Risk-Based Vulnerability Management reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Best Risk-Based Vulnerability Management Software

    Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

    Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

    Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

    There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

    To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

    Integrate threat intelligence and contextual data for analysis
    Analyze applications, networks, and cloud services for vulnerabilities
    Utilize risk factors and machine learning to prioritize vulnerabilities

    Top 5 Risk-Based Vulnerability Management Software

    • InsightVM (Nexpose)
    • Tenable.io
    • Kenna Security
    • Tenable.sc
    • Resolver

    Compare Risk-Based Vulnerability Management Software

    G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
    Sort By:
    Results: 47
    View Grid®
    Adv. Filters
    (42)4.4 out of 5
    Entry Level Price:$22 /asset*

    InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning technical teams, security teams can remediate vulnerabilities and build Security into the core of the organization. With InsightVM, security teams can: Gain Clarity Into Risk and Across Teams Better understand the risk in your modern environment so you can work in lockstep with techn

    (45)4.3 out of 5

    Tenable.io is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire attack surface—including cloud, OT and container environments • Predict what matters by understanding vulnerabilities in the context of business risk, as well as the criticality of affected assets • Act on each high priority vulnerability to effectively manage risk, and measure KPIs to effectively communicate effectiv

    (82)4.5 out of 5
    Optimized for quick response

    Your organization faces a tidal wave of vulnerabilities, but you can’t fix them all. Kenna Security’s risk-based vulnerability management solutions use real-time threat intelligence, data science, and predictive algorithms to effectively manage and prioritize risk across your entire enterprise—full-stack.

    (29)4.5 out of 5

    Tenable.sc is the industry's most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuously assess all assets the moment they join the network -- including transient devices that aren’t regularly connected • Predict what matters by understanding vulnerabilities in the context of business risk, as well as the criticality of affected assets • Act on each high priority vulnerability to effectively manage risk, a

    (14)4.4 out of 5
    Optimized for quick response

    Resolver’s risk management software is a cloud-based solution for midsize to larger enterprises that serves customers across a variety of industries and business needs. These industries include banking and financial services, healthcare and hospitals, insurance, academic institutions, critical infrastructure organizations, airports, oil and gas, utilities, manufacturers, pharmaceuticals, hospitality, high tech, government, retail, real estate, and more.

    (11)4.3 out of 5
    Optimized for quick response

    SecPod SanerNow's integrated vulnerability and patch management solution minimizes your organization's attack surface by offering timely vulnerability detection, assessment, prioritization, and remediation with relevant patches, from a single pane of glass. SanerNow is powered by its homegrown SCAP feed with over 100,000+ vulnerability checks to detect vulnerabilities accurately. SanerNow's integrated patch management approach enables organizations to remediate vulnerabilities on time and redu

    (4)4.6 out of 5
    Optimized for quick response

    Brinqa empowers customers to own their cyber risk with a unique, knowledge-driven approach to cybersecurity challenges. Brinqa Cyber Risk Graph - the knowledge graph for cybersecurity - connects all relevant security and business data, establishes a common risk language, and powers cybersecurity insights and outcomes. Brinqa Cyber Risk Services apply this knowledge to uniquely inform risk management strategies, standardize security data management and analysis, improve communication between team

    (3)4.8 out of 5

    Nucleus aggregates all vulnerability scans and information in the enterprise, automates vulnerability management workflows, and provides the business intelligence to track performance of the organization’s vulnerability management program and holistically monitor enterprise risk.

    ServiceNow Security Operations is an Enterprise Security Response engine offering security incident response, vulnerability response, configuration compliance, and threat intelligence. It’s built on the intelligent workflows, automation, orchestration, and deep connection with IT of the ServiceNow platform.

    Frontline Vulnerability Manager™ (Frontline VM™) by Digital Defense provides vulnerability scanning and management that is centralized, powerful, and user friendly. Reports deliver accurate, actionable results that include prioritization features such as security rating and peer comparisons. Delivered via SaaS platform, Frontline VM is lightweight, flexible, and easy to integrate. Learn more at https://www.digitaldefense.com/platform/frontline-vm/

    (2)4.3 out of 5
    Optimized for quick response

    Warden is a Cloud Security Posture Management (CSPM) solution that helps organizations using AWS and GCP infrastructure to configure their infrastructure according to globally recognized compliance standards, without requiring any cloud expertise. Stop the most common cause of cloud data breaches today with Warden, for faster and more secure innovation. Warden is listed on AWS Marketplace, where you can use its 1-Click deployment to launch Warden and pay for it on your AWS bill.

