Loading...

ThreatMapper is a free Vulnerability Assessment tool. Security professionals most commonly compare it with Orca Cloud Vulnerability Management. All 144 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to ThreatMapper, including their key features and shared capabilities.
Agentless cloud vulnerability management with unified context and prioritization
Vulnerability scanner for internal & external network security assessment
Automated vulnerability assessment and remediation platform
Automated vulnerability scanning for HPE NonStop systems
Vulnerability intelligence database with CVE analysis and prioritization
Cloud-native vulnerability management with runtime context and AI remediation
CVE database with 350K+ vulnerabilities, zero-day tracking, and AI severity
Continuous vulnerability detection and prioritization using CVE database
Agentless cloud vulnerability management with unified context and prioritization
Vulnerability scanner for internal & external network security assessment
Vulnerability intelligence database with CVE analysis and prioritization
Cloud-native vulnerability management with runtime context and AI remediation
CVE database with 350K+ vulnerabilities, zero-day tracking, and AI severity
Continuous vulnerability detection and prioritization using CVE database
Risk-based vuln mgmt platform using ML to prioritize exploited CVEs
Customizable vulnerability scanning platform for infrastructure and applications
Vulnerability threat intelligence platform with risk-based scoring and CVE/CWE data
Centralized vulnerability intelligence platform with CVE data and risk scoring
Vulnerability scanning service for networks, cloud, apps, and devices
Tool that immunizes Windows systems against critical vulnerabilities
Cloud-native vuln mgmt platform with automated patching & remediation
Continuous vulnerability scanning with asset discovery and real-time alerts
SBOM vulnerability mgmt platform for post-deployment threat detection
Continuous vulnerability detection platform for live production environments
Vuln & exploit intelligence platform for prioritizing vulnerability response
AI-driven vulnerability detection for hosts, containers, and firmware.
VM platform combining ASM, vuln scanning, and phishing simulation.
VMaaS platform unifying cloud, endpoint & OT vuln scans with CVE prioritization.
Centralized VM platform for product security teams with SBOM and compliance support.
Managed vuln scanning & remediation service covering enterprise IT environments.
Automated binary vulnerability analysis without source code for IT and OT/ICS.
Integrated portal for open source vulnerability analysis and action plan mgmt.
Vulnerability scanner for assessing networks, systems, and apps for security flaws.
RMM-integrated network scanner for device discovery, inventory, and CVE detection.
AI-powered CVE intelligence platform with exploit data, EPSS, and ATT&CK mappings.
CVE Ape is an open source tool that creates a local CVE database from the National Vulnerability Database for offline vulnerability searching by package name, vendor, or OS components.
Mana Security is a macOS-focused vulnerability management tool that continuously monitors 100+ applications for security vulnerabilities and tracks patching performance against community benchmarks.
The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.
All-in-one platform for vuln mgmt, red team ops, and attack surface mgmt
IT risk mgmt toolkit for network assessment, vuln scanning & compliance
Automated vulnerability management platform with deduplication and prioritization
VM solution with AI-driven prioritization and automated remediation workflows
On-premise vulnerability scanner with asset discovery and risk prioritization
AI agents investigate cloud vulnerabilities in context and automate remediation
Risk-based vulnerability management platform for scanning and prioritization
Human-driven vuln discovery & assessment with patch verification
Software updater that patches security flaws in Windows & third-party apps
Continuous vulnerability assessment and network discovery via endpoint agents
Agentless VM scanning for production environments to detect vulnerabilities
Automates vulnerability prioritization and remediation workflows post-scanning.
AI-powered vulnerability assessment engine for threat prioritization
Cloud-based vulnerability assessment tool for web application security
Automated vuln mgmt platform for discovery, prioritization & remediation
Risk-based vuln mgmt platform centralizing findings from multiple scanners
Vulnerability management platform for SDLC integration and risk mitigation
FPGA design analysis platform for vulnerability detection and reverse engineering
AI-driven tool that predicts software package vulnerabilities 90 days ahead
Automated vulnerability scanning and management tool for network security
Vulnerability mgmt platform integrating scanner data with risk workflows
Managed service for discovering, assessing, and hardening digital risks
Vulnerability scanning service using ethical hackers to identify weaknesses
Cloud-based vulnerability assessment and patch management platform
Managed service for vulnerability scanning, prioritization, and remediation
Automated vulnerability scanning platform for on-prem, cloud, and apps
Managed vulnerability assessment service for networks, endpoints, apps & cloud
Managed vulnerability management service with continuous monitoring and remediation
Vulnerability scanning service with PCI ASV certification and asset discovery
Vulnerability assessment platform with phishing detection and data leak monitoring
Managed vulnerability scanning and prioritization service with risk scoring
Managed vulnerability scanning, prioritization, and patching service
Vulnerability scanning appliance for IT infrastructure attack surface reduction
Centralized dashboard for aggregating & visualizing OpenVAS scan data
Entry-level vulnerability management solution for small and medium businesses
AI assistant that transforms OpenVAS scans into prioritized remediation plans
Centralized management platform for Greenbone vulnerability management systems
Vulnerability management platform for Mac and Windows with automated patching
Vulnerability scanning service for network and application-level assessments
Vulnerability mgmt platform for medical device manufacturers with FDA compliance
