G2 Crowd gives a real-time look at how dreamforce sponsors and exhibitioners stack up.

Best Vulnerability Management Software

Vulnerability management software performs cyclical monitoring tasks to identify, diagnose, and remedy network threats such as hackers, viruses, or malware. Businesses will use vulnerability management tools to constantly test their network’s security and identify threats. IT managers and administrators use vulnerability management to automate tests and monitoring tasks required to maintain a secure network. Once a threat is detected, vulnerability management software will either alert administrators, remedy issues automatically, or install a patch to alter security policies. Vulnerability management products share many features with data security, network security, and web security tools. But vulnerability management tools are focused solely on the identification and management of network threats.

To qualify for inclusion in the Vulnerability Management category, a product must:

  • Automate cyclical threat monitoring tasks
  • Test threats and identify vulnerabilities
  • Alert administrators of threats or risks
  • Provide tools to remedy network vulnerabilities
  • Allow administrators to alter security requirements

Vulnerability Management Software Grid® Overview

The best Vulnerability Management Software products are determined by customer satisfaction (based on user reviews) and market presence (based on products’ scale, focus, and influence) and placed into four categories on the Grid®:
G2 Crowd Grid® for Vulnerability Management
Leaders
High Performers
Contenders
Niche
Market Presence
Satisfaction
Compare Vulnerability Management Software
    Results: 121

    Filters
    Star Rating

    Vulnerability Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.


    Complete, no-hassle protection against malware, hacking, blacklisting and more.


    Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and reduces deployment time so that users can go from installation to first insight in minutes for the fastest threat detection. Unlike traditional security point technologies, AlienVault Unified Security Management does the following: - Unifies essential security controls into a single all-in-one security monitoring solution - Monitors your cloud, hybrid cloud, and on-premises infrastructure - Delivers continuous threat intelligence to keep you aware of threats as they emerge and change - Provides comprehensive threat detection and actionable incident response directives - Deploys quickly, easily, and with minimal effort - Reduces TCO over traditional security solutions


    Qualys' integrated approach to IT security and compliance enables organizations of all sizes to successfully achieve both vulnerability management and policy compliance initiatives cohesively. Our solutions empower various roles within the organization to meet your unique requirements. Built on top of Qualys’ Infrastructure and Core Services, the Qualys Cloud Suite incorporates the following applications, all of which are delivered via the cloud: • AssetView • Vulnerability Management • Continuous Monitoring • ThreatPROTECT • Policy Compliance • Security Assessment Questionnaire • PCI Compliance • Web Application Scanning • Web Application Firewall • Malware Detection


    Finds and destroys spyware, malware, adware and other malicious software


    Going beyond malware protection, F-Secure provides end-point protection and security management solutions. Developed in Europe for businesses around the globe.



    SolarWinds Patch Manager integrates with WSUS and Microsoft update agent, and automatically updates Windows patches based on custom schedules. In addition, you can create different patching schedules for different business groups within the organization per custom requirements.


    Cyberoam Unified Threat Management appliances, available as hardware and virtual appliances, offer comprehensive security to organizations.


    Log & Event Manager (LEM) is an ACTIVE monitoring SIEM solution that automatically detects, alerts and responds to suspicious behavior on multi-vendor network devices, servers, workstations and applications. LEM comes as a downloadable virtual appliance for quick deployment, and enables threat intelligence and real-time event correlations right out-of-the-box enabling faster response to cyber-attacks.


    Acunetix leads the market in automatic web security testing technology that comprehensively scans and audits complex, authenticated, HTML5 and JavaScript-heavy websites among others. Used by many Government, Military, Educational, Telecommunications, Banking, Finance, and E-Commerce sectors, including many Fortune 500 companies, Acunetix offers cost-effective entry into the web scanning market with a simple, scalable, and high availability solution, without compromising quality. Acunetix can report on a wide range of web vulnerabilities, including SQLi, XSS and provides the only technology on the market that can automatically detect out-of-band vulnerabilities. Acunetix also includes integrated vulnerability management features to extend the enterprise’s ability to comprehensively manage, prioritise and control vulnerability threats – ordered by business criticality.


    Atera It is the only All-in-One SaaS Based software for Managed Service Providers (MSPs), combining remote monitoring and management (RMM), professional services automation (PSA) and remote control & support.


    REVE Antivirus is an IT Security software for home users and enterprises that provides protection from virus, spyware and other malware providing complete digital security it has anti-rootkit, Anti-spam, Data Theft Protection and Parental Control with Live notification.