    Recorded Future delivers the world’s most technically advanced security intelligence to disrupt adversaries, empower defenders, and protect organizations. With proactive and predictive intelligence for security operations and response, threat analysis, third-party risk, vulnerability management, brand protection, and geopolitical risk, Recorded Future amplifies the impact of deployed security solutions. Recorded Future provides elite, context-rich, actionable intelligence in real time that’s int

    Gathering targeted and actionable intelligence, Argos pools both technological and human resources to generate real-time incidents of targeted attacks, data leakage and stolen credentials compromising your organization.

    (1)4.5 out of 5

    Prioritize remediation based on AI algorithm calculated cyber score, and get continuous reports on your security posture and security team performance.

    (1)3.5 out of 5

    RiskSense empowers enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. And not just for your network and end points, but for a growing attack surface!

    (1)5.0 out of 5

    Tripwire provides an enterprise-class vulnerability management solution that accurately prioritizes risk so you can take action on your most exposed assets.

    0 ratings

    Balbix replaces legacy vulnerability tools and multiple point products to continuously assess your enterprise’s cybersecurity posture and implement 2246.

    0 ratings

    BMC Helix Remediate uses advanced analytics and automation to rapidly remediate security vulnerabilities for both on-premises and cloud-based infrastructure.

    0 ratings

    BMC Helix Vulnerability Management Uses advanced analytics and automation to quickly remediate vulnerabilities

    0 ratings

    Cybellum empowers automotive OEMs and suppliers to identify and remediate security risks at scale, throughout the entire vehicle life cycle. Our agentless solution scans embedded software components without needing access to their source code, exposing all cyber vulnerabilities. Manufacturers can then take immediate actions and eliminate any cyber risk in the development and production process, before any harm is done, while continuously monitor for emerging threats impacting vehicles on the r

    0 ratings

    CyCognito’s global bot network operates at nation-state scale, using sophisticated reconnaissance techniques to continuously scan, map and fingerprint billions of digital assets all over the world.

    0 ratings

    Solving the problem of vulnerabilities & compliance when using Open Source in commercial product development

    0 ratings

    Rethink vulnerability management. Optimize your security workflow by drastically reducing time spent into managing and prioritizing. Increase speed and visibility by centralizing your team and the leading security tools into one simple interface.

    0 ratings

    Don’t base your vulnerability prioritization on assumptions. Use predictive threat intelligence to make smarter and faster decisions on what to remediate, and when. Powered by Cyr3con threat intelligence, our unique risk-based vulnerability management solution Farsight helps you prioritize vulnerabilities in the context of exploitability for faster remediation. Our risk rating integrates seamlessly with our internal and external network security solutions by ranking and predicting the most aggr

    0 ratings

    Hackuity’s platform aggregates and normalizes all your security assessment practices, whether automated or handmade, and enrich them with AI-driven predictive models so security practitioners can, at last, create risk-driven remediation plans and align their priorities with their current and future exposure to threats.

    0 ratings

    24x7 alerts and detection for security vulnerabilities. Industry-standard, open-source, vulnerability scans. Automated alerts when something changes. Manage target list manually or import automatically from providers, such as AWS, DigitalOcean, and Linode, with read-only access.

    0 ratings

    Scanners find millions of vulnerabilities in our customers' environments, overwhelming remediation efforts. NetSPI Resolve scales to these massive data needs to help lessen the vulnerability flood.

    0 ratings

    NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that matter. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence – including malware, exploit, patching and social media feeds to predict the true probability of attacks. It replaces manual remediation tasks wi

    0 ratings

    0 ratings

    Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.

    Select Grid® View
    Select Company Size
    G2 Grid® for Risk-Based Vulnerability Management
    Filter Grid®
    Filter Grid®
    Select Grid® View
    Select Company Size
    Check out the G2 Grid® for the top Risk-Based Vulnerability Management Software products. G2 scores products and sellers based on reviews gathered from our user community, as well as data aggregated from online sources and social networks. Together, these scores are mapped on our proprietary G2 Grid®, which you can use to compare products, streamline the buying process, and quickly identify the best products based on the experiences of your peers.
    Leaders
    High Performers
    Contenders
    Niche
    Resolver
    Kenna Security
    Tenable.io
    InsightVM (Nexpose)
    Tenable.sc
    Market Presence
    Satisfaction
    Published: