# Best Enterprise Risk-Based Vulnerability Management Software

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Products classified in the overall Risk-Based Vulnerability Management category are similar in many regards and help companies of all sizes solve their business problems. However, enterprise business features, pricing, setup, and installation differ from businesses of other sizes, which is why we match buyers to the right Enterprise Business Risk-Based Vulnerability Management to fit their needs. Compare product ratings based on reviews from enterprise users or connect with one of G2&#39;s buying advisors to find the right solutions within the Enterprise Business Risk-Based Vulnerability Management category.

In addition to qualifying for inclusion in the Risk-Based Vulnerability Management Software category, to qualify for inclusion in the Enterprise Business Risk-Based Vulnerability Management Software category, a product must have at least 10 reviews left by a reviewer from an enterprise business.





## Category Overview

**Total Products under this Category:** 194


## Trust & Credibility Stats

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,400+ Authentic Reviews
- 194+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.



---

**Sponsored**

### Upwind

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric that maps your environment as it runs - revealing what’s truly at risk, what’s actively happening, and how to respond quickly and effectively. With Upwind, security, dev, and ops teams move faster, stay focused, and fix risks that matter most.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2246&amp;secure%5Bdisplayable_resource_id%5D=2246&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2246&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1333227&amp;secure%5Bresource_id%5D=2246&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Frisk-based-vulnerability-management%3Fpage%3D5&amp;secure%5Btoken%5D=185600ac7c2490bbdadab672cc1005995d1707ffb5096c6de8065444fdd946c6&amp;secure%5Burl%5D=https%3A%2F%2Fwww.upwind.io&amp;secure%5Burl_type%5D=custom_url&amp;secure%5Bvisitor_segment%5D=180)

---

## Top-Rated Products (Ranked by G2 Score)
### 1. [Recorded Future](https://www.g2.com/products/recorded-future/reviews)
  Recorded Future is the world’s largest threat intelligence company. Recorded Future’s Intelligence Cloud provides end-to-end intelligence across adversaries, infrastructure, and targets. Indexing the internet across the open web, dark web, and technical sources, Recorded Future provides real-time visibility into an expanding attack surface and threat landscape, empowering clients to act with speed and confidence to reduce risk and securely drive business forward. Headquartered in Boston with offices and employees around the world, Recorded Future works with over 1,900 businesses and government organizations across 80 countries to provide real-time, unbiased and actionable intelligence. Learn more at recordedfuture.com.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 218

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 8.4/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.9/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Recorded Future](https://www.g2.com/sellers/recorded-future)
- **Company Website:** https://www.recordedfuture.com
- **Year Founded:** 2009
- **HQ Location:** Somerville, US
- **Twitter:** @RecordedFuture (108,193 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/678036/ (1,149 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Threat Intelligence Analyst, Cyber Threat Intelligence Analyst
  - **Top Industries:** Financial Services, Information Technology and Services
  - **Company Size:** 68% Enterprise, 19% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (100 reviews)
- Features (96 reviews)
- Threat Intelligence (68 reviews)
- Threat Detection (65 reviews)
- Insights (64 reviews)

**Cons:**

- Complexity (38 reviews)
- Expensive (36 reviews)
- Learning Curve (30 reviews)
- Insufficient Information (26 reviews)
- Difficult Learning (25 reviews)

### 2. [Tenable Vulnerability Management](https://www.g2.com/products/tenable-vulnerability-management/reviews)
  Tenable Vulnerability Management provides a risk-based approach to identifying, prioritizing, and remediating vulnerabilities across your entire attack surface. Powered by Nessus technology and AI-driven analytics, it goes beyond CVSS scores to assess exploitability, asset criticality, and business impact—so you can focus on what matters most. With continuous visibility, automated scanning, and real-time risk insights, security teams can quickly expose and close critical vulnerabilities before they’re exploited. Advanced asset identification ensures accurate tracking in dynamic environments, while intuitive dashboards, comprehensive reporting, and seamless third-party integrations help streamline workflows. As a cloud-based solution, Tenable Vulnerability Management scales with your organization, empowering security teams to maximize efficiency, reduce risk, and improve resilience against evolving threats.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 112

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Reporting:** 8.1/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.2/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **Company Website:** https://www.tenable.com/
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,651 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,357 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 55% Enterprise, 34% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (12 reviews)
- Scanning Efficiency (10 reviews)
- Vulnerability Identification (10 reviews)
- Automated Scanning (7 reviews)
- Features (7 reviews)

**Cons:**

- Expensive (6 reviews)
- Pricing Issues (6 reviews)
- Complexity (5 reviews)
- Inadequate Reporting (5 reviews)
- Limited Reporting (5 reviews)

### 3. [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews)
  Arctic Wolf® is the market leader in security operations. Using the cloud-native Arctic Wolf® Platform, we help organizations end cyber risk by providing security operations as a concierge service. Arctic Wolf solutions include Arctic Wolf® Managed Detection and Response (MDR), Managed Risk, and Managed Security Awareness —each delivered by the industry’s original Concierge Security® Team. Highly-trained Concierge Security experts work as an extension of internal teams to provide 24x7 monitoring, detection, and response, as well as ongoing risk management to give organizations the protection, resilience and guidance they need to defend against cyber threats. Visit arcticwolf.com to get the latest industry resources and learn more about our solutions.


  **Average Rating:** 4.7/5.0
  **Total Reviews:** 275

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.5/10 (Category avg: 9.3/10)
- **Reporting:** 9.5/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.6/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.6/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Arctic Wolf Networks](https://www.g2.com/sellers/arctic-wolf-networks)
- **Company Website:** https://www.arcticwolf.com
- **Year Founded:** 2012
- **HQ Location:** Eden Prairie, MN
- **Twitter:** @AWNetworks (4,497 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2760138/ (3,382 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** IT Manager, IT Director
  - **Top Industries:** Hospital &amp; Health Care, Information Technology and Services
  - **Company Size:** 71% Mid-Market, 20% Enterprise


#### Pros & Cons

**Pros:**

- Customer Support (58 reviews)
- Threat Detection (47 reviews)
- Cybersecurity (28 reviews)
- Ease of Use (27 reviews)
- Alerts (22 reviews)

**Cons:**

- Expensive (10 reviews)
- False Positives (7 reviews)
- Learning Curve (7 reviews)
- Cybersecurity Risks (6 reviews)
- Dashboard Issues (5 reviews)

### 4. [Check Point Exposure Management](https://www.g2.com/products/check-point-exposure-management/reviews)
  Exposure Management isn’t just a buzzword, it’s the future of cybersecurity. Attackers move fast, exploiting misconfigurations, leaked credentials, and control gaps before patch cycles even start. Traditional tools give you dashboards and alerts, but visibility without action is just noise. Check Point’s latest innovation changes the game. By combining billions of internal telemetry points from Check Point’s global footprint with billions of external signals from the open, deep, and dark web via Cyberint, we deliver a Unified Intelligence Fabric that provides complete clarity across your attack surface. The industry is moving from fragmented feeds to real context on what’s an actual priority. Further prioritization is enabled through active validation of the threats, confirmation of compensating controls and deduplication of alerts between tools. Then, with Veriti’s safe-by-design remediation, we’re not just assigning tickets to the ether. Fixes are actually implemented. Every fix is validated before enforcement, meaning exposures are remediated without downtime, and risk reduction becomes measurable. Gartner predicts organizations adopting CTEM with mobilization will see 50% fewer successful attacks by 2028, and we’re leading that charge with action, not just tickets. Ready to see how exposure management done right looks? Get a 15-minute demo and experience preemptive security in action \&gt; https://l.cyberint.com/em-demo


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 168

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 9.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Check Point Software Technologies](https://www.g2.com/sellers/check-point-software-technologies)
- **Company Website:** https://www.checkpoint.com/
- **Year Founded:** 1993
- **HQ Location:** Redwood City, CA
- **Twitter:** @CheckPointSW (70,998 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/check-point-software-technologies/ (8,356 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Threat Analyst, Cyber Security Analyst
  - **Top Industries:** Banking, Financial Services
  - **Company Size:** 69% Enterprise, 20% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (64 reviews)
- Threat Intelligence (63 reviews)
- Threat Detection (52 reviews)
- Insights (41 reviews)
- Customer Support (39 reviews)

**Cons:**

- Inefficient Alerts (21 reviews)
- False Positives (15 reviews)
- Inefficient Alert System (15 reviews)
- Integration Issues (11 reviews)
- Limited Features (11 reviews)

### 5. [HackerOne Platform](https://www.g2.com/products/hackerone-hackerone-platform/reviews)
  HackerOne is a global leader in Continuous Threat Exposure Management (CTEM). The HackerOne Platform unites agentic AI solutions with the ingenuity of the world’s largest community of security researchers to continuously discover, validate, prioritize, and remediate exposures across code, cloud, and AI systems. Through solutions like bug bounty, vulnerability disclosure, agentic pentesting, AI red teaming, and code security, HackerOne delivers measurable, continuous reduction of cyber risk for enterprises. Industry leaders, including Anthropic, Crypto.com, General Motors, Goldman Sachs, Lufthansa, Uber, UK Ministry of Defence, and the U.S. Department of Defense, trust HackerOne to safeguard their digital ecosystems. HackerOne was recognized in Gartner’s Emerging Tech Impact Radar: AI Cybersecurity Ecosystem report for its leadership in AI Security Testing and has been named a Most Loved Workplace for Young Professionals (2024).