    Tripwire is a provider of advanced threat, security and compliance solutions to confidently detect, prevent and respond to cybersecurity threats


    SiteLock, the global leader in website security solutions, is the only provider to offer complete, cloud-based website protection. Its 360-degree monitoring detects and fixes threats, prevents future attacks, accelerates website performance, and meets PCI compliance standards for businesses of all sizes. Founded in 2008, the company protects over 12 million ​websites worldwide. For more information, please visit sitelock.com.

    SiteLock Reviews

    Alert Logic Threat Manager with ActiveWatch is a cloud-based managed intrusion detection and vulnerability assessment solution.


    Managed Workplace is a complete remote monitoring and network management platform with powerful, integrated security tools and services. With Managed Workplace, service providers can quickly assess vulnerabilities, secure weak points, monitor anomalies, and seamlessly recover data in the event of an attack — all from a single dashboard. Managed Workplace brings a cost-effective, multi-tenant security lens to remote monitoring management — enabling MSPs to grow their business, differentiate their services, and build customer loyalty.


    NNT Change Tracker Generation 7 uses either an agent-based or agentless architecture – the choice is yours. After initial discovery, NNT-Change Tracker scans your devices and compares them to a standard policy. The policy applied will either be user defined or based on an industry standard such as the Center for Internet Security (CIS). Policies can be automatically assigned based on the device type or priority via a centrally managed console. NNT analyses every configurable component within your IT Estate and allows you to define a ‘Known, Good, Secure and Compliant State’ for all of your in scope systems. Once IT systems are rendered ‘Provably Secure, Compliant & Malware Free’, NNT Change Tracker monitors for any deviations to both policy and state. Changes are intelligently categorized as either planned or unplanned and automated threat intelligence feeds provide ultimate reassurance that changes are acceptable and malware free. NNT-Change Tracker is able to fully automate change approval for you, using our unique intelligent change control knowledge base and whitelist. And now you can use the NNT FAST™ (File Approved-Safe technology) Cloud to do just this, in real-time. NNT Change Tracker utilizes a unique change control system known as ‘Closed Loop Intelligent Change Control’. This ensures that what actually changed, matches the expected approved change profile. NNT Change Tracker learns over time, which changes within your environment are normal and which are abnormal and is able to apply threat-based logic to the automation of change approvals. The result is a massive reduction in false positives making the process of both ‘stopping and spotting’ a breach vastly more straightforward. Any configuration drift can also be automatically remediated using the inbuilt remediation kit leveraging CIS or any other policy standard. With NNT’s real-time capabilities, unlike traditional scanning or exclusively agentless technologies, potential breaches to systems or policies are spotted immediately.


    Kerio helps businesses to connect, communicate, and collaborate securely.


    Appknox is one of the enterprise level security assessment product that helps businesses and enterprises to detect, manage and fix security issues. Its been used by some of the top enterprises to secure more than 500 mobile apps on regular basis. Appknox is listed in one of the Gartner's top mobile app security testing vendors list. Working with more than 100 organizations globally Appknox has been focusing on niche area of mobile app security.


    Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.


    The Most Trusted Hacker-Powered Security Platform


    Hexadite Automated Incident Response Solution is a software that remediates threats and compresses weeks of work into minutes, it optimizes overtaxed security resources for increased productivity, reduced costs and stronger overall security.


    Third Party Patch and Vulnerability Management


    SolarWinds Risk Intelligence makes it concrete by assigning value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle.


    Sophisticated, targeted attacks can take weeks, months or longer to discover and resolve. Incident response teams need tools that quickly uncover the full source and scope of an attack to reduce time-to-resolution, mitigate ongoing risk and further fortify the network. Like a security camera for the network, Blue Coat Security Analytics delivers full network security visibility, advanced network forensics, anomaly detection and real-time content inspection for all network activity. This effectively arms security and incident response teams to identify and detect advanced malware crossing the network and contain zero-day and advanced targeted attacks. A comprehensive record of all network activity lets you conduct swift forensic investigations, perform proactive incident response and resolve breaches in a fraction of the time.


    Automoxs cloud-based solution simplifies patching and configuration management across Windows, Linux, Mac OS X, and 3rd party software. Automox provides IT managers and sysadmins with a patching system of record to track, control, and manage their patching process, providing greater security, improved productivity, and significant time savings. Automox is designed to complement your environment, whether you need a new patching solution or want to improve your existing patch workflow.


