15 years helping South African businesses
choose better software

Vulnerability Management Software

Vulnerability Management software helps predict, identify, and fix potential corporate cybersecurity breaches.

Featured software

Most reviewed software

Explore the most reviewed products by our users on the Vulnerability Management Software

Unified Vulnerability Management. Remotely & automatically mitigate cyber threats in your environment - with or without security patch. Learn more about vRx
Remotely & automatically mitigate threats in your digital environment. vRx is a consolidated cloud-based vulnerability management platform that efficiently reduce your organizational cyber risk. Learn more about vRx

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times. Learn more about Pentera
Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations Learn more about Pentera

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
OX Security provides full visibility and end-to-end traceability over your entire software supply chain from code to cloud. Learn more about OX Security
OX Security provides full visibility and end-to-end traceability over your software supply chain, from code to cloud. OX helps minimize the attack surface by automatically blocking vulnerabilities introduced into your pipeline early in the SDLC, enabling DevSecOps to remediate risks based on contextualized prioritization - from a single pane of glass. Learn more about OX Security

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
An automated patch management tool for Windows, Linux & MacOS that helps you manage patches and strengthen your security. Learn more about Heimdal Patch & Asset Management
Automated patch and asset management that enables you to deploy and update any Microsoft, Linux, MacOS, 3rd party and proprietary software, from anywhere in the world and according to any schedule, with a full CVE/CVSS audit trail and flawless data compliance. Deploy updates, patches, and legacy fixes on the go, conduct inventory reports, force-update machines, review versioning, and secure your assets against all threats. Enjoy low bandwidth consumption and fast distribution through local P2P. Learn more about Heimdal Patch & Asset Management

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Learn more about ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Rencore Governance gives you maximum flexibility and efficiency in your governance approach for the Microsoft cloud. Learn more about Rencore Governance
Rencore Governance provides you with maximum flexibility and efficiency in your governance approach for Microsoft 365, Microsoft Teams, SharePoint, OneDrive, Azure AD, Exchange, Viva Engage, Loop and Power Platform. Monitor end-user activity, discover deviations from your governance plan and automate fixing. Learn more about Rencore Governance

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Vulnerability Management that facilitates collaboration between Security Analysts, Management and Asset Owners and risk prioritization. Learn more about Centraleyezer
Integrates and correlates vulnerability scanners data and multiple exploit feeds combined with business and IT factors and to prioritize cyber security risks. Helps CISO, Red Teams and Vulnerability Assessment Teams reduce time-to-fix, prioritize and report risks. Used by Governments, Military, Banking, Finance, and E-Commerce companies Learn more about Centraleyezer

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Cloud-based suite of cybersecurity solutions that help businesses identify, analyze and remediate threats on a unified platform.
Malwarebytes for Business is a cybersecurity platform that protects laptops, servers, and mobile devices against threats. The endpoint security portfolio combines layers of protection and threat intelligence to secure organizations from threats, including ransomware, malware, viruses, and other attacks. Learn more about Malwarebytes for Business

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
tl;dr — PDQ Deploy and Inventory makes device management simple, secure, and pretty damn quick.
PDQ Deploy & Inventory allow you to automate patch management. Use PDQ Inventory to scan, collect, and organize your devices, then use PDQ Deploy to set a preferred schedule for deployment. Once the deployment has been scheduled, PDQ will automatically and silently apply updates without inconveniencing end users. Learn more about PDQ Deploy & Inventory

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
DNS web content & security filter for business that blocks malware, ransomware and phishing + provides advanced web content control.
WebTitan is a DNS Based Web content filter and Web security layer that blocks cyber attacks, malware, ransomware and malicious phishing as well as providing granular web content control. WebTitan DNS filtering filters over 2 billion DNS requests every day and identifies 300,000 malware iterations a day. Our intelligent AI driven real time content categorization engine combines industry leading anti-virus and cloud based architecture. Try a free Trial of WebTitan today, full support included. Learn more about WebTitan

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Improve your security posture from day one with NinjaOne.
NinjaOne helps IT teams identify and remediate vulnerabilities via endpoint monitoring, patch management, and device configuration hardening. Quickly identify device and application misconfigurations and implement necessary corrective actions at scale via custom policies or scripts. Leverage fast, fully automated patching for Windows, macOS, and Linux operating systems, as well as numerous third-party applications to minimize potential exposure. Learn more about NinjaOne

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works.
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works. With integrated real-time vulnerability discovery and automated remediation for both third-party software and OS, peer-to-peer patch distribution, and IT ecosystem integrations, it ensures continuous patch compliance and reduces security and ransomware risks – all while lowering costs. Action1 is certified for SOC 2/ISO 27001 and is trusted by thousands of enterprises managing millions of endpoints globally. Action1 was founded by cybersecurity veterans Alex Vovk and Mike Walters, who previously founded Netwrix, which was acquired by TA Associates. Learn more about Action1

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Learn more about Nessus

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Phoenix Security (AppSec Phoenix) next-gen Vulnerability & Posture management correlating contextualizing software in cloud
Vulnerability Management: we help organizations get in control of their vulnerabilities regardless of the source. We cover - Infrastructure (Container, Cloud, Server) - Application Security (SAST, DAST, SCA) Pentesting/Red Team Consolidation: Pentest Results, Red Team, Burpsuite Results As a cross-domain Vulnerability management solution, We help scaling security and 10X devsecops professionals We help engineer focus on what's matter most We empower executives to set risk-based Learn more about Phoenix Security

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Remediate discovered vulnerabilities and ensure proper system configurations with automated cyber hygiene from Automox.
Streamline vulnerability management by automating custom cyber hygiene tasks and defining policies that enforce system compliance across Windows, macOS, and Linux systems. Define policies that enforce system compliance with the latest OS and software updates, and configuration controls. Learn more about Automox

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Tech-enabled website and vulnerability management service that helps businesses manage server health checks, WordPress staging and more
Tech-enabled website and vulnerability management service that helps businesses manage server health checks, WordPress staging and more. Learn more about SiteGround

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time.
Built on a foundation of free and open, Elasticsearch, Logstash, Kibana, and Beats pave the way for diverse use cases that start with logging and span as far as your imagination takes you. Elastic features like machine learning, security, and reporting compound that value — and since they’re made for Elastic, you'll only find them from us. Reliably and securely take data from any source, in any format, then search, analyze, and visualize it in real time. Learn more about Elastic Stack

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
System Mechanic Ultimate Defense is designed to provide a complete solution for all PC optimization needs.
System Mechanic Ultimate Defense provides PC performance optimization, system cleaning and protection against malicious attacks. This program helps prevent PC crashes, freezes and poor performance with two simple steps:1. System Mechanic cleans up junk files and shortcuts from your hard drive to free up space. System Mechanic removes registry errors that slow down your PC. Learn more about System Mechanic Ultimate Defense

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Syxsense delivers comprehensive vulnerability management, including security configuration management.
Syxsense delivers comprehensive vulnerability management, including security configuration management. Syxsense detects OS and third-party software and security configuration vulnerabilities, such as open ports, disabled firewalls, insecure passwords, and more. With Syxsense, you can safeguard your systems with centralized patch updated and security risk detection and resolution through a single agent. Learn more about Syxsense

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Within minutes, Orca's agentless platform detects vulnerabilities across the cloud and prioritizes your riskiest vulnerabilities.
Orca offers industry-leading agentless vulnerability management across your entire cloud infrastructure and cloud native applications. With comprehensive coverage, security teams can partner across the organization to prioritize the most critical risks and respond to new vulnerabilities in a timely and effective manner. Learn more about Orca Security

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Cohesity is a leader in AI-powered data security and management, protecting the world’s most critical data workloads.
Cohesity is a leader in AI-powered data security and management. Cohesity makes it easy to secure, protect, manage, and get value from data—across the data center, edge, and cloud. Cohesity helps organizations defend against cybersecurity threats with comprehensive data security and management capabilities, including immutable backup snapshots, AI-based threat detection, monitoring for malicious behavior, and rapid recovery at scale. Cohesity solutions can be delivered as a service, self-managed, or provided by a Cohesity-powered partner. Cohesity is headquartered in San Jose, CA and is trusted by the world’s largest enterprises, including six of the Fortune 10 and 42 of the Fortune 100. Learn more about Cohesity

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
Data management and backup solution that helps businesses manage data across cloud environments using automated protection policies.
Rubrik is a backup and recovery solution best suited for midsized to enterprise businesses (500+ employees). Rubrik delivers instant application availability to hybrid cloud enterprises for recovery, search, cloud, and development. By using the market-leading Cloud Data Management platform, customers mobilize applications, automate protection policies, recover from Ransomware, search and analyze application data at scale on one platform. From days to seconds. Learn more about Rubrik

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
We make it easy to secure your cloud transformation. Get fast, secure, and direct access to apps without appliances.
Built in the cloud, The Zscaler Zero Trust Exchange is an integrated platform of services that secures all user-to-app, app-to-app, and machine-to-machine communications—over any network and any location. Learn more about Zscaler

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management
runZero provides asset inventory and network visibility for security and IT teams.
runZero provides asset inventory and network visibility for security and IT. Discover managed and unmanaged devices, on-premises and cloud assets, IT and OT infrastructure, endpoints at work and at home. runZero's secret sauce is its proprietary unauthenticated scanner that gathers more details than other solutions. Augment the inventory with integrations for MDMs, EDRs, cloud service providers, and virtual environments. runZero integrates well with SIEMs & CMDBs and deploys in minutes. Learn more about runZero

Features

  • Vulnerability Assessment
  • Risk Management
  • Asset Discovery
  • Patch Management