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 64

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)


**Seller Details:**

- **Seller:** [HackerOne](https://www.g2.com/sellers/hackerone)
- **Company Website:** https://hackerone.com
- **Year Founded:** 2012
- **HQ Location:** San Francisco, California
- **Twitter:** @Hacker0x01 (335,787 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/hackerone/ (6,444 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 42% Mid-Market, 41% Enterprise


#### Pros & Cons

**Pros:**

- Ease of Use (19 reviews)
- Helpful (12 reviews)
- Collaboration (11 reviews)
- Security Protection (11 reviews)
- Customer Support (10 reviews)

**Cons:**

- Complexity Issues (5 reviews)
- Expensive (5 reviews)
- Time Management (5 reviews)
- Poor Customer Support (4 reviews)
- Poor Interface Design (4 reviews)

### 6. [Bitsight](https://www.g2.com/products/bitsight/reviews)
  Bitsight is the global leader in cyber risk intelligence, leveraging advanced AI to empower organizations with precise insights derived from the industry’s most extensive external cybersecurity dataset. With more than 3,500 customers and over 68,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure, enabling teams to rapidly identify vulnerabilities, detect emerging threats, prioritize remediation, and mitigate risks across their extended attack surface. Bitsight proactively uncovers security gaps across infrastructure, cloud environments, digital identities, and third- and fourth-party ecosystems. From security operations and governance teams to executive boardrooms, Bitsight provides the unified intelligence backbone required to confidently manage cyber risk and address exposures before they impact performance.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 75

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Reporting:** 7.4/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 7.4/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 7.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Bitsight](https://www.g2.com/sellers/bitsight)
- **Company Website:** https://www.bitsight.com/
- **Year Founded:** 2011
- **HQ Location:** Boston, MA
- **Twitter:** @BitSight (4,497 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/bitsight/ (740 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 72% Enterprise, 23% Mid-Market


#### Pros & Cons

**Pros:**

- Security (15 reviews)
- Risk Management (14 reviews)
- Ease of Use (13 reviews)
- Features (11 reviews)
- Customer Support (9 reviews)

**Cons:**

- Missing Features (6 reviews)
- Lack of Clarity (5 reviews)
- Poor Notifications (4 reviews)
- Slow Performance (4 reviews)
- Delay Issues (3 reviews)

### 7. [SAFE](https://www.g2.com/products/safe-security-safe/reviews)
  SAFE has reinvented cyber risk management with Agentic AI. The company helps CISOs, TPRM, and GRC leaders become strategic business partners by automating the understanding, prioritization and management of cyber risk—accelerating AI adoption and digital transformation. SAFE is the #1 platform to unify the management of all cyber risks—enterprise, third-party, and AI-related—and deliver autonomous cyber risk management through a fleet of specialized AI agents. Its platform replaces manual effort with agentic automation, backed by the world’s most trusted risk standards. Trusted by hundreds of global organizations, SAFE has more than doubled revenue three years in a row and raised $100M+ to fuel the future of cyber risk automation.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 59

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 7.4/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.1/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Safe Security](https://www.g2.com/sellers/safe-security)
- **Company Website:** https://safe.security
- **Year Founded:** 2012
- **HQ Location:** Palo Alto, US
- **Twitter:** @safecrq (3,258 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/safesecurity-inc/ (1,208 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Hospital &amp; Health Care
  - **Company Size:** 73% Enterprise, 13% Mid-Market


#### Pros & Cons

**Pros:**

- Risk Management (24 reviews)
- Customer Support (13 reviews)
- Features (11 reviews)
- Integrations (11 reviews)
- Ease of Use (10 reviews)

**Cons:**

- Missing Features (10 reviews)
- Information Management (3 reviews)
- Integration Issues (3 reviews)
- Limited Customization (3 reviews)
- Confusing Interface (2 reviews)

### 8. [ServiceNow Security Operations](https://www.g2.com/products/servicenow-security-operations/reviews)
  ServiceNow Security Operations is a sophisticated software solution designed to enhance threat and vulnerability management as well as incident response for organizations. By leveraging artificial intelligence, this platform empowers security teams to operate more efficiently and effectively, allowing for streamlined collaboration across IT, security, and risk management departments. The primary goal of ServiceNow Security Operations is to simplify complex security processes while minimizing risks associated with cybersecurity threats. Targeted at security teams within organizations of various sizes, ServiceNow Security Operations addresses the need for a cohesive approach to managing security incidents and vulnerabilities. It is particularly beneficial for organizations that utilize multiple security tools, as it integrates security and vulnerability data from these existing systems. This integration enables teams to respond to threats more rapidly by automating critical workflows and processes, thus reducing the manual effort traditionally required in incident response. Key features of ServiceNow Security Operations include intelligent workflows that automate routine tasks, allowing security professionals to focus on more strategic initiatives. The platform’s AI-driven capabilities facilitate the automatic correlation of threat intelligence from diverse sources, such as the MITRE ATT&amp;CK framework. This feature enhances situational awareness and enables teams to prioritize threats effectively based on real-time data. Additionally, the ability to take action within other security or IT management tools from a centralized console streamlines operations, ensuring that teams can respond to incidents without unnecessary delays. Moreover, the use of digital security workflows and orchestration significantly accelerates tasks such as analysis, prioritization, and remediation. By automating these processes, organizations can not only improve their response times but also enhance their overall cybersecurity posture. The integration of AI-driven automation within the ServiceNow AI Platform® further strengthens the platform&#39;s capabilities, enabling organizations to drive cyber resilience and reduce their exposure to potential threats. In summary, ServiceNow Security Operations is a comprehensive solution that addresses the complexities of modern cybersecurity challenges. By automating and simplifying threat and vulnerability management, it empowers security teams to respond more effectively, thereby enhancing the overall security framework of an organization.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 36

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.7/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.4/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [ServiceNow](https://www.g2.com/sellers/servicenow)
- **Company Website:** https://www.servicenow.com/
- **Year Founded:** 2004
- **HQ Location:** Santa Clara, CA
- **Twitter:** @servicenow (54,215 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/29352/ (32,701 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 54% Enterprise, 21% Small-Business


#### Pros & Cons

**Pros:**

- Integration Capabilities (11 reviews)
- Integration Support (10 reviews)
- Ease of Use (9 reviews)
- Integrations (8 reviews)
- Incident Management (7 reviews)

**Cons:**

- Difficult Setup (4 reviews)
- Integration Issues (4 reviews)
- Licensing Issues (3 reviews)
- Complexity (2 reviews)
- Difficult Customization (2 reviews)

### 9. [Cortex Cloud](https://www.g2.com/products/cortex-cloud/reviews)
  Cortex Cloud by Palo Alto Networks, the next version of Prisma Cloud, understands a unified security approach is essential for effectively addressing AppSec, CloudSec, and SecOps. Connecting cloud security and SOC workflows enables teams to achieve holistic visibility, trace risk across the lifecycle, and correlate real-time threat activity with development and runtime contexts. Cortex Cloud is a unified platform built on three core pillars: data integration, AI-driven intelligence, and automation. Now you can safeguard applications, data, and infrastructure across multicloud and hybrid environments with a unified data model that consolidates telemetry from code, runtime, identity, and endpoints, all into a single data source. Empower teams with precise, AI-powered insights and 2200+ machine learning models to identify and stop zero-day threats with real-time advanced threat detection and response. And automate with 1000+ prebuilt playbooks across your cloud stack to reduce manual workloads, accelerate remediations, and cut response times tenfold. Cortex Cloud delivers more than tools—it transforms how organizations secure their cloud environments.


  **Average Rating:** 4.1/5.0
  **Total Reviews:** 110

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.0/10 (Category avg: 9.3/10)
- **Reporting:** 7.8/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 7.5/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Company Website:** https://www.paloaltonetworks.com
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,788 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 38% Enterprise, 31% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (49 reviews)
- Features (45 reviews)
- Security (43 reviews)
- Visibility (38 reviews)
- Cloud Integration (34 reviews)

**Cons:**

- Expensive (31 reviews)
- Difficult Learning (30 reviews)
- Learning Curve (29 reviews)
- Pricing Issues (24 reviews)
- Complex Setup (21 reviews)

### 10. [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews)
  Cisco Vulnerability Management (formerly Kenna.VM), the original SaaS risk-based vulnerability management platform, prioritizes vulnerabilities that pose a real risk, enabling Security and IT teams to focus their limited resources and remediate more efficiently. Cisco’s data science-driven prioritization evaluates both enterprise data and a wealth of data on real-world exploit activity and translates that context into actionable intelligence to guide remediation.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 200

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.7/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.1/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Cisco](https://www.g2.com/sellers/cisco)
- **Year Founded:** 1984
- **HQ Location:** San Jose, CA
- **Twitter:** @Cisco (721,495 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/cisco/ (95,742 employees on LinkedIn®)
- **Ownership:** NASDAQ:CSCO

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer
  - **Top Industries:** Information Technology and Services, Financial Services
  - **Company Size:** 76% Enterprise, 17% Mid-Market


### 11. [Qualys VMDR](https://www.g2.com/products/qualys-vmdr/reviews)
  Qualys VMDR is an all-in-one risk-based vulnerability management solution that quantifies cyber risk. It gives organizations unprecedented insights into their risk posture and provides actionable steps to reduce risk. It also gives cybersecurity and IT teams a shared platform to collaborate, and the power to quickly align and automate no-code workflows to respond to threats with automated remediation and integrations with ITSM solutions such as ServiceNow.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 164

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.7/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.5/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Qualys](https://www.g2.com/sellers/qualys)
- **Year Founded:** 1999
- **HQ Location:** Foster City, CA
- **Twitter:** @qualys (34,191 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/8561/ (3,564 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Security Engineer
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Enterprise, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Customer Support (2 reviews)
- Features (2 reviews)
- Vulnerability Detection (2 reviews)
- Vulnerability Identification (2 reviews)
- Alerting System (1 reviews)

**Cons:**

- Complexity (2 reviews)
- Complex Reporting (1 reviews)
- Complex Setup (1 reviews)
- Difficult Learning (1 reviews)
- Feature Complexity (1 reviews)

### 12. [ZeroFox](https://www.g2.com/products/zerofox/reviews)
  ZeroFox is the solution used to illuminate threat actor intent, mitigate threats and exposures, remove threats from the internet, and preemptively safeguard your reputation. ZeroFox uniquely fuses the core capabilities of Cyber Threat Intelligence, Brand and Domain Protection, Attack Surface Intelligence, Executive Protection and Physical Security Intelligence in one platform packed with intelligence you’ll actually use. ZeroFox defends your business from the everyday attacks that impact revenue, erode trust, and frustrate teams by: Discovering exposed assets, brands, domains, accounts, and emerging threats Validating the risks that matter most to you and your digital estate Disrupting attacks before they harm your business, your customers, and your people Our continuous cycle—Discover, Validate, Disrupt—delivers outcomes and helps organizations achieve deeper threat contextualization, faster detection and response times, and longer-term cost savings by anticipating, understanding, and mitigating external digital threats at scale. Join thousands of customers, including some of the largest public sector organizations and leaders in finance, media, technology, retail, and healthcare, and let ZeroFox deliver timely, personal, and usable intelligence so you can stay ahead of what’s next and reclaim what’s right.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 129

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Reporting:** 9.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.8/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [ZeroFox](https://www.g2.com/sellers/zerofox)
- **Company Website:** https://www.zerofox.com
- **Year Founded:** 2013
- **HQ Location:** Baltimore, MD
- **Twitter:** @ZeroFOX (5,206 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/2890672 (885 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 45% Enterprise, 28% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (35 reviews)
- Protection (32 reviews)
- Threat Detection (28 reviews)
- Alert Notifications (23 reviews)
- Alerts (22 reviews)

**Cons:**

- Inefficient Alerts (24 reviews)
- False Alarms (16 reviews)
- Slow Performance (14 reviews)
- False Positives (12 reviews)
- Inefficient Alert System (11 reviews)

### 13. [Tenable Security Center](https://www.g2.com/products/tenable-security-center/reviews)
  Tenable Security Center (formerly Tenable.sc) is the industry&#39;s most comprehensive risk-based vulnerability management (RBVM) solution, enabling you to: • See all your vulnerabilities and continuously assess all assets the moment they join the network -- including transient devices that aren’t regularly connected • Predict what matters by understanding vulnerabilities in the context of business risk, as well as the criticality of affected assets • Act on each high priority vulnerability to effectively manage risk, and measure KPIs to effectively communicate effectiveness Legacy vulnerability management tools weren&#39;t designed to handle the modern attack surface and the growing number of threats that come with them. Instead, they’re limited to a theoretical view of risk, leading security teams to waste the majority of their time chasing after the wrong issues while missing many of the most critical vulnerabilities that pose the greatest risk to the business. By taking a risk-based approach to vulnerability management, Tenable.sc enables security teams to focus on the vulnerabilities and assets that matter most, so they can address the organization’s true business risk instead of wasting their valuable time on vulnerabilities that have a low likelihood of being exploited. Tenable delivers the most comprehensive risk-based vulnerability management solution available to help you prioritize your remediation efforts, so you can take decisive action to reduce the greatest amount of business risk with the least amount of effort.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 73

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.5/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Tenable](https://www.g2.com/sellers/tenable)
- **HQ Location:** Columbia, MD
- **Twitter:** @TenableSecurity (87,651 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/25452/ (2,357 employees on LinkedIn®)
- **Ownership:** NASDAQ: TENB

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security, Banking
  - **Company Size:** 59% Enterprise, 24% Mid-Market


#### Pros & Cons

**Pros:**

- Features (2 reviews)
- Compliance Management (1 reviews)
- Customer Support (1 reviews)
- Cybersecurity (1 reviews)
- Dashboard Design (1 reviews)

**Cons:**

- Complexity (1 reviews)
- Complex Queries (1 reviews)
- Complex Setup (1 reviews)
- Difficult Setup (1 reviews)
- Integration Issues (1 reviews)

### 14. [Pentera](https://www.g2.com/products/pentera/reviews)
  Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. Its customers include Casey&#39;s General Stores, Emeria, LuLu International Exchange, IP Telecom PT, BrewDog, City National Bank, Schmitz Cargobull, and MBC Group. Pentera is backed by leading investors such as K1 Investment Management, Insight Partners, Blackstone, Evolution Equity Partners, and AWZ. Visit https://pentera.io for more information.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 141

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Reporting:** 8.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.4/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Pentera](https://www.g2.com/sellers/pentera)
- **Company Website:** https://pentera.io/
- **Year Founded:** 2015
- **HQ Location:** Boston, MA
- **Twitter:** @penterasec (3,327 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/penterasecurity/ (486 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Banking, Information Technology and Services
  - **Company Size:** 51% Enterprise, 40% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (9 reviews)
- Vulnerability Identification (8 reviews)
- Automation (7 reviews)
- Customer Support (7 reviews)
- Security (6 reviews)

**Cons:**

- Inadequate Reporting (3 reviews)
- Access Control (2 reviews)
- False Positives (2 reviews)
- Limited Reporting (2 reviews)
- Missing Features (2 reviews)

### 15. [InsightVM (Nexpose)](https://www.g2.com/products/insightvm-nexpose/reviews)
  InsightVM is Rapid7’s vulnerability risk management offering that advances security through cross-department clarity, a deeper understanding of risk, and measurable progress. By informing and aligning technical teams, security teams can remediate vulnerabilities and build Security into the core of the organization. With InsightVM, security teams can: Gain Clarity Into Risk and Across Teams Better understand the risk in your modern environment so you can work in lockstep with technical teams. Extend Security’s Influence Align traditionally siloed teams and drive impact with the shared view and common language of InsightVM. See Shared Progress Take a proactive approach to security with tracking and metrics that create accountability and recognize progress.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 69