    The Predictive Abuse-Prevention Solution for Email Service Providers BlackBox is the world's most comprehensive resource for finding potentially problematic email addresses, allowing ESPs to preemptively score the quality of their senders' lists and manage senders more effectively.


    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response


    Insignary Clarity enables proactive scanning of embedded firmware or any binaries for known, preventable security vulnerabilities, and also identifies potential license compliance issues. Clarity uses unique fingerprinting technology, which works on the binary without the source code or reverse engineering, making it simple for companies to take proper, preventive action before the deployment of their products.


    Ekran System helps companies of any size to build their strategies of mitigating user-based security risks. It is a universal user activity monitoring tool for corporate servers and desktops. Per-session indexed video records is the core format.


    IBM i2 Enterprise Insight Analysis helps your organization turn overwhelming and disparate data into actionable insight and intelligence, in near real time. From national security and defense, to cyber and enterprise-wide threats, the solution helps you develop a comprehensive understanding of your threat landscape to identify vulnerabilities and disrupt threats.


    DashO is a Java and Android Obfuscator plus much more. It provides enterprise-grade app hardening and shielding, greatly reducing the risk of intellectual property theft, data theft, piracy, and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering, anti-rooted device solution provides protection for applications all around the world.


    ManageEngine Patch Manager scans endpoints to detect missing patches, tests patches before deployment to mitigate security risks automates patch deployment to OS and 3rd party applications, audits and reports for better visibility and control.


    Dotfuscator is a .NET Obfuscator & much more. It provides enterprise-grade app protection, greatly reducing the risk of piracy, intellectual property theft and tampering. Our layered obfuscation, encryption, watermarking, auto-expiry, anti-debug, anti-tampering and alerting and defense technology provides protection for hundreds of thousands of applications around the world.


    OUTSCAN™ is an automated vulnerability management solution that scans and secures external networks, allowing companies to protect sensitive data. It analyzes perimeters, detects vulnerabilities, notifies organizations and gives remediation solutions to prevent cybercriminals from penetrating their networks. OUTSCAN™ can fit any size organizations. It is easily deployable as a SaaS solution, but Outpost24 security experts can implement it if needed. Finally, the customer support is available 24/7 to answer every questions and help organizations managing their vulnerabilities and securing their external networks. Know more > https://outpost24.com/external-network-security



    Everyone uses the internet, both the good guys and bad guys. RiskIQ catalogs, maps, and enriches the structure of the internet to let you take charge of your digital presence and combat threats to your organization. Our four key products that make up our Digital Threat Management suite include RiskIQ Digital Footprint, External Threats, PassiveTotal, and Security Intelligence Services.


    Micro Focus ZENworks Patch Management (formerly Novell ZENworks Patch Management) is an automated patch management solution that retrieves and deploys the right patches to the right machines at the right times.


    Website Threat Inspector (WTI) utilizes data, white hat penetration testing, and machine learning to provide an all-in-one security solution for domains and other online assets. WTI detects web vulnerabilities, illicit content, webpage defacement and backdoors to prevent possible financial loss caused by damage to your brand reputation


    ARCON's Secure Compliance Management is a risk, security and Information Management tool used for automated risk assessment and analysis.


    AVDS is a complete network scanning solution available in a broad product line. AVDS was designed for continent spanning networks with tens of thousands of IPs, but that same, powerful scanning engine is available in an entry level version for small networks run by a single administrator. It is also available as a hosted solution for the scanning of one to one thousand external IPs or web sites.


    Black Duck OpsSight helps you prevent known open source vulnerabilities from being deployed into production environments.


    Validate the security posture of your networks with real applications and a complete range of threat vectors


    bugScout is a next-gen SAST platform for detecting vulnerabilities in application and website source codes, designed by ethical hackers and cybersecurity analysts coming out of Deloitte’s European cyberthreat SOC competency center. Today, source code security audits are snapshots that define the status at a point in time and deliver reports that are already out of date by the time they are finished because the development process is continuous. With its fast performance and scalability, bugScout enables continuous source code analysis. Security audits can keep pace with the speed of the development process, and role-based reports facilitate communications between security analysts and developers to help identify vulnerabilities, pinpoint the causes and remediate the problems.


    Order, configure and deploy your Canaries throughout your network. Then you wait. Your Canaries run in the background, waiting for intruders.


    CayenneApps SWOT analysis allows users to create the most comprehensive analysis of strengths, weaknesses, opportunities and threats. Users can build up strategy, and turn the most promising ideas into workable plans.


    Centraleyezer is a centralized view of your company security state with central dashboard and many custom reports.


    Automatically vet and validate firmware images for vulnerabilities in under 30 minutes. No source code required.


    Cobalt's Pen Testing as a Service (PTaaS) Platform transforms yesterday’s broken pen test model into a data-driven vulnerability management engine. Fueled by our global talent pool of certified freelancers, Cobalt's crowdsourced SaaS pen test platform delivers actionable results that empower agile teams to pinpoint, track, and remediate software vulnerabilities. Hundreds of organizations now benefit from high quality pen test findings, faster remediation times, and higher ROI for their pen test budget.


    Code Dx’s automated application vulnerability correlation shaves weeks off that process so you can get right to fixing your code. Its vulnerability management lets you quickly prioritize vulnerabilities (to fix the most important ones first), track progress of their remediation, and observe how your code's security changes over time.


    ConnectWise Automate third party patch management allows you to audit, patch, document, and even bill for third party application updates. All third party patch definitions are deployed following best practices, with automatic daily downloads ensuring you always patch to the latest version. Administrative time is significantly reduced so your technicians can focus their attention elsewhere.


    Continuity Engine ("CE") is a business continuity software that protects your most mission-critical applications with a goal of zero downtime. Beyond HA or replication, CE takes a proactive approach with true continuous data protection. CE delivers near-zero recovery times by monitoring the health of your applications and instantly failing over if a threat is detected. Simply put, we can help you prepare for and protect your applications, servers, and data from disaster and unplanned outages.


    ForeScout CounterACT is a physical or virtual security solution that dynamically identifies and evaluates physical and virtual network infrastructure, devices and applications the instant they connect to your network.


    Cryptosense provides state-of-the-art analysis software to help businesses eliminate the vulnerabilities caused by insecure use of cryptography in their applications and infrastructure.


    CyberInt developed the CybeReadiness Suite to enable CISOs and senior executives to continuously measure and monitor their organization’s cyber readiness. The suite simulates complex attack scenarios targeting your organization, all from the perspective of an attacker, validating your defense's efficiency in the face of current and emerging cyber threats.


    Cybergovernance Maturity Oversight Model (CMOM) is a SaaS platform that collects data on cybersecurity controls within an organization to generate information needed for directors and executive management to identify defensive weak spots, assign responsibility to managers, encourage inter-departmental collaboration and demonstrate active and evolving cybersecurity maturity.


    DarkMatter's Cyber Network Defence division provides sophisticated active defence solutions, including assessments, penetration testing, threat hunting, and incident readiness and response services to help organisations unify and strengthen their security programmes.


    Wolters Kluwer’s ELM Solutions Cybersecurity Risk Assessment application is designed to help corporate legal departments manage IT security risk across their law firms and other legal service providers.


    Cybowall combines multiple cybersecurity tools and capabilities in one solution - securing networks of all sizes and providing unified defense against a continuously evolving threat landscape.


    Cymulate comprehensively identifies the security gaps in your infrastructure and provides actionable insights for proper remediation. Run safely from the internet, our battery of simulated attacks causes no interruption to your operation or business productivity.


    DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with your real information technology resources.


    Digital Defense is a cloud-based network & information security that helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence to reduce risk and keep information, intellectual property and reputations secure.


    edgescan delivers a unique service combining fullstack vulnerability management, asset profiling, alerting and risk metrics.


    Originally developed for the federal government to help the FBI screen flight school applicants, Endera helps enterprise security departments detect and reduce insider risk and prevent potential workplace fraud, theft and violence in regulated industries such as transportation, healthcare, finance and infrastructure.


    Trend Micro Endpoint Encryption encrypts data on a wide range of devices, both PCs and Macs, laptops and desktops, USB drives, and other removable media. This solution combines enterprise-wide full disk, file/folder, and removable media encryption to prevent unauthorized access and use of private information.


