Loading...
Vulnerability assessment tools for comprehensive security scanning, risk prioritization, and remediation guidance.
Browse 148 vulnerability assessment tools
Vuln & exploit intelligence platform for prioritizing vulnerability response
Vulnerability detection service for systems, applications, and networks
Continuous vulnerability detection platform for live production environments
SBOM vulnerability mgmt platform for post-deployment threat detection
Managed vulnerability scanning service for networks and applications
Vulnerability scanning & mgmt platform with CVSS/EPSS scoring & CIS benchmarks
HIPAA-focused vulnerability management service for healthcare organizations
Continuous vulnerability scanning with asset discovery and real-time alerts
Scan-less, agent-less vulnerability management with automated asset discovery
Vulnerability prioritization platform for IoT, OT, and IoMT devices
Free vulnerability assessment for unlimited endpoints with patching capabilities
Cloud-native vuln mgmt platform with automated patching & remediation
Tool that immunizes Windows systems against critical vulnerabilities
Cloud-based continuous IT risk assessment & vulnerability mgmt platform
Multi-tenant vulnerability mgmt platform for MSPs with scanning & compliance
Vulnerability scanning service for networks, cloud, apps, and devices
Full-stack vuln remediation suite with patch mgmt & patchless protection
Professional vulnerability assessment service using Qualys scanning engine
Vulnerability and compliance assessment tool for endpoints and systems
Proactive vulnerability alert & remediation service for Tanium platform users
Centralized vulnerability intelligence platform with CVE data and risk scoring
Unified vuln mgmt platform aggregating data from multiple scanners
WordPress vulnerability mitigation and security protection platform
VA & VM service for identifying and managing security vulnerabilities
Common questions about Vulnerability Assessment tools, selection guides, pricing, and comparisons.
Vulnerability assessment is the process of scanning systems to identify security weaknesses. Vulnerability management is the complete lifecycle: scanning, prioritizing based on risk, assigning remediation to teams, tracking fix timelines, verifying remediation, and reporting on program metrics. Assessment is one step; management is the ongoing program that ensures findings actually get fixed.