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.3/10 (Category avg: 9.3/10)
- **Reporting:** 8.4/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.1/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Rapid7](https://www.g2.com/sellers/rapid7)
- **Year Founded:** 2000
- **HQ Location:** Boston, MA
- **Twitter:** @rapid7 (124,150 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/39624/ (3,249 employees on LinkedIn®)
- **Ownership:** NASDAQ:RPD

**Reviewer Demographics:**
  - **Top Industries:** Information Technology and Services, Computer &amp; Network Security
  - **Company Size:** 51% Enterprise, 32% Mid-Market


#### Pros & Cons

**Pros:**

- Automation (4 reviews)
- Vulnerability Identification (4 reviews)
- Asset Management (3 reviews)
- Features (3 reviews)
- Prioritization (3 reviews)

**Cons:**

- Complexity (3 reviews)
- Performance Issues (2 reviews)
- Resource Limitations (2 reviews)
- Resource Management (2 reviews)
- Time-Consuming (2 reviews)

### 16. [Titania Nipper](https://www.g2.com/products/titania-nipper/reviews)
  Award-winning Risk-Based Vulnerability Management. Nipper solutions analyze network device configurations in the way Advances Persistent Threat (APT) groups do, to identify misconfigurations that could create attack paths. This analysis offers unparalleled, pen-tester accuracy, finding critical vulnerabilities in firewalls, routers, switches that other tools simply cannot see. Our solutions then prioritize the biggest risks to your business and provide device-specific remediation guidance, right down to specific command line prompts.  By analyzing device configurations against key compliance standards and security frameworks (including STIGs/CIS Benchmarks/PCI DSS/CMMC/CORA/NIST SP 800-53), Nipper solutions tell you precisely which devices are at risk of failing, how significant that risk is, and how you can solve it, with auditor-ready reports. Whether your focus is taking pragmatic, risk-based security measures to minimize known vulnerabilities or ensuring compliance with industry security standards, Nipper solutions provide the targeted insights you need. No other security provider looks at the network in the same way. That’s why Nipper can uniquely provide the network configuration coverage that organizations urgently require. 30+ U.S. federal agencies and 800+ organizations globally trust Nipper solutions to deliver vulnerability analysis and compliance automation while supporting air-gapped environments, sovereign cloud requirements, and complex regulated infrastructures.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 24

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.0/10 (Category avg: 9.3/10)
- **Reporting:** 9.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 2.5/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Titania](https://www.g2.com/sellers/titania)
- **Company Website:** https://www.titania.com
- **Year Founded:** 2009
- **HQ Location:** London, GB
- **Twitter:** @TitaniaLtd (2,828 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/titania-ltd/ (99 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 46% Enterprise, 21% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (10 reviews)
- Reporting Quality (6 reviews)
- Scanning Efficiency (4 reviews)
- Vulnerability Detection (4 reviews)
- Clear Interface (3 reviews)

**Cons:**

- Licensing Issues (3 reviews)
- False Positives (2 reviews)
- Lack of Cloud Support (2 reviews)
- Limited Compatibility (2 reviews)
- Limited Scope (2 reviews)

### 17. [Microsoft Defender Vulnerability Management](https://www.g2.com/products/microsoft-defender-vulnerability-management/reviews)
  Defender Vulnerability Management delivers asset visibility, intelligent assessments, and built-in remediation tools for Windows, macOS, Linux, Android, iOS, and network devices. Leveraging Microsoft threat intelligence, breach likelihood predictions, business contexts, and devices assessments, Defender Vulnerability Management rapidly and continuously prioritizes the biggest vulnerabilities on your most critical assets and provides security recommendations to mitigate risk. Reduce risk with continuous vulnerability assessment, risk-based prioritization, and remediation. Defender Vulnerability Management is available for cloud workloads and endpoints. Defender for Endpoint Plan 2 customers can access advanced vulnerability management capabilities with the Defender Vulnerability Management add-on, now generally available.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 34

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.6/10 (Category avg: 9.3/10)
- **Reporting:** 8.7/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.8/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Microsoft](https://www.g2.com/sellers/microsoft)
- **Year Founded:** 1975
- **HQ Location:** Redmond, Washington
- **Twitter:** @microsoft (13,114,353 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/microsoft/ (227,697 employees on LinkedIn®)
- **Ownership:** MSFT

**Reviewer Demographics:**
  - **Top Industries:** Computer &amp; Network Security
  - **Company Size:** 41% Small-Business, 35% Enterprise


### 18. [Flashpoint](https://www.g2.com/products/flashpoint/reviews)
  Flashpoint is the largest privately held threat intelligence provider, enabling mission-critical organizations to proactively confront security challenges globally. Flashpoint Ignite, our unified threat intelligence platform, harnesses the power of primary-source collections, curated human insight, and artificial intelligence to deliver decisive action against a comprehensive range of critical threats. Core Capabilities: → Identify and remediate cyber threats, fraud, vulnerabilities, physical security, and national security risks. → Access over 3.6 petabytes of continuously collected data from the internet’s open and difficult-to-access spaces. Add new channels and data sources in minutes to track sources as they surface. → Operationalize intelligence across your entire security stack with seamless integrations throughout the intelligence lifecycle.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 83

