Cisco Vulnerability Management
Cisco Vulnerability Management
Updated August 20, 2025
Updated August 20, 2025
Cisco Vulnerability Management identifies and prioritizes security risks across networks and endpoints. It integrates with Cisco security products to provide continuous visibility and automated remediation workflows.
Cisco Vulnerability Management identifies and prioritizes security risks across networks and endpoints. It integrates with Cisco security products to provide continuous visibility and automated remediation workflows.
Asset Management
Attack Surface Management
Cost considerations
Cost considerations
Functionality
Functionality
Compatibility
Compatibility
User experience
User experience
Customer support
Customer support
Why these ratings?
Cyberse perspective
Cyberse perspective
Solution details
Target industry
Technology
Public sector
Industrials
Healthcare
Retail
Manufacturing
Financial services
Services support
In-house services
Managed services
Scanning coverage
Network scanning
Host scanning
Application scanning
Product features
Risk scoring
Vulnerability scoring
IT Service Management (ITSM) integration
Automated remediation
Pricing
Free trial available
Market segment
Small business
Enterprise
Midmarket
Key features
API access
Platform solution
Integrations
Security automation
Endpoint security
Cloud security
Governance Risk and Compliance
Network security
Data security
Deployment
Cloud-native
Cloud-hosted
Cloud ecosystem partners
Amazon Web Services
Microsoft Azure Cloud
Google Cloud Platform
Ratings
Cost considerations
Licensing is per asset and only covers analytics, so organizations must still fund separate scanning tools. Optional modules for application or remediation insights add more line items and push the total higher than integrated suites. The higher per-asset spend and extra fees weaken the overall cost-value balance compared with peers.
Cost considerations
Licensing is per asset and only covers analytics, so organizations must still fund separate scanning tools. Optional modules for application or remediation insights add more line items and push the total higher than integrated suites. The higher per-asset spend and extra fees weaken the overall cost-value balance compared with peers.
Scans count/year
Asset count
Functionality
Cisco Vulnerability Management depends on external scanners for finding issues, so native discovery and authenticated coverage vary by integration. The product provides risk-based scores and opens remediation tickets in tools like ServiceNow or Jira, then checks that fixes are applied. Because it lacks built-in scanning but offers solid prioritization and workflow, overall functionality sits mid-range among vulnerability management tools.
Functionality
Cisco Vulnerability Management depends on external scanners for finding issues, so native discovery and authenticated coverage vary by integration. The product provides risk-based scores and opens remediation tickets in tools like ServiceNow or Jira, then checks that fixes are applied. Because it lacks built-in scanning but offers solid prioritization and workflow, overall functionality sits mid-range among vulnerability management tools.
Compatibility
Cisco Vulnerability Management offers API-based connectors for major clouds, container tools, CMDBs such as ServiceNow, and SIEMs like Splunk, with SAML SSO built in. Coverage spans most operating systems through data ingested from common scanners, yet a few edge environments still need custom scripts. This puts its integration reach above most peers, though not quite at the “works everywhere out of the box” level.
Compatibility
Cisco Vulnerability Management offers API-based connectors for major clouds, container tools, CMDBs such as ServiceNow, and SIEMs like Splunk, with SAML SSO built in. Coverage spans most operating systems through data ingested from common scanners, yet a few edge environments still need custom scripts. This puts its integration reach above most peers, though not quite at the “works everywhere out of the box” level.
User experience
Dashboards immediately surface the highest-risk issues and simple filters let teams drill into assets or exploitability with only a few clicks, so most users ramp up quickly. Creating customized reports or complex queries still takes some trial and error, which keeps the experience just shy of the very top tier.
User experience
Dashboards immediately surface the highest-risk issues and simple filters let teams drill into assets or exploitability with only a few clicks, so most users ramp up quickly. Creating customized reports or complex queries still takes some trial and error, which keeps the experience just shy of the very top tier.
Customer support
Cisco offers 24×7 TAC phone help plus detailed web guides, so users usually get same-day answers. Risk data for new CVEs is refreshed daily, meaning coverage arrives well inside a week. Only larger contracts receive a dedicated success manager, so support falls just short of the top tier.
Customer support
Cisco offers 24×7 TAC phone help plus detailed web guides, so users usually get same-day answers. Risk data for new CVEs is refreshed daily, meaning coverage arrives well inside a week. Only larger contracts receive a dedicated success manager, so support falls just short of the top tier.
Explore similar solutions
Explore similar solutions
Explore other categories
Explore other categories
Cyberse provides free tools for cybersecurity buyers to assess needs, research solutions, and compare products.
Cyberse provides free tools for cybersecurity buyers to assess needs, research solutions, and compare products.
Subscribe


