
DefectDojo is a commercial Vulnerability Assessment tool developed by DefectDojo. Security professionals most commonly compare it with . All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to DefectDojo, including their key features and shared capabilities.
Agentless cloud vulnerability management with unified context and prioritization
Automated vulnerability assessment and remediation platform
Vulnerability scanner for internal & external network security assessment
AI-driven vulnerability management platform with automated remediation
AI platform that finds, triages, and auto-remediates vulnerabilities end-to-end.
Runtime tool that identifies truly exploitable open-source vulns in production.
Periodically scans servers for open source SW vulnerabilities and license issues.
Integrated portal for open source vulnerability analysis and action plan mgmt.
Agentless cloud vulnerability management with unified context and prioritization
Vulnerability scanner for internal & external network security assessment
AI-driven vulnerability management platform with automated remediation
AI platform that finds, triages, and auto-remediates vulnerabilities end-to-end.
Runtime tool that identifies truly exploitable open-source vulns in production.
Periodically scans servers for open source SW vulnerabilities and license issues.
Integrated portal for open source vulnerability analysis and action plan mgmt.
Automated vulnerability management platform with deduplication and prioritization
AI agents investigate cloud vulnerabilities in context and automate remediation
Risk-based vulnerability management platform for scanning and prioritization
Continuous vulnerability assessment and network discovery via endpoint agents
Automates vulnerability prioritization and remediation workflows post-scanning.
AI-powered vulnerability assessment engine for threat prioritization
Risk-based vuln mgmt platform centralizing findings from multiple scanners
Vulnerability management platform for SDLC integration and risk mitigation
Cloud-native vulnerability management with runtime context and AI remediation
Vulnerability mgmt platform integrating scanner data with risk workflows
Continuous vulnerability detection and prioritization using CVE database
Risk-based vuln mgmt platform using ML to prioritize exploited CVEs
Managed vulnerability scanning and prioritization service with risk scoring
Vulnerability scanning appliance for IT infrastructure attack surface reduction
AI assistant that transforms OpenVAS scans into prioritized remediation plans
Endpoint vulnerability scanning and assessment for businesses and MSPs
Healthcare-focused vuln mgmt platform for medical device security & risk prioritization
Vulnerability mgmt solution that prioritizes vulnerabilities based on context
Network vulnerability scanning with human validation and risk-based scoring
Automated vulnerability mgmt platform with risk-based prioritization & SBOM
Multi-tenant vulnerability mgmt platform for MSPs with scanning & compliance
Cloud-based continuous IT risk assessment & vulnerability mgmt platform
Continuous vulnerability detection platform for live production environments
Vuln & exploit intelligence platform for prioritizing vulnerability response
Managed vulnerability assessment service with risk prioritization and reporting
Vulnerability risk intelligence for prioritizing exploitable vulnerabilities
Managed VM service for identifying, assessing & remediating IT vulnerabilities.
AI-driven vulnerability detection for hosts, containers, and firmware.
Automated OS & software patch management via lightweight endpoint agent.
VMaaS platform unifying cloud, endpoint & OT vuln scans with CVE prioritization.
Vulnerability & threat mgmt platform with managed remediation services.
Centralized VM platform for product security teams with SBOM and compliance support.
Vulnerability scanner for assessing networks, systems, and apps for security flaws.
Handheld hardware device for on-site network vulnerability scanning.
RMM-integrated network scanner for device discovery, inventory, and CVE detection.
AI agent that finds, exploits & verifies zero-day vulns with zero false positives.
OpenVAS is an open-source vulnerability scanner that provides extensive testing capabilities for identifying security weaknesses in networks and systems.
Assesses AWS accounts for subdomain hijacking via Route53/CloudFront
AI-powered CVE intelligence platform with exploit data, EPSS, and ATT&CK mappings.
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
Common questions security professionals ask when evaluating alternatives and competitors to DefectDojo.
The most popular alternatives to DefectDojo include Orca Cloud Vulnerability Management, RoboShadow, RoboShadow Vulnerability Scanner, Cogent, and Nullify. These Vulnerability Assessment tools offer similar capabilities and are frequently compared by security professionals evaluating their options.