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.8/10 (Category avg: 9.3/10)
- **Reporting:** 8.3/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 7.5/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 7.9/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Flashpoint for Threat Intelligence](https://www.g2.com/sellers/flashpoint-for-threat-intelligence)
- **Year Founded:** 2010
- **HQ Location:** New York, NY
- **Twitter:** @FlashpointIntel (13,828 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/flashpoint-intel/ (358 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Security and Investigations
  - **Company Size:** 63% Enterprise, 23% Small-Business


#### Pros & Cons

**Pros:**

- Ease of Use (23 reviews)
- Features (21 reviews)
- Helpful (13 reviews)
- Insights (13 reviews)
- Search Functionality (12 reviews)

**Cons:**

- Lack of Features (8 reviews)
- Complexity (6 reviews)
- Confusing Interface (6 reviews)
- Limited Features (6 reviews)
- User Frustration (6 reviews)

### 19. [CloudBees](https://www.g2.com/products/cloudbees/reviews)
  The Complete DevOps solution. CloudBees empowers your software delivery teams to transform your business. CloudBees solution brings together development, operations, IT, security, and business teams to: Create fast with scalable repeatable workflows. Continuously improve customer experiences by progressively delivering features with speed and control. Command everything with higher-order visibility, management, and intelligence across tools, teams, pipelines, and process... all at enterprise scale.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 589

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 9.6/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.8/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.8/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [CloudBees](https://www.g2.com/sellers/cloudbees)
- **Company Website:** https://www.cloudbees.com
- **Year Founded:** 2010
- **HQ Location:** San Jose, CA
- **Twitter:** @CloudBees (39,255 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/1189836/ (516 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Who Uses This:** Software Engineer, DevOps Engineer
  - **Top Industries:** Information Technology and Services, Computer Software
  - **Company Size:** 48% Enterprise, 41% Mid-Market


#### Pros & Cons

**Pros:**

- Features (5 reviews)
- Reliability (5 reviews)
- Customization (4 reviews)
- Ease of Use (4 reviews)
- Integrations (4 reviews)

**Cons:**

- Complex Interface (2 reviews)
- Complexity (2 reviews)
- Complex Setup (2 reviews)
- Complex User Interface (2 reviews)
- Configuration Issues (2 reviews)

### 20. [Palo Alto Cortex XSIAM](https://www.g2.com/products/palo-alto-cortex-xsiam/reviews)
  Product Description: Palo Alto Networks&#39; Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.


  **Average Rating:** 4.4/5.0
  **Total Reviews:** 61

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.4/10 (Category avg: 9.3/10)
- **Reporting:** 10.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Palo Alto Networks](https://www.g2.com/sellers/palo-alto-networks)
- **Year Founded:** 2005
- **HQ Location:** Santa Clara, CA
- **Twitter:** @PaloAltoNtwks (128,788 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/30086/ (21,355 employees on LinkedIn®)
- **Ownership:** NYSE: PANW

**Reviewer Demographics:**
  - **Who Uses This:** Information Security Engineer
  - **Top Industries:** Computer &amp; Network Security, Information Technology and Services
  - **Company Size:** 48% Enterprise, 29% Mid-Market


#### Pros & Cons

**Pros:**

- Ease of Use (50 reviews)
- Threat Detection (37 reviews)
- Integrations (28 reviews)
- Cybersecurity (27 reviews)
- Features (27 reviews)

**Cons:**

- Expensive (28 reviews)
- Difficult Learning (17 reviews)
- Complexity (14 reviews)
- Integration Issues (14 reviews)
- UX Improvement (12 reviews)

### 21. [Aqua Security](https://www.g2.com/products/aqua-security/reviews)
  Aqua Security sees and stops attacks across the entire cloud native application lifecycle in a single, integrated platform. From software supply chain security for developers to cloud security and runtime protection for security teams, Aqua helps customers reduce risk while building the future of their businesses. The Aqua Platform is the industry’s most comprehensive Cloud Native Application Protection Platform (CNAPP). Founded in 2015, Aqua is headquartered in Boston, MA and Ramat Gan, IL with Fortune 1000 customers in over 40 countries.


  **Average Rating:** 4.2/5.0
  **Total Reviews:** 57

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 4.2/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 7.8/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 7.2/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Aqua Security Software Ltd](https://www.g2.com/sellers/aqua-security-software-ltd)
- **Year Founded:** 2015
- **HQ Location:** Burlington, US
- **Twitter:** @AquaSecTeam (7,690 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/aquasecteam/ (499 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Financial Services
  - **Company Size:** 56% Enterprise, 39% Mid-Market


#### Pros & Cons

**Pros:**

- Security (19 reviews)
- Ease of Use (18 reviews)
- Features (12 reviews)
- Detection (10 reviews)
- Vulnerability Identification (9 reviews)

**Cons:**

- Missing Features (9 reviews)
- Lack of Features (6 reviews)
- Limited Features (6 reviews)
- Difficult Navigation (4 reviews)
- Improvement Needed (4 reviews)

### 22. [KernelCare Enterprise](https://www.g2.com/products/kernelcare-enterprise/reviews)
  TuxCare’s live patching solution, KernelCare Enterprise, enables organizations to automate Linux vulnerability patching without needing to restart systems or experience downtime to apply patches – allowing them to accelerate patch timelines while eliminating patching-related maintenance windows. While other live patching solutions are typically limited to a single Linux distribution and come with a heftier price tag, KernelCare Enterprise delivers patches to all popular Linux distributions. Plus, KernelCare Enterprise features seamless interoperability with vulnerability scanners, security sensors, and automation and reporting tools. In addition to KernelCare Enterprise, TuxCare offers live patching solutions for shared libraries, databases, virtual machine environments, and IoT devices – so organizations can keep their Linux ecosystem updated with the latest patches without needing to waste time and resources planning for inconvenient reboots and downtime.


  **Average Rating:** 4.6/5.0
  **Total Reviews:** 21

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.4/10 (Category avg: 9.3/10)
- **Reporting:** 8.9/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.3/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [TuxCare](https://www.g2.com/sellers/tuxcare)
- **HQ Location:** Palo Alto, US
- **Twitter:** @TuxCare_ (1,217 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/showcase/tuxcare/ (26 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Computer Software, Computer &amp; Network Security
  - **Company Size:** 62% Enterprise, 24% Small-Business


### 23. [Fortra VM](https://www.g2.com/products/fortra-vm/reviews)
  Fortra VM is a proactive, risk-based vulnerability management solution that helps organizations identify, assess, and prioritize security weaknesses across their infrastructure. Beyond basic scanning, Fortra VM provides contextual risk prioritization through its Security GPA rating system, Peer Insight for industry benchmarking, and threat ranking to identify exploitation vectors that are used in real world attacks. Conveniently delivered via SAAS, Fortra VM creates easily understood reporting for efficient and effective remediation.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 67

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 9.1/10 (Category avg: 9.3/10)
- **Reporting:** 8.6/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 8.6/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 8.7/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Fortra](https://www.g2.com/sellers/fortra)
- **Year Founded:** 1982
- **HQ Location:** Eden Prairie, Minnesota
- **Twitter:** @fortraofficial (2,763 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/fortra (1,738 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Financial Services, Banking
  - **Company Size:** 45% Mid-Market, 35% Small-Business


#### Pros & Cons

**Pros:**

- Reliability (2 reviews)
- Customer Support (1 reviews)
- Data Security (1 reviews)
- Ease of Use (1 reviews)
- Incident Management (1 reviews)


### 24. [Brinqa](https://www.g2.com/products/brinqa/reviews)
  Brinqa is the only company that orchestrates the entire cyber risk lifecycle — understanding the attack surface, prioritizing vulnerabilities, automating remediation, and continuously monitoring cyber hygiene — across all security tools and programs. The Brinqa Attack Surface Intelligence Platform enables your organization to automate the cyber risk lifecycle across infrastructure, application and cloud security.


  **Average Rating:** 3.6/5.0
  **Total Reviews:** 16

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.5/10 (Category avg: 9.3/10)
- **Reporting:** 7.7/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 5.6/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 7.3/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [brinqa](https://www.g2.com/sellers/brinqa)
- **Year Founded:** 2009
- **HQ Location:** Austin, TX
- **Twitter:** @brinqa (479 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/339361/ (101 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Company Size:** 75% Enterprise, 19% Mid-Market


### 25. [Nucleus](https://www.g2.com/products/nucleus-security-inc-nucleus/reviews)
  Nucleus Security is a vulnerability and asset management solution that automates processes and workflows, enabling organizations to mitigate vulnerabilities 10 times faster, using a fraction of the resources that it takes to perform these tasks today. Nucleus aggregates, cleans, correlates, and analyzes data from all sources of asset and vulnerability data and organizes it into a logical hierarchy. Once the data is organized, Nucleus streamlines operational processes with efficient workflows and time-saving automation that accelerate vulnerability management and response.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 31

**User Satisfaction Scores:**

- **Has the product been a good partner in doing business?:** 8.9/10 (Category avg: 9.3/10)
- **Reporting:** 8.5/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 9.2/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 9.0/10 (Category avg: 8.8/10)


**Seller Details:**

- **Seller:** [Nucleus Security, Inc](https://www.g2.com/sellers/nucleus-security-inc)
- **Company Website:** https://www.nucleussec.com
- **Year Founded:** 2018
- **HQ Location:** Sarasota, Florida
- **Twitter:** @nucleussec (564 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/nucleussec (108 employees on LinkedIn®)

**Reviewer Demographics:**
  - **Top Industries:** Airlines/Aviation, Computer &amp; Network Security
  - **Company Size:** 53% Enterprise, 38% Mid-Market


#### Pros & Cons

**Pros:**

- Automation (1 reviews)
- Customization (1 reviews)
- Dashboard Customization (1 reviews)
- Dashboard Design (1 reviews)
- Dashboard Usability (1 reviews)

**Cons:**

- Inadequate Remediation (1 reviews)



## Parent Category

[Vulnerability Management Software](https://www.g2.com/categories/vulnerability-management)



## Related Categories

- [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)
- [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools)
- [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)