    FireMon is the No.1 Intelligent Security Management solution provider, combining advanced automation and analysis to deliver next-generation security intelligence to enterprise organizations, government agencies and managed security providers. The FireMon product suite enables network security and operations teams to more effectively manage their security infrastructure. Security Manager FireMon Security Manager provides continuous visibility into and control over network security devices and policies in large enterprise environments. Through web-based KPI dashboards, traffic flow analysis and network access mapping, the platform proactively delivers the intelligence IT security, network and compliance teams need to optimize their network device configurations, monitor and validate compliance and review and make policy changes. The addition of the following add-on modules expands the capabilities of Security Manager to include workflow automation and risk analysis. • Policy Planner automates change workflows and gives firewall administrators the necessary tools to evolve policy and protection over time. This web-based module collects user requirements, recommends rule changes, provides detailed risk assessment of requests changes and supports full system audits and verification. Policy Planner uses the BPMN standard, integrating with existing business-process tools and enabling communication throughout the change process. • Policy Optimizer automates the rule review and recertification process. With Policy Optimizer, IT teams can identify troublesome rules, understand why they were created and determine if they remain relevant. The automated workflow generates event-driven or ad hoc rule review, validates rule justification with the policy owner and quantifies the risk of the requested changes so they do not impact service • Risk Analyzer reduces risk by proactively analyzing your network infrastructure, then simulating how attackers might gain access through vulnerabilities in business assets. Risk Analyzer allows IT teams to quickly assess the impact of a potential attack, where multiple exploits can be used in combination and how prepared network defenses are to defeat an attack. Immediate Insight Immediate Insight from FireMon is a real-time security analytics software that brings the speed and simplicity of a search engine to data analysis and discovery. It merges machine learning, correlation and natural language in a simple, workflow-centric interface to reveal relationships in the data that users may not have even known to look for.


    Web Security. Next generation web security for tomorrow's global workforce


    FortifyData offers a clear and accurate analysis of cyber risks through a risk scoring platform. Using statistical analysis and continuous monitoring of a company’s network and application layer, dark web search discoveries, IP reputation, and breach history records, companies can now understand their current cyber risk posture using our easy to understand scoring model ranging from 300 to 900.


    HIAB(hacker-in-a-box) is our automated, internal vulnerability management system that includes a network vulnerability scanner and web application scanner, built on our proprietary technology.


    HP Fortify Software Security Center is a suite of tightly integrated solutions for fixing and preventing security vulnerabilities in applications.


    It's stunning. bDefend creates powerful behavior fingerprints and makes new malware signatures for all to use.We defend against viruses that others can't detect.


    You know that uploading unknown code leads to unknown consequences. So why risk it? bDetect takes a quick look and identifies what code is Safe, Suspicious, or Malicious.


    Want to know if your system has malware? bDiscover has found a way to use software behavior in structured disassembly to reduce your time and ultimately your cost.


    IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


    Everything you need to proactively stop Advanced Persistent Threats (APTs). Illusive deceptions help you avert a crisis by cutting off advanced attackers before they reach critical assets


    ImmuniWeb combines managed vulnerability scanning with manual penetration testing in real-time. The unique hybrid approach assures the highest vulnerability detection rate, accuracy and reliability. While proprietary machine-learning technology assures scalability and cost-effectiveness. With ImmuniWeb web security testing becomes affordable and available to companies of all sizes, enabling them to secure their websites and web applications with just few clicks.


    iMonitor EAM Professional can monitor all your client computers with one server, for larger volume purchases


    Continuously identify and assess risk across your cloud, virtual, remote, local, and containerized infrastructure. Leverage unparalleled attacker analytics to prioritize vulns more precisely with a Real Risk score that goes beyond just CVSS. Break down the silos between IT, security, and development to streamline and automate remediation efforts.


    Intrusion Prevention (IPS) Protect against known, unknown, and undisclosed vulnerabilities in network.


    iTrust provides cybersecurity risk ratings and risk intelligence to help businesses build trusted relationships with their vendors, partners, and suppliers. iTrust collects and analyzes third-party risk metrics using machine learning to deliver 360 vendor security and compliance visibility. iTrust is designed to be the world's most intelligent cyber risk rating and threat intelligence platform.


    Insights allows you to secure and manage any vulnerabilities, compliance and operational risk that may arise from using open source components.


    LOGINCAT IS THE WORLD'S FIRST COMPREHENSIVE CYBERSECURITY SUITE, AI AND ZERO TRUST BASED. Cybersecurity is an increasingly critical issue. There is a hacker attack every 39 seconds. Prevent hacking and malware attacks with a robust, based on zero trust cybersecurity solution - LoginCat. From AI Based to Zero Day Exploits, LoginCat keeps you secure from all kinds of Cyberattacks.


