  # Best Risk-Based Vulnerability Management Software - Page 8

  *By [Brandon Summers-Miller](https://research.g2.com/insights/author/brandon-summers-miller)*

   Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and [security risk analysis software](https://www.g2.com/categories/security-risk-analysis), but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

- Integrate threat intelligence and contextual data for analysis
- Analyze applications, networks, and cloud services for vulnerabilities
- Utilize risk factors and machine learning to prioritize vulnerabilities




  
## How Many Risk-Based Vulnerability Management Software Products Does G2 Track?
**Total Products under this Category:** 194

### Category Stats (May 2026)
- **Average Rating**: 4.51/5 (↓0.01 vs Apr 2026)
- **New Reviews This Quarter**: 49
- **Buyer Segments**: Enterprise 44% │ Small-Business 30% │ Mid-Market 27%
- **Top Trending Product**: ManageEngine Vulnerability Manager Plus (+0.167)
*Last updated: May 18, 2026*

  
## How Does G2 Rank Risk-Based Vulnerability Management Software Products?

**Why You Can Trust G2's Software Rankings:**

- 30 Analysts and Data Experts
- 4,500+ Authentic Reviews
- 194+ Products
- Unbiased Rankings

G2's software rankings are built on verified user reviews, rigorous moderation, and a consistent research methodology maintained by a team of analysts and data experts. Each product is measured using the same transparent criteria, with no paid placement or vendor influence. While reviews reflect real user experiences, which can be subjective, