Solution Categories
Community Directory
Recommended products for
Threat and Vulnerability Management
What is Threat and Vulnerability Management?
Vulnerability management is the perpetual loop of discovering, prioritizing, and fixing security weaknesses before attackers weaponize them. Accurate asset inventories and risk-based patching keep this treadmill both manageable and impactful.
Darktrace
Darktrace uses machine learning to detect and respond to cyber threats by analyzing network behavior. It continuously monitors for unusual activity to identify potential vulnerabilities and emerging risks in real time.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Nessus
Nessus identifies security vulnerabilities, misconfigurations, and compliance issues across various systems and devices. It supports customizable scanning templates and integrates with multiple platforms for streamlined vulnerability assessment.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Tanium XEM Core
Tanium XEM Core provides real-time visibility and control over endpoint vulnerabilities across an enterprise network. It integrates asset discovery with risk prioritization to support efficient remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Tripwire IP360
Tripwire IP360 identifies and assesses security vulnerabilities across networked assets. It provides detailed risk scoring and supports integration with other security tools for streamlined remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Qualys Vulnerability Management
Qualys Vulnerability Management identifies and assesses security weaknesses across IT assets. It integrates with cloud and on-premises environments to provide detailed vulnerability reports and prioritization based on risk.
Cost considerations
Functionality
Compatibility
User experience
Customer support
InsightVM
InsightVM provides real-time visibility into network vulnerabilities and risk exposure. It integrates with existing IT infrastructure to prioritize remediation based on threat context and asset criticality.
Cost considerations
Functionality
Compatibility
User experience
Customer support
IBM Security
IBM Security provides tools to identify, assess, and prioritize vulnerabilities across IT environments. It integrates with existing workflows to support continuous monitoring and remediation efforts.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Tenable.io
Tenable.io provides asset discovery, vulnerability assessment, and risk prioritization across IT environments. It integrates with cloud platforms and container technologies to support visibility and management of diverse infrastructure components.
Cost considerations
Functionality
Compatibility
User experience
Customer support
Cisco Vulnerability Management
Cisco Vulnerability Management identifies and prioritizes security risks across networks and endpoints. It integrates with Cisco security products to provide continuous visibility and automated remediation workflows.
Cost considerations
Functionality
Compatibility
User experience
Customer support

OpenVAS
OpenVAS is a tool for identifying security vulnerabilities in networked systems. It includes a regularly updated feed of Network Vulnerability Tests (NVTs) to detect potential security issues.
Cost considerations
Functionality
Compatibility
User experience
Customer support