  # Best Risk-Based Vulnerability Management Software - Page 4

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and [security risk analysis software](https://www.g2.com/categories/security-risk-analysis), but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

- Integrate threat intelligence and contextual data for analysis
- Analyze applications, networks, and cloud services for vulnerabilities
- Utilize risk factors and machine learning to prioritize vulnerabilities




  ## How Many Risk-Based Vulnerability Management Software Products Does G2 Track?
**Total Products under this Category:** 194

  
## How Does G2 Rank Risk-Based Vulnerability Management Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,500+ Authentic Reviews
- 194+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Which Risk-Based Vulnerability Management Software Is Best for Your Use Case?

- **Leader:** [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews)
- **Highest Performer:** [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews)
- **Easiest to Use:** [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews)
- **Top Trending:** [Pentera](https://www.g2.com/products/pentera/reviews)
- **Best Free Software:** [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews)

  
---

**Sponsored**

### Upwind

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric that maps your environment as it runs - revealing what’s truly at risk, what’s actively happening, and how to respond quickly and effectively. With Upwind, security, dev, and ops teams move faster, stay focused, and fix risks that matter most.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2246&amp;secure%5Bdisplayable_resource_id%5D=2246&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2246&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1333227&amp;secure%5Bresource_id%5D=2246&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Frisk-based-vulnerability-management&amp;secure%5Btoken%5D=4efa6464e89774bc0446bc7be1fcee6fd96f18eba9549cb08d10a422704516d9&amp;secure%5Burl%5D=https%3A%2F%2Fwww.upwind.io&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Risk-Based Vulnerability Management Software Products in 2026?
### 1. [Upwind](https://www.g2.com/products/upwind/reviews)
  Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric that maps your environment as it runs - revealing what’s truly at risk, what’s actively happening, and how to respond quickly and effectively. With Upwind, security, dev, and ops teams move faster, stay focused, and fix risks that matter most.


  **Average Rating:** 4.9/5.0
  **Total Reviews:** 8
**How Do G2 Users Rate Upwind?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Upwind?**

- **Seller:** [Upwind](https://www.g2.com/sellers/upwind)
- **Company Website:** https://www.upwind.io
- **Year Founded:** 2022
- **HQ Location:** San Francisco, California, United States
- **LinkedIn® Page:** https://www.linkedin.com/company/upwindsecurity/ (217 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 75% Mid-Market, 25% Enterprise


#### What Are Upwind's Pros and Cons?

**Pros:**

- Ease of Use (3 reviews)
- Visibility (3 reviews)
- Customer Support (2 reviews)
- Detection Efficiency (2 reviews)
- Implementation Ease (2 reviews)

**Cons:**

- Alert Overload (1 reviews)
- Compliance Issues (1 reviews)
- Data Management (1 reviews)
- Data Overload (1 reviews)
- False Positives (1 reviews)

### 2. [Balbix](https://www.g2.com/products/balbix/reviews)
  The Balbix Security Cloud uses AI and automation to reinvent how the world’s leading organizations reduce breach risk. With Balbix, security teams can now accurately inventory their cloud and on-premise assets, conduct risk-based vulnerability management, and quantify their cyber risk in monetary terms. Security leaders can measure and improve SLA compliance and other metrics in real time, show ROI for their cybersecurity program, and confidently report on their security posture to the board of directors and other stakeholders.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate Balbix?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Balbix?**

- **Seller:** [Balbix](https://www.g2.com/sellers/balbix)
- **Year Founded:** 2015
- **HQ Location:** San Jose California ,United States
- **LinkedIn® Page:** https://www.linkedin.com/company/balbix/ (124 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Enterprise, 50% Mid-Market


#### What Are Balbix's Pros and Cons?

**Pros:**

- Dashboard Design (1 reviews)
- Dashboard Usability (1 reviews)

**Cons:**

- Risk Management (1 reviews)

### 3. [BMC Helix Automation Console](https://www.g2.com/products/bmc-helix-automation-console/reviews)
  BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate BMC Helix Automation Console?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)

**Who Is the Company Behind BMC Helix Automation Console?**

- **Seller:** [BMC Helix](https://www.g2.com/sellers/bmc-helix)
- **Year Founded:** 2025
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/bmchelix/ (1,083 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


#### What Are BMC Helix Automation Console's Pros and Cons?

**Pros:**

- Ease of Use (1 reviews)
- Implementation Ease (1 reviews)
- Simple (1 reviews)


### 4. [CyCognito](https://www.g2.com/products/cycognito/reviews)
  CyCognito is a cybersecurity solution designed to help organizations discover, test, and prioritize security issues across their digital landscape. By leveraging advanced artificial intelligence, CyCognito scans billions of websites, cloud applications, and APIs to identify potential vulnerabilities and critical risks. This proactive approach enables organizations to address security concerns before they can be exploited by malicious actors, thereby enhancing their overall security posture. The target audience for CyCognito includes emerging companies, government agencies, and Fortune 500 organizations, all of which face increasing threats in today&#39;s digital environment. These entities require robust security measures to protect sensitive data and maintain compliance with various regulations. CyCognito serves as an essential tool for security teams, providing them with the insights needed to understand their risk exposure and prioritize remediation efforts effectively. One of the key features of the CyCognito platform is its comprehensive scanning capability, which covers a vast range of digital assets. This extensive reach ensures that organizations can identify vulnerabilities across all their online presence, including third-party services and shadow IT. The platform&#39;s AI-driven analysis further enhances its effectiveness by automatically assessing the severity of identified risks, allowing security teams to focus on the most critical issues that could lead to significant breaches. In addition to risk discovery, CyCognito offers actionable guidance for remediation, helping organizations to implement effective security measures. The platform provides detailed insights into the nature of the vulnerabilities and suggests specific steps to mitigate them. This feature not only streamlines the remediation process but also empowers organizations to build a more resilient security framework over time. By integrating CyCognito into their cybersecurity strategy, organizations can significantly reduce their risk exposure and enhance their ability to respond to emerging threats. The platform&#39;s unique combination of extensive scanning, AI-driven risk assessment, and actionable remediation guidance positions it as a valuable asset for any organization looking to strengthen its security posture in an increasingly complex threat landscape.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 5
**How Do G2 Users Rate CyCognito?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.3/10)
- **Reporting:** 7.5/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind CyCognito?**

- **Seller:** [CyCognito](https://www.g2.com/sellers/cycognito)
- **Year Founded:** 2017
- **HQ Location:** Palo Alto, California, United States
- **Twitter:** @CyCognito (10,335 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cycognito (137 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 80% Small-Business, 20% Enterprise


#### What Are CyCognito's Pros and Cons?

**Pros:**

- Ease of Use (2 reviews)
- Vulnerability Identification (2 reviews)
- Comprehensive Analysis (1 reviews)
- Customer Support (1 reviews)
- Cybersecurity (1 reviews)

**Cons:**

- Authentication Issues (1 reviews)
- Expensive (1 reviews)
- False Positives (1 reviews)
- Inadequate Remediation (1 reviews)
- Lack of Detail (1 reviews)

### 5. [H2Cyber](https://www.g2.com/products/h2cyber/reviews)
  At H2Cyber our product is designed for small businesses. We are teaching you the basic arithmetic of cybersecurity via our prioritized approach. This will allow your business to grow over time and move to a more robust cybersecurity framework if needed as all our controls are aligned to the five basic functions of the NIST Cybersecurity Framework (Identify, Protect, Detect, Respond, and Recovery). Our prioritized approach takes the guessing out of where to start. We have identified 77 controls and spread them out over 7 phases to help you easily manage your Cybersecurity program. Implementation times generally take between 17 and 35 weeks if you are starting from scratch.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 2

**Who Is the Company Behind H2Cyber?**

- **Seller:** [H2Cyber](https://www.g2.com/sellers/h2cyber)
- **Year Founded:** 2009
- **HQ Location:** Prosper, US
- **LinkedIn® Page:** https://www.linkedin.com/company/h2cyber/ (2 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


### 6. [Hacknoid](https://www.g2.com/products/hacknoid/reviews)
  CONTINUOUS VULNERABILITY DETECTION, ANALYSIS AND MANAGEMENT PLATFORM Your entire attack surface, automatically, continuously monitored with a unified view. Hacknoid automates vulnerability detection across all your network’s systems and devices, providing visibility and prioritizing alerts to help you optimize remediation efforts. We keep your asset inventory up to date and perform 24/7 automatic and intelligent analysis across your entire tech environment, enabling you to manage risks practically, simply, and proactively.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 3
**How Do G2 Users Rate Hacknoid?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Hacknoid?**

- **Seller:** [Hacknoid](https://www.g2.com/sellers/hacknoid)
- **Year Founded:** 2013
- **HQ Location:** Montevideo, UY
- **LinkedIn® Page:** https://www.linkedin.com/company/hacknoid-security (14 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 67% Mid-Market, 33% Small-Business


#### What Are Hacknoid's Pros and Cons?

**Pros:**

- Alerts (1 reviews)
- Customization Control (1 reviews)
- Risk Management (1 reviews)
- Scanning Efficiency (1 reviews)
- Scanning Technology (1 reviews)


### 7. [Holm Security VMP](https://www.g2.com/products/holm-security-vmp/reviews)
  Holm Security’s Next-Gen Vulnerability Management Platform sets the foundation for a systematic, risk-based, and proactive cyber defense against threats that can cause financial and reputational damage to your organization, such as ransomware and phishing. Our platform efficiently combines attack surface management (ASM/EASM) and vulnerability management to understand and minimize your attack surface and detect vulnerabilities before they are exploited by cybercriminals.


  **Average Rating:** 2.5/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate Holm Security VMP?**

- **Has the product been a good partner in doing business?:** 5.0/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 5.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Holm Security VMP?**

- **Seller:** [Holm Security](https://www.g2.com/sellers/holm-security)
- **Year Founded:** 2015
- **HQ Location:** Alvik, SE
- **LinkedIn® Page:** https://www.linkedin.com/company/holm-security (64 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Mid-Market, 50% Small-Business


#### What Are Holm Security VMP's Pros and Cons?

**Pros:**

- Aware (1 reviews)
- Awareness Increase (1 reviews)
- Innovation (1 reviews)
- Scanning Efficiency (1 reviews)

**Cons:**

- False Positives (1 reviews)
- Scanning Issues (1 reviews)
- Technical Issues (1 reviews)

### 8. [Ivanti Neurons for RBVM](https://www.g2.com/products/ivanti-neurons-for-rbvm/reviews)
  Ivanti Neurons for Risk-Based Vulnerability Management (RBVM) provides a contextualized, risk-based view of an organization’s cybersecurity posture that enables customers to move from detection of vulnerabilities to remediation in minutes – not months. It works by continuously correlating an organization’s infrastructure with comprehensive internal and external vulnerability data, threat intelligence, human pen test findings and business asset criticality to measure risk and prioritize remediation activities. Unlike CVSS, Ivanti’s VRR scoring accounts for active threat context – including ties to ransomware. Ivanti RS3 scoring quantifies an organization’s risk profile to ensure internal alignment on the organization’s security level. This intel and more are presented via ready-made and customizable dashboards that empower users with superior visual query and risk discovery capabilities across assets and infrastructure.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate Ivanti Neurons for RBVM?**

- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind Ivanti Neurons for RBVM?**

