Times with Innovative Vulnerability Management"

A true vulnerability management product that dramatically speeds up analysis and response times.

Read reviews

"Stability and Accuracy"

The product has worked like a charm since we bought it 10 years ago.

Read reviews

"Qulays VMDR: a defensive wall from vulnerabilities"

Qualys VMDR is an amazing cloud-based platform to identify vulnerabilities within your organization based on OS, application, misconfiguration, missing patches, zero day and network. Qualys vmdr also identifies malware and threat indicators with the global confidence. With the help of a light weight qulays agent on endpoints, servers, network devices and cloud instances, it does a great job in continuous scanning for active vulnerabilities and also maintains asset inventory which helps in keeping tracks of vulnerable assets and also managing a tidy asset inventory.

Read reviews

"Tenable VM: A Robust Tool for Efficient Vulnerability Management"

Excellent product for vulnerability management with an API that allows us to provide properly scoped access for many sub-units in a very complex, decentralized environment, and very good support.

Read reviews

"Tenable SC: A Robust and Comprehensive Vulnerability Management Tool"

Tenable SC meets all the requirements which are needed for Vulnerability Management starting from ease of operation to multiple dashboards to dedicated reports. It has helped for various executive reports needed for explaining Risk Posture and their business impact to Board/business leaders. The regular enhancement makes sure that the product remain competent and bug free.

Read reviews

"Robust, easy to use product for vulnerability detection"

Extremely good tool, which is easy to integrate with a myriad of technologies including cloud or on premise. Ensures good security and detects network vulnerabilities. Its also easy to setup

Read reviews

"GFI - It really Whips the Patches A**"

I have been using GFI Languard for over 5 years for all of the Patch Management for my environments

Read reviews

"Arctic Wolf provides top-tier cybersecurity monitoring 24 hours a day"

Arctic Wolf has become indispensable as a daily/weekly/monthly watchdog for our overall security posture. Like many organizations, we don't have the proper funding and training for enough of a cybersecurity presence to monitor and proactively handle everything associated with prevention of attacks and protection against all possible attack vectors. Arctic Wolf fills in a lot of gaps in the process of constant vigilance over a security landscape that is ever-changing and more and more dynamic every day.

Read reviews

"Address the growing concern of cybersecurity threats"

With secure elements is a comprehensive cyber security tool designed to identify, assess and manage vulnerabilities within an organizations IT infrastructure. The regular updates to the vulnerability database and threat intelligence fees keep us well informed about emerging risks.

Read reviews

"SecPod: A Reliable and Comprehensive CVEM tool"

Our overall experience with SecPod was great, starting with Agent's installation to manage various modules, everything went too smoothly. The success team and support team at SecPod was very helpful throughout, resolving the queries in no time and making our operations smooth. The team is frequently enquiring with us about our feedback and if there are any issues we are facing, this helps us to build a great relationship with our partners.

Read reviews

"Efficient and effective Vulnerability Management solution for Crowdstrike customers"

We were exploring various vulnerability management solutions and found that the Crowdstrike solution included more features that we could utilize. We were already using Crowdstrike for endpoint protection and we could leverage VMS abilities without having an extra agent - which was a bonus!

Read reviews

"VAPT analysis and Closure made easy with Holm Security."

Excellent Product for VAPT analysis on any of server platform also provide the solution for Closure.

Read reviews

"Protects business from possible threats, evaluates risks and reports immediately"

The security technology is proprietary to them and they perform detailed security assessments in case of possible vulnerabilities. They are also good in their remediation strategies.

Read reviews

"Vulnerability management on easy mode"

Overall makes achieving meaningful vulnerability management quite easy.

Read reviews

"I am satisfied with the solution, developed with a different vision from most competitors"

The vendor is very attentive to the needs and demands we have to manage toward our customers. The product we use and sell is RidgeBot and it is a solution that has enabled us to monitor the cybersecurity scenario of our customers. Unlinke other solutions it also allows us to provide very good reporting already addressing what is really the risk related to vulnerabilities.

Read reviews

"Vulnerability Management with Microsoft Defender"

Overall, it's been positive using Microsoft Defender Vulnerability Management. It provides a great centralized platform that enhances our visibility into vulnerabilities across our networks which lets us prioritize and address security risks more effectively.

Read reviews

"Cisco Vulnerability Management, A good tool for vulnerability management.I recommend it. "

I like the dashboard which is intuitive and the reports and configuration are helpful when it comes to being able to customize and set recipients and particular views. I like how it provides data you want to see, however, if you run a large enterprise and you don't have agents tagged correctly it can be a little bit hard to track items down.

Read reviews

"StorageGaurd secure our Infrastructure from cyber threat and provide vigilance "

StorageGurad provides an extra layer of security to our infrastructure by securing our business information and providing vigilance in case of any risk. It can easily detect any type of malware or virus and remove it from the system which helps in better decision-making in case of an outage.

Read reviews

"Harnessing Power of Visualization in Focusing on Critical Assets"

The extremely dedicated CSM team helps us get the most value out of our investment. The product is easy to use and allows us to focus on high risk topics. We were able to discover findings we have not been able to discover so far. This will help us in discussions with other departments to improve our overall security posture. The CSM also helped us to focus on the "quick-wins", which means we received valuable feedback after our first few calls with XM Cyber.

Read reviews

"Greenbone is an opensource, free to use and comprehensive solution."

It is a good and reliable open-source vulnerability scanning which identifies the security vulnerabilities in the network and system very intelligently.

Read reviews
Products 1 - 20