    Mageni is a vulnerability scanning and vulnerability management solution that empowers use to find, prioritize, remediate and manage vulnerabilities before they are exploited by hackers.


    MaxPatrol is an all-in-one vulnerability management solution designed to provide vulnerability and compliance management for applications, databases, network and operating systems, as well as ERP (SAP), ICS/SCADA, Core Telecom and Banking infrastructure.


    Network Security Task Manager securely protects Windows networks from sophisticated malware not detected by traditional security solutions. Today malware is diverse and numerous. Thousands of potential spyware, Trojans, keyloggers and spybots endanger the safety of your private and business information. The constant development of malware techniques makes traditional signature-based systems quite ineffective in detecting new and emerging threats. The innovative solution by Neuber Software - Network Security Task Manager - is an must-have for proper Windows network protection. Network Security Task Manager is based on behavior and code analysis. It protects Windows networks from industrial espionage, sabotage and security-critical software, informing you about active malware on networked computers in real time mode. This compact and fast tool analyzes Windows processes running on networked computers and shows a unique security risk rating for each process. Besides, Network Security Task Manager displays full directory path and file name of a certain process, its description and manufacturer, computers the process runs on and embedded hidden functions, such as keyboard monitoring or browser supervision. It should be noted that Network Security Task Manager stands out from other behavior-based programs. Apart from providing an easy overview about running processes on networked computers it has some major advantages over similar tools. Network Security Task Manager needs no installation, no setup, and no updates. The user license is unlimited, and after a single payment no additional subscription fees are imposed. The price is reasonable and depends on the number of computers that are monitored. The price of unlimited user license depends on the number of computers monitored, e.g. 20 USD per client for 5 clients or 8 USD per client for 100 clients. See more details on http://www.neuber.com/network-taskmanager/


    Quickly identifies undiscovered vulnerabilities, so you can stay secure, harden your networks and prevent attacks in minutes.


    NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that matter. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence – including malware, exploit, patching and social media feeds to predict the true probability of attacks. It replaces manual remediation tasks with automated workflow, integrated communication capabilities and incident management – guided by rich visualization dashboards for easy reporting on current status.


    LORIC is a security platform that provides threat visibility and ensures compliance of cloud footprint by combining threat detection, predictive analytics, security configuration management, and automated incident response.


    Ntrepid Passages is an enterprise-class browsing solution that isolates the browser in a virtual machine to prevent against web-based attacks.


    PRADEO SECURITY, a technology that uses Artificial Intelligence to automatically ward off known, unknown and advanced mobile threats.


    PreEmptive Protection for iOS protects all your iOS applications, greatly reducing the risk of piracy, intellectual property theft and tampering.


    At the heart of the Platform are a set of core capabilities including multi-dimensional data analysis, behavioral analytics, continuous risk assessment, adaptive response enforcement and a robust and flexible policy engine. These capabilities help to power the Platform for delivering a scalable set of applications that help customers prevent threats and support broad set of use cases. The applications include:


    Prevalent's comprehensive third party risk management (TPRM) platform helps your organization proactively manage third party risk through understanding that "one size does not fit all". Our integrated suite of solutions includes automated assessment software, continuous threat monitoring, and innovative vendor evidence sharing networks.


    RedSeal helps customers understand their network from the inside out – providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilience.


    BeyondTrust Retina CS is the only vulnerability management solution designed from the ground up to provide organizations with context-aware vulnerability assessment and risk analysis. Retina’s results-driven architecture works with users to proactively identify security exposures, analyze business impact, and plan and conduct remediation across network, web, mobile, cloud, virtual, and IoT infrastructure. - Discover network, web, mobile, cloud, virtual, and IoT infrastructure - Profile asset configuration and risk potential - Pinpoint vulnerabilities, malware and attacks - Analyze threat potential, return on remediation and more - Isolate high-risk assets through advanced threat analytics - Remediate vulnerabilities through integrated patch management - Report on vulnerabilities, compliance, benchmarks, etc - Protect endpoints against client-side attacks Learn more: https://www.beyondtrust.com/products/retina-cs/


    RiskRate delivers a robust solution for your third-party risk management and enterprise due diligence program. Execute on your risk-based third-party risk management program with centralized onboarding, screening and continuous third party monitoring.


    R-Scope puts networks under a microscope so that customers can respond to both known and zero-day attacks before they become crises.