Risk-based vulnerability mgmt for networks & cloud with threat intel scoring
Endpoint vulnerability scanning and assessment for businesses and MSPs
Healthcare-focused vuln mgmt platform for medical device security & risk prioritization
Vulnerability mgmt solution that prioritizes vulnerabilities based on context
Automated patch management for OS and third-party apps across endpoints
End-to-end vulnerability management service with scanning and remediation
Network vulnerability scanning with human validation and risk-based scoring
Enterprise application security and vulnerability management platform
AI-based vulnerability assessment & remediation platform for enterprises
Automated vulnerability mgmt platform with risk-based prioritization & SBOM
VA & VM service for identifying and managing security vulnerabilities
WordPress vulnerability mitigation and security protection platform
Unified vuln mgmt platform aggregating data from multiple scanners
Proactive vulnerability alert & remediation service for Tanium platform users
Vulnerability and compliance assessment tool for endpoints and systems
Professional vulnerability assessment service using Qualys scanning engine
Full-stack vuln remediation suite with patch mgmt & patchless protection
Multi-tenant vulnerability mgmt platform for MSPs with scanning & compliance
Cloud-based continuous IT risk assessment & vulnerability mgmt platform
Free vulnerability assessment for unlimited endpoints with patching capabilities
Vulnerability prioritization platform for IoT, OT, and IoMT devices
Scan-less, agent-less vulnerability management with automated asset discovery
HIPAA-focused vulnerability management service for healthcare organizations
Vulnerability scanning & mgmt platform with CVSS/EPSS scoring & CIS benchmarks
Managed vulnerability scanning service for networks and applications
Vulnerability detection service for systems, applications, and networks
Managed vulnerability assessment service with risk prioritization and reporting
Vulnerability risk intelligence for prioritizing exploitable vulnerabilities
AI-driven vulnerability management platform with automated remediation
Firmware & software supply chain security platform for vuln & risk analysis.
Suite of VRM tools for vulnerability scanning, compliance, and risk mgmt.
Single-host VM vulnerability scanner for SMBs with web app & exploit mapping.
Comprehensive vuln risk mgmt platform with scanning, pentesting & compliance.
VM platform for uncovering, assessing, and mitigating org-wide security risks.
Managed vuln scanning & load testing service using Rapid7 Nexpose.
Managed vuln assessment & scanning services using NIST and OSSTMM frameworks.
Independent VA service covering network, web apps, and wireless scanning.
Managed VM service for identifying, assessing & remediating IT vulnerabilities.
Digital replicas of product firmware/software for continuous security analysis.
Managed network vulnerability scanning service using a proprietary hardware appliance.
Automated vuln assessment tool for web apps, networks & cloud infra.
Continuous IT vulnerability scanning platform with daily security updates.
Automated OS & software patch management via lightweight endpoint agent.
VM platform covering network scanning, web app security, and phishing simulation.
Next-Gen VM platform for vulnerability mgmt and attack surface management.
Vulnerability & threat mgmt platform with managed remediation services.
Managed DAST service scanning web apps and APIs for vulnerabilities.
AI platform that finds, triages, and auto-remediates vulnerabilities end-to-end.
Runtime tool that identifies truly exploitable open-source vulns in production.
Automated IoT device security assessment tool with fuzzing & vuln testing.
Managed VA service with daily scanning, consultant review & remediation guidance.
Automated endpoint & vulnerability management platform for IT/SecOps.
Network device vulnerability assessment and config compliance platform.
Periodically scans servers for open source SW vulnerabilities and license issues.
Handheld hardware device for on-site network vulnerability scanning.
OpenVAS is an open-source vulnerability scanner that provides extensive testing capabilities for identifying security weaknesses in networks and systems.
SecurityVulnerability.io simplifies the process of collecting, enriching, and presenting vulnerability information for both human and machine consumption.
Assesses AWS accounts for subdomain hijacking via Route53/CloudFront
Free AD, Entra ID, and Okta security assessment tool for vulnerability scanning
An open-source tool that automates the detection and analysis of DLL hijacking vulnerabilities in Windows applications, providing detailed reports and remediation guidance.
A tool that showcases the attack surface of a given Android device, highlighting potential vulnerabilities and security risks.
Check for known vulnerabilities in your Node.js installation.
Vulnerability scanner for Linux/FreeBSD, written in Go, agent-less, informs users of vulnerabilities related to the system and affected servers.
A tool that scans for accessibility tools backdoors via RDP
Automate the search for Exploits and Vulnerabilities in important databases.
A shell script-based Unix security auditing tool that generates scored compliance reports based on CIS frameworks and provides lockdown capabilities with rollback functionality.
MetaHub is an open-source vulnerability management tool that provides impact-contextual analysis of security findings in AWS environments through automated contextualization, ownership identification, and prioritization scoring.
A vulnerability assessment and management tool that uses patented technology to accurately identify vulnerabilities and prioritize them by risk.
A tool that uses NLP and ML to identify potential software vulnerabilities from git commit messages
A tool for scanning Adobe Experience Manager instances for potential security vulnerabilities
Common questions security professionals ask when evaluating alternatives and competitors to ThreatMapper.
The most popular alternatives to ThreatMapper include Orca Cloud Vulnerability Management, RoboShadow Vulnerability Scanner, RoboShadow, XYGATE Aegis Scan, and Miggo Predictive Vulnerability Database. These Vulnerability Assessment tools offer similar capabilities and are frequently compared by security professionals evaluating their options.