
ZAST.AI is a commercial Vulnerability Assessment tool developed by ZAST.AI. Security professionals most commonly compare it with Orca Cloud Vulnerability Management. All 48 alternatives are matched by shared capabilities, tags, and NIST CSF 2.0 coverage.
A closer look at the 8 most relevant alternatives and competitors to ZAST.AI, including their key features and shared capabilities.
Agentless cloud vulnerability management with unified context and prioritization
Vulnerability scanner for internal & external network security assessment
Automated vulnerability assessment and remediation platform
AI-powered CVE intelligence platform with exploit data, EPSS, and ATT&CK mappings.
Shares 3 capabilities with ZAST.AI: Vulnerability Research, CVE, Exploit Development
The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.
Shares 3 capabilities with ZAST.AI: CVE, Security Research, Vulnerability
Vulnerability intelligence database with CVE analysis and prioritization
CVE database with 350K+ vulnerabilities, zero-day tracking, and AI severity
Tool that immunizes Windows systems against critical vulnerabilities
Agentless cloud vulnerability management with unified context and prioritization
Vulnerability scanner for internal & external network security assessment
AI-powered CVE intelligence platform with exploit data, EPSS, and ATT&CK mappings.
The CVE Program catalogs publicly disclosed cybersecurity vulnerabilities.
Vulnerability intelligence database with CVE analysis and prioritization
CVE database with 350K+ vulnerabilities, zero-day tracking, and AI severity
Tool that immunizes Windows systems against critical vulnerabilities
Vuln & exploit intelligence platform for prioritizing vulnerability response
Integrated portal for open source vulnerability analysis and action plan mgmt.
Vulnerability scanner for assessing networks, systems, and apps for security flaws.
RMM-integrated network scanner for device discovery, inventory, and CVE detection.
Software updater that patches security flaws in Windows & third-party apps
Continuous vulnerability detection and prioritization using CVE database
Risk-based vuln mgmt platform using ML to prioritize exploited CVEs
Customizable vulnerability scanning platform for infrastructure and applications
Vulnerability threat intelligence platform with risk-based scoring and CVE/CWE data
Centralized vulnerability intelligence platform with CVE data and risk scoring
Proactive vulnerability alert & remediation service for Tanium platform users
Vulnerability scanning service for networks, cloud, apps, and devices
Continuous vulnerability scanning with asset discovery and real-time alerts
Continuous vulnerability detection platform for live production environments
AI-driven vulnerability detection for hosts, containers, and firmware.
Automated OS & software patch management via lightweight endpoint agent.
VM platform combining ASM, vuln scanning, and phishing simulation.
VMaaS platform unifying cloud, endpoint & OT vuln scans with CVE prioritization.
Centralized VM platform for product security teams with SBOM and compliance support.
Managed vuln scanning & remediation service covering enterprise IT environments.
Automated binary vulnerability analysis without source code for IT and OT/ICS.
Periodically scans servers for open source SW vulnerabilities and license issues.
Handheld hardware device for on-site network vulnerability scanning.
Open-source vuln management platform with automated triage and ASPM.
CVE Ape is an open source tool that creates a local CVE database from the National Vulnerability Database for offline vulnerability searching by package name, vendor, or OS components.
A runtime threat management and attack path enumeration tool for cloud-native environments
Mana Security is a macOS-focused vulnerability management tool that continuously monitors 100+ applications for security vulnerabilities and tracks patching performance against community benchmarks.
All-in-one platform for vuln mgmt, red team ops, and attack surface mgmt
IT risk mgmt toolkit for network assessment, vuln scanning & compliance
Automated vulnerability management platform with deduplication and prioritization
VM solution with AI-driven prioritization and automated remediation workflows
On-premise vulnerability scanner with asset discovery and risk prioritization
AI agents investigate cloud vulnerabilities in context and automate remediation
Risk-based vulnerability management platform for scanning and prioritization
Human-driven vuln discovery & assessment with patch verification
Continuous vulnerability assessment and network discovery via endpoint agents
Agentless VM scanning for production environments to detect vulnerabilities
Automates vulnerability prioritization and remediation workflows post-scanning.
AI-powered vulnerability assessment engine for threat prioritization
Common questions security professionals ask when evaluating alternatives and competitors to ZAST.AI.
The most popular alternatives to ZAST.AI include Orca Cloud Vulnerability Management, RoboShadow Vulnerability Scanner, RoboShadow, CVE Tools, and CVE. These Vulnerability Assessment tools offer similar capabilities and are frequently compared by security professionals evaluating their options.