>

>

Cisco Vulnerability Management

Logo

Cisco Vulnerability Management

Cisco Vulnerability Management

Cisco Vulnerability Management identifies and prioritizes security risks across networks and endpoints. It integrates with Cisco security products to provide continuous visibility and automated remediation workflows.

Cisco Vulnerability Management identifies and prioritizes security risks across networks and endpoints. It integrates with Cisco security products to provide continuous visibility and automated remediation workflows.

Cost considerations

Functionality

Compatibility

User experience

Customer support

Why these ratings?

Cyberse perspective

Solution details

Deployment

Cloud-native

Cloud-hosted

Subcategory

Asset Management

Attack Surface Management

Market segment

Small business

Enterprise

Midmarket

Cloud ecosystem partners

Amazon Web Services

Microsoft Azure Cloud

Google Cloud Platform

Product features

Risk scoring

Vulnerability scoring

IT Service Management (ITSM) integration

Automated remediation

Pricing

Free trial available

Target industry

Technology

Public sector

Industrials

Healthcare

Retail

Manufacturing

Financial services

Key features

API access

Platform solution

Scanning coverage

Network scanning

Host scanning

Application scanning

Integrations

Security automation

Endpoint security

Cloud security

Governance Risk and Compliance

Network security

Data security

We use the following criteria to evaluate this product:

Cost considerations

Licensing is per asset and only covers analytics, so organizations must still fund separate scanning tools. Optional modules for application or remediation insights add more line items and push the total higher than integrated suites. The higher per-asset spend and extra fees weaken the overall cost-value balance compared with peers.

Cost considerations

Licensing is per asset and only covers analytics, so organizations must still fund separate scanning tools. Optional modules for application or remediation insights add more line items and push the total higher than integrated suites. The higher per-asset spend and extra fees weaken the overall cost-value balance compared with peers.

Functionality

Cisco Vulnerability Management depends on external scanners for finding issues, so native discovery and authenticated coverage vary by integration. The product provides risk-based scores and opens remediation tickets in tools like ServiceNow or Jira, then checks that fixes are applied. Because it lacks built-in scanning but offers solid prioritization and workflow, overall functionality sits mid-range among vulnerability management tools.

Functionality

Cisco Vulnerability Management depends on external scanners for finding issues, so native discovery and authenticated coverage vary by integration. The product provides risk-based scores and opens remediation tickets in tools like ServiceNow or Jira, then checks that fixes are applied. Because it lacks built-in scanning but offers solid prioritization and workflow, overall functionality sits mid-range among vulnerability management tools.

Compatibility

Cisco Vulnerability Management offers API-based connectors for major clouds, container tools, CMDBs such as ServiceNow, and SIEMs like Splunk, with SAML SSO built in. Coverage spans most operating systems through data ingested from common scanners, yet a few edge environments still need custom scripts. This puts its integration reach above most peers, though not quite at the “works everywhere out of the box” level.

Compatibility

Cisco Vulnerability Management offers API-based connectors for major clouds, container tools, CMDBs such as ServiceNow, and SIEMs like Splunk, with SAML SSO built in. Coverage spans most operating systems through data ingested from common scanners, yet a few edge environments still need custom scripts. This puts its integration reach above most peers, though not quite at the “works everywhere out of the box” level.

User experience

Dashboards immediately surface the highest-risk issues and simple filters let teams drill into assets or exploitability with only a few clicks, so most users ramp up quickly. Creating customized reports or complex queries still takes some trial and error, which keeps the experience just shy of the very top tier.

User experience

Dashboards immediately surface the highest-risk issues and simple filters let teams drill into assets or exploitability with only a few clicks, so most users ramp up quickly. Creating customized reports or complex queries still takes some trial and error, which keeps the experience just shy of the very top tier.

Customer support

Cisco offers 24×7 TAC phone help plus detailed web guides, so users usually get same-day answers. Risk data for new CVEs is refreshed daily, meaning coverage arrives well inside a week. Only larger contracts receive a dedicated success manager, so support falls just short of the top tier.

Customer support

Cisco offers 24×7 TAC phone help plus detailed web guides, so users usually get same-day answers. Risk data for new CVEs is refreshed daily, meaning coverage arrives well inside a week. Only larger contracts receive a dedicated success manager, so support falls just short of the top tier.