Loading...
Vulnerability management tools for security scanning, penetration testing, bug bounty programs, and vulnerability assessment.
Browse 662 vulnerability management tools
Vulnerability scanning service for network and application-level assessments
Managed continuous threat exposure mgmt platform with expert-driven testing
CTEM platform for continuous threat exposure identification and mitigation
Vulnerability management platform for Mac and Windows with automated patching
Vulnerability threat intelligence platform with risk-based scoring and CVE/CWE data
Risk-based vuln mgmt platform prioritizing threats using contextual intel
Cloud-native patch management with risk-based prioritization and automation
Centralized management platform for Greenbone vulnerability management systems
AI assistant that transforms OpenVAS scans into prioritized remediation plans
Entry-level vulnerability management solution for small and medium businesses
Centralized dashboard for aggregating & visualizing OpenVAS scan data
Vulnerability scanning appliance for IT infrastructure attack surface reduction
Managed vulnerability scanning, prioritization, and patching service
Offensive security platform for attack surface discovery and risk management
Managed vulnerability scanning and prioritization service with risk scoring
Vulnerability assessment platform with phishing detection and data leak monitoring
Vulnerability scanning service with PCI ASV certification and asset discovery
Managed service for continuous vulnerability detection and response with AI
Managed vulnerability management service with continuous monitoring and remediation
Risk-based vuln mgmt platform with asset context & threat intelligence
Managed vulnerability assessment service for networks, endpoints, apps & cloud
Automated web vulnerability scanner for SQLi, XSS, and other web app flaws
AI-powered vuln & exposure mgmt platform with risk prioritization & automation
Autonomous CTEM platform for managing exposure risk with AI agents
662 tools across 5 specializations · 309 free, 353 commercial
Bug Bounty Platforms
Bug bounty platforms that connect organizations with security researchers for crowdsourced vulnerability discovery and responsible disclosure.
Exposure Management
Exposure management solutions for identifying, prioritizing, and remediating security exposures across the entire attack surface.
Penetration Testing
Penetration testing tools and frameworks for manual security testing, exploit development, and vulnerability validation.
Common questions about Vulnerability Management tools, selection guides, pricing, and comparisons.
Vulnerability scanning is automated, runs continuously, and identifies known CVEs and misconfigurations across your infrastructure at scale. Penetration testing is manual, performed periodically (quarterly or annually), and involves skilled testers attempting to exploit vulnerabilities, chain findings, and demonstrate real-world impact. Scanning finds what is vulnerable; pen testing proves what is exploitable.
Prioritize based on exploitability and business impact, not just CVSS score. Consider: is there a known exploit in the wild (CISA KEV catalog), is the asset internet-facing, what data does it hold, and can the vulnerability be chained with others. Risk-based vulnerability management tools combine these factors to rank vulnerabilities by actual risk to your organization.
Vulnerability management focuses on identifying and patching software vulnerabilities (CVEs). Exposure management takes a broader view, encompassing vulnerabilities, misconfigurations, identity weaknesses, and attack path analysis to understand and reduce your overall exposure to attacks. It asks "how could an attacker reach our critical assets?" rather than just "what CVEs do we have?"