- **Seller:** [Ivanti](https://www.g2.com/sellers/ivanti)
- **Year Founded:** 1985
- **HQ Location:** South Jordan, UT
- **Twitter:** @GoIvanti (6,775 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/15224185/ (2,968 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Enterprise, 50% Small-Business


### 9. [RiskRecon](https://www.g2.com/products/riskrecon/reviews)
  Gain objective insight into your third-party security performance and IT landscape


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate RiskRecon?**

- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind RiskRecon?**

- **Seller:** [RiskRecon](https://www.g2.com/sellers/riskrecon)
- **Year Founded:** 2013
- **HQ Location:** Salt Lake City, US
- **Twitter:** @riskrecon (654 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/riskrecon/ (98 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Enterprise, 50% Small-Business


### 10. [Tenable Identity Exposure](https://www.g2.com/products/tenable-identity-exposure/reviews)
  Get real-time, unified visibility into Active Directory and Entra ID identities to help organizations proactively reduce identity-based cyber risks. By mapping pre-configured Indicators of Exposure to identities, it highlights the severity of associated risks, including misconfigurations, privilege escalation risks and structural security gaps. It continuously monitors identity attack paths and presents vulnerabilities through graphical views. Misconfigurations, exposures, and attack paths are identified and remediated in real time to reduce the AD and Entra ID attack surface. With risk-based prioritization and guided remediation, security teams can strengthen identity posture and prevent breaches without requiring agents or elevated privileges. As part of Tenable’s AI-powered exposure management platform, it brings identity context to your broader risk picture—delivering the visibility and control needed to reduce organizational risk.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 5
**How Do G2 Users Rate Tenable Identity Exposure?**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 9.2/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.2/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Tenable Identity Exposure?**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,700 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,339 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Who Uses This Product?**
  - **Company Size:** 40% Enterprise, 40% Mid-Market


#### What Are Tenable Identity Exposure's Pros and Cons?

**Pros:**

- Real-time Monitoring (2 reviews)
- Visibility (2 reviews)
- Cybersecurity (1 reviews)
- Cyber Security (1 reviews)
- Detection Efficiency (1 reviews)

**Cons:**

- Difficult Learning (1 reviews)
- Excessive Notifications (1 reviews)
- False Positives (1 reviews)
- Information Overload (1 reviews)
- Learning Curve (1 reviews)

### 11. [Tenable OT Security](https://www.g2.com/products/tenable-ot-security/reviews)
  Tenable OT Security disrupts attack paths and protects industrial and critical infrastructure from cyber threats. From inventory management and asset tracking to threat detection at the device and network level, vulnerability management and configuration control, Tenable’s OT security capabilities provide maximum visibility, security, and control across your entire operations.


  **Average Rating:** 4.8/5.0
  **Total Reviews:** 4
**How Do G2 Users Rate Tenable OT Security?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Tenable OT Security?**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,700 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,339 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Who Uses This Product?**
  - **Company Size:** 75% Enterprise, 25% Small-Business


#### What Are Tenable OT Security's Pros and Cons?

**Pros:**

- Cybersecurity (2 reviews)
- Security (2 reviews)
- Visibility (2 reviews)
- Detection (1 reviews)
- Detection Efficiency (1 reviews)

**Cons:**

- Limited Features (3 reviews)
- Complexity (2 reviews)
- Expensive (2 reviews)
- Asset Management (1 reviews)
- Inadequate Reporting (1 reviews)

### 12. [Tripwire IP360](https://www.g2.com/products/tripwire-ip360/reviews)
  A Key Part of Fortra (the new face of HelpSystems) Tripwire is proud to be part of Fortra’s comprehensive cybersecurity portfolio. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Tripwire IP360 and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.