    Proactive VMware analytics product that helps you discover potential issues before they cause major outages or security incidents.


    Secudit combines user behavior monitoring, penetration testing, and cyber-threat intelligence to provide an enterprise with an ongoing assessment of enterprise IT cyber-security vulnerability.


    Secure Configuration Manager helps you to proactively enforce security configuration policy across critical systems in evolving IT environments.


    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company’s approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Web, Application Security, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Credentials, DNS Health, Endpoint Security, IP Reputation and Cubit Score.


    Security Solutions for IBM i provides simplified compliance auditing, security monitoring and real-time protection for IBM i and iSeries systems.


    Threat–centric vulnerability management (TCVM) from Skybox™ Security is the best approach to managing and prioritizing vulnerabilities. Using up-to-date intelligence of your network and threats, Skybox gives you the power to target action where it matters most and be proactive against the threats of ransomware, malware, exploit kits and targeted attacks. Skybox prioritizes vulnerabilities the smart way, putting imminent threats at the top of your to-do list and helping you systematically deal with potential threats over time. Skybox looks for vulnerabilities which are: • Exposed, based on your network and security controls • Exploited in the wild or used in attacks on your industry or geography • Known to have an exploit code published • In your network but have no known exploit With attack surface visualization, vulnerability and threat intelligence and attack vector analytics, TCVM gives you the tools and context needed to pinpoint vulnerabilities posing real risk, and fix them immediately. Be ready for the next WannaCry, Heartbleed or whatever comes along with a vulnerability management program that can meet the threats of today and adapt to those of the future. To see the full suite of solutions Skybox has to offer, visit www.skyboxsecurity.com, start your 30-day free product tour or schedule a demo with your Skybox Representative today.


    SOCVue Vulnerability Management is a service that helps reduce attack surface by proactively identifying vulnerabilities across IT environment, prioritizing them based on business impact and risk, and providing remediation guidance to save significant time and reducing operational costs.


    cloud-based threat detection and management


    SWAT (the Secure Web Application Tactics) is a continuous vulnerability management solution. Its allows a full vulnerability coverage thanks to the association of vulnerability scanning tools and Outpost24 experienced security technicians. SWAT adjusts its scanning to new threats discovered and adapts to any changes in the application. All deployment and maintenance is performed by Outpost24 experts team. Companies can stay focused on their core activity, Outpost24 takes care of their web application security. Customer support is available 24/7. Know more > https://outpost24.com/swat


    Get visibility and control over shadow IT with CloudSOC Audit Cloud Access Security Broker (CASB)


    Get visibility and control over shadow IT with CloudSOC Audit Cloud Access Security Broker (CASB)


    Identify security gaps and pinpoint vulnerabilities to prioritize remediation and reduce risk and automate compliance assessments for over 100 regulations, mandates, and best practice frameworks including GDPR, HIPAA, NIST, PCI and SWIFT.


    Symantec Patch Management Solution allows you to proactively manage patches and software updates by automating the collection, analysis, and delivery of patches across your enterprise. The solution can significantly help you decrease the costs involved in testing and delivering patches to protect your environment.


    See all your risk, in every form, from every angle. Strengthen your security posture with automated risk assessments.


    Our integrated products offer unparalleled protection and insight to reduce risk and lower costs across your entire organisation.


    The CyberStrong Platform implements the language of cyber for the future of business. Empower your team to streamline continuous compliance and risk management with CyberStrong's unparalleled time-to-value, breakthrough AI and Machine Learning, and agile workflow. Get instant visibility into any combination of compliance standards and experience what immediate cybersecurity ROI feels like.


    The Risk Assessment Tool is a quick to implement, easy to use tool that helps you lock down your workstations and servers against attack.


    Veriflow brings formal verification to network infrastructure for the first time, continuously ensuring your network operates as intended.


    Threatcare's Violet is the only cloud-based automated cybersecurity assessment platform that enables continuous security validation.


    VMRay Analyzer provides best-in-class threat detection and mitigation capabilities, a fast and powerful tool for a rapidly evolving threat landscape. Unlike traditional malware analysis systems, VMRay Analyzer cannot be evaded by malware because of its unique hypervisor-based approach – nothing is modified in the target environment being monitored.


    A lightweight plugin agent to apply custom security rules as well as current and historical virtual patches for instant protection.


    Zerocopter enables you to confidently leverage the skills of the world's most knowledgable ethical hackers to secure your applications.