  **Average Rating:** 3.3/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate Tripwire IP360?**

- **Has the product been a good partner in doing business?:** 6.7/10 (Category avg: 9.3/10)

**Who Is the Company Behind Tripwire IP360?**

- **Seller:** [Fortra](https://www.g2.com/sellers/fortra)
- **Year Founded:** 1982
- **HQ Location:** Eden Prairie, Minnesota
- **Twitter:** @fortraofficial (2,766 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/fortra (1,738 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Enterprise


### 13. [TrueSight Vulnerability Management for Third-Party Applications](https://www.g2.com/products/bmc-software-truesight-vulnerability-management-for-third-party-applications/reviews)
  TrueSight Vulnerability Management helps security and IT operations teams prioritize and remediate risks based on potential impact to the business.


  **Average Rating:** 3.8/5.0
  **Total Reviews:** 2

**Who Is the Company Behind TrueSight Vulnerability Management for Third-Party Applications?**

- **Seller:** [BMC Helix](https://www.g2.com/sellers/bmc-helix)
- **Year Founded:** 2025
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/bmchelix/ (1,083 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 67% Small-Business, 33% Mid-Market


### 14. [Visore Security Management Platform](https://www.g2.com/products/visore-security-management-platform/reviews)
  Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and Cyber teams: comprehensive &amp; up-to-date asset inventory. Asset inventory, consolidated data and threat intelligence, all in one place enable valuable insights with just one click.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate Visore Security Management Platform?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Visore Security Management Platform?**

- **Seller:** [Visore Security Solutions](https://www.g2.com/sellers/visore-security-solutions)
- **Year Founded:** 2021
- **HQ Location:** Rockville, US
- **LinkedIn® Page:** https://linkedin.com/company/visore-security-solutions (1 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market


### 15. [AttackTree](https://www.g2.com/products/attacktree/reviews)
  AttackTree is a vulnerability management software that helps predict hacking attacks and develop prevention schemes.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate AttackTree?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)

**Who Is the Company Behind AttackTree?**

- **Seller:** [Isograph](https://www.g2.com/sellers/isograph)
- **HQ Location:** Warrington, GB
- **LinkedIn® Page:** https://www.linkedin.com/company/isograph/ (13 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Enterprise


### 16. [Autobahn Security](https://www.g2.com/products/autobahn-security/reviews)
  Autobahn Fit is a cyber security platform that supports your company’s vulnerability management initiatives by consolidating, prioritizing, and remediating issues efficiently and transparently. We provide Cyber Fitness Workouts – actionable remediation guides that will help your IT team optimize your IT-System against hackers, easily and quickly, even without security expertise.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate Autobahn Security?**

- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 6.7/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 6.7/10 (Category avg: 8.8/10)

**Who Is the Company Behind Autobahn Security?**

- **Seller:** [Autobahn Security](https://www.g2.com/sellers/autobahn-security)
- **Year Founded:** 2019
- **HQ Location:** Singapore, SG
- **LinkedIn® Page:** https://www.linkedin.com/company/autobahn-sec (33 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Small-Business


### 17. [Black Kite](https://www.g2.com/products/black-kite/reviews)
  In today’s threat landscape, understanding your cyber risk exposure - across vendors, systems, and the extended supply chain - is critical. At Black Kite, our mission is to equip business and security leaders with a complete and accurate view of their cyber ecosystem risk extending out to their 4th-, 5th-, and Nth-parties. The Black Kite platform: - Unlocks continuous risk intelligence, including Black Kite’s Ransomware Susceptibility Index® (RSI), Adversary Susceptibility Index (ASI), and Data Breach Index (DBI) - Quantifies Financial Impact of risk using Open FAIR™ - Detects cyber exposure and high-risk signals across your supplier ecosystem and out to your Nth party with Black Kite FocusTags™ - Uses AI to automate vendor assessments, questionnaires, and gap analysis Our offerings: Black Kite Monitor: Continuous, real-time visibility into the cyber health of your third-party ecosystem - helping you build resilience across your supply chain. By providing accurate, always-up-to-date risk intelligence on vendors, Black Kite Monitor empowers teams to make informed risk decisions. Black Kite Assess: Delivers AI-powered cyber assessments built on trusted risk intelligence - including technical findings, posture ratings, and real-time risk signals. Black Kite Assess empowers teams to automate everything from document review and gap analysis to assessing vendor controls against custom questionnaires and standard frameworks and regulations, such as NIST and GDPR, while recommending remediations to engage third-parties on. Black Kite Extend: Gives organizations deeper visibility into the interconnected risks beyond their direct third parties. Built for teams managing complex supply chains or software vendor ecosystems, Black Kite Extend surfaces risk insights across fourth-, fifth-, and Nth-party relationships - helping you uncover hidden exposures and improve risk posture across your extended ecosystem. Whether it’s identifying critical dependencies, geopolitical risk, or sanctioned entities, Extend equips you with the context needed to make smarter decisions at scale.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate Black Kite?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Black Kite?**

- **Seller:** [Black Kite](https://www.g2.com/sellers/black-kite)
- **Year Founded:** 2016
- **HQ Location:** Boston, Massachusetts
- **Twitter:** @BlackKiteTech (1,510 Twitter followers)
- **LinkedIn® Page:** http://www.linkedin.com/company/blackkite (127 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Enterprise


#### What Are Black Kite's Pros and Cons?

**Pros:**

- Ease of Use (1 reviews)
- Easy Implementation (1 reviews)
- Helpful (1 reviews)
- Implementation Ease (1 reviews)
- Innovation (1 reviews)


### 18. [BMC Helix Remediate](https://www.g2.com/products/bmc-helix-remediate/reviews)
  BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1

**Who Is the Company Behind BMC Helix Remediate?**

- **Seller:** [BMC Helix](https://www.g2.com/sellers/bmc-helix)
- **Year Founded:** 2025
- **HQ Location:** N/A
- **LinkedIn® Page:** https://www.linkedin.com/company/bmchelix/ (1,083 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Enterprise


### 19. [Centraleyes](https://www.g2.com/products/centraleyes/reviews)
  Centraleyes is a next generation GRC platform that gives organizations an unparalleled understanding of their cyber risk and compliance. Centraleyes provides an exceptional ability to see, understand and react to growing risks and gaps, in a place where other solutions are ineffective. Centraleyes’s customers have automated and orchestrated their GRC function, to the point where it is 10x faster and 10x better. This is truly cyber risk management reimagined.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 3

**Who Is the Company Behind Centraleyes?**

- **Seller:** [Centraleyes](https://www.g2.com/sellers/centraleyes)
- **Year Founded:** 2016
- **HQ Location:** New York, US
- **LinkedIn® Page:** http://www.linkedin.com/company/cygov (21 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 67% Enterprise, 33% Mid-Market


#### What Are Centraleyes's Pros and Cons?

**Pros:**

- Compliance Management (1 reviews)
- Compliance Simplification (1 reviews)
- Cybersecurity (1 reviews)
- Insights (1 reviews)
- Risk Management (1 reviews)

**Cons:**

- Filtering Issues (1 reviews)
- Inadequate Reporting (1 reviews)
- Lack of Clarity (1 reviews)
- Limited Reporting (1 reviews)
- Poor Reporting (1 reviews)

### 20. [CybelAngel](https://www.g2.com/products/cybelangel/reviews)
  CybelAngel protects its customers with External Attack Surface Management (EASM) solutions that are powered by the most comprehensive external asset discovery and threat detection technologies available. Built upon close to a decade of machine learning, our advanced platform scans the entirety of the internet every 24 hours to uncover unknown assets and shadow IT, cloud services, connected devices, fraudulent domains and exposed credentials — the sources attackers use to access confidential data, launch phishing campaigns or initiate destructive ransomware attacks. CybelAngel&#39;s combination of machine learning and expert human analysis provides deep visibility into the most critical threats, long before they’re exploited.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 5
**How Do G2 Users Rate CybelAngel?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)

**Who Is the Company Behind CybelAngel?**

- **Seller:** [CybelAngel](https://www.g2.com/sellers/cybelangel)
- **Year Founded:** 2013
- **HQ Location:** Paris, Île-de-France, France
- **Twitter:** @CybelAngel (3,415 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cybelangel (163 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 80% Enterprise, 20% Mid-Market


### 21. [Cyberwatch](https://www.g2.com/products/cyberwatch/reviews)
  Cyberwatch is a server vulnerability monitoring solution with integrated patch management functionality.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate Cyberwatch?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)

**Who Is the Company Behind Cyberwatch?**

- **Seller:** [Cyberwatch](https://www.g2.com/sellers/cyberwatch)
- **HQ Location:** Massy, FR
- **LinkedIn® Page:** https://www.linkedin.com/company/cyberwatch (42 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Enterprise


#### What Are Cyberwatch's Pros and Cons?

**Pros:**

- Automation (1 reviews)
- Customer Support (1 reviews)
- Ease of Understanding (1 reviews)
- Ease of Use (1 reviews)
- Onboarding (1 reviews)


### 22. [Echelon](https://www.g2.com/products/laolab-cyber-security-echelon/reviews)
  Echelon — your cybersecurity check-up solution. Just like a health check-up prevents illness, our AI-driven solution for ongoing cybersecurity audits prevents cyber threats — before they lead to financial loss or data breaches. Just 5 reasons to choose Echelon: 1. Fix Faster with AI. Our AI tool provides step-by-step guidance to remediate every detected vulnerability. Less routine for your team—more profit for you. 2. Machine Learning Leak Processing. Machine Learning enables Echelon to efficiently process leaked data, ensuring none of your sensitive information is exposed publicly. 3. Quick &amp; Easy Setup. Just enter and confirm your domain or IP. No downloads. No access permissions needed. 4. Automatic Threat Detection. Finds security gaps before attackers do. 5. Echelon Never Sleeps. Audits are performed regularly. 24/7 CVE monitoring — if a new threat emerges, you&#39;ll be notified immediately. 3 simple steps to start: - Visit Echelon’s Website and Sign Up - Enter Domain/IP and Choose a Plan - Stay one step ahead of cyber threats – Echelon ensures 24/7 security


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate Echelon?**

- **Has the product been a good partner in doing business?:** 10.0/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind Echelon?**

- **Seller:** [LAOLAB CYBER SECURITY](https://www.g2.com/sellers/laolab-cyber-security)
- **HQ Location:** Abu Dhabi, AE
- **Twitter:** @laolab_org (92 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/laolab-security/ (7 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market


#### What Are Echelon's Pros and Cons?

**Pros:**

- Cybersecurity (1 reviews)
- Risk Management (1 reviews)
- Security (1 reviews)

**Cons:**

- Complexity (1 reviews)
- Learning Curve (1 reviews)

### 23. [Faraday Platform](https://www.g2.com/products/faraday-platform/reviews)
  Faraday ingests thousands of vulnerabilities from various assets and visualizes findings in a clear, dynamic, and intuitive dashboard. It is a comprehensive vulnerability management tool that helps security teams prioritize critical vulnerabilities, focusing on those that are exploitable to reduce noise and streamline reporting. Faraday can be deployed both in the cloud and on-premises, available in professional, corporate, and open-source versions. The company strongly supports open-source software (OSS) as they began as a small group of pentesters who needed to manage vulnerabilities and generate reports, leading them to develop this tool. Now, Faraday is accessible on GitHub for any pentester needing to create penetration testing reports. Among its many features, Faraday supports over 160 tools to consolidate work in one place. It also integrates seamlessly with Jira, ServiceNow, SolarWinds, and GitLab. The platform includes its own vulnerability scoring system to prioritize vulnerabilities as a hacker would, identifying exploitable vulnerabilities over seemingly critical ones that pose no real risk. Faraday is designed to meet the needs of small to large companies, allowing them to scale their security operations efficiently.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate Faraday Platform?**

- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)

**Who Is the Company Behind Faraday Platform?**

- **Seller:** [Faraday Security](https://www.g2.com/sellers/faraday-security)
- **Year Founded:** 2014
- **HQ Location:** Miami, US
- **LinkedIn® Page:** https://www.linkedin.com/company/faradaysec/ (53 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market


### 24. [Hackuity.io](https://www.g2.com/products/hackuity-io/reviews)
  Hackuity is the comprehensive security solution that orchestrates and automates the vulnerability management process. Hackuity’s platform aggregates and normalizes all your security assessment practices, whether automated or handmade, and enriches them so security practitioners can, at last, create risk-driven remediation plans and align their priorities with their current and future exposure to threats. Fully customizable, the platform fits the client technical context and security requirements either in a full-Saas mode, On-premise or Hybrid installation mode. Hackuity proposes the right offer regarding the company&#39;s experience in vulnerability management and field of activity : - Risk-based vulnerability management - Continuous Monitoring - Augmented pentest - Hackuity for MSSP The company was founded in 2018 and is based in Lyon, France.


  **Average Rating:** 5.0/5.0
  **Total Reviews:** 1

**Who Is the Company Behind Hackuity.io?**

- **Seller:** [Hackuity](https://www.g2.com/sellers/hackuity)
- **Year Founded:** 2018
- **HQ Location:** Lyon, FR
- **LinkedIn® Page:** http://www.linkedin.com/company/hackuity (38 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Enterprise


### 25. [ManageEngine Vulnerability Manager Plus](https://www.g2.com/products/manageengine-vulnerability-manager-plus/reviews)
  With Vulnerability Manager Plus, right from detection, and assessment of vulnerabilities to eliminating them with an automated patching workflow, all aspects of vulnerability management are made easy with a centralized console.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 3
**How Do G2 Users Rate ManageEngine Vulnerability Manager Plus?**

- **Has the product been a good partner in doing business?:** 9.2/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)

**Who Is the Company Behind ManageEngine Vulnerability Manager Plus?**

- **Seller:** [Zoho](https://www.g2.com/sellers/zoho-b00ca9d5-bca8-41b5-a8ad-275480841704)
- **Year Founded:** 1996
- **HQ Location:** Austin, TX
- **Twitter:** @Zoho (137,412 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/38373/ (30,531 employees on LinkedIn®)
- **Phone:** +1 (888) 900-9646 

**Who Uses This Product?**
  - **Company Size:** 67% Mid-Market, 33% Enterprise


#### What Are ManageEngine Vulnerability Manager Plus's Pros and Cons?

**Pros:**

- Detection (1 reviews)
- Ease of Use (1 reviews)
- Features (1 reviews)
- Patching (1 reviews)
- Patch Management (1 reviews)

**Cons:**

- False Positives (1 reviews)
- Inaccuracy Issues (1 reviews)
- Security Vulnerabilities (1 reviews)
- Vulnerability Management (1 reviews)


    ## What Is Risk-Based Vulnerability Management Software?
  [Vulnerability Management Software](https://www.g2.com/categories/vulnerability-management)
  ## What Software Categories Are Similar to Risk-Based Vulnerability Management Software?
    - [Threat Intelligence Software](https://www.g2.com/categories/threat-intelligence)
    - [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)
    - [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools)
    - [Dark Web Monitoring Tools](https://www.g2.com/categories/dark-web-monitoring)
    - [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)
    - [Exposure Management Platforms](https://www.g2.com/categories/exposure-management-platforms)
    - [Digital Risk Protection (DRP) Platforms](https://www.g2.com/categories/digital-risk-protection-drp-platforms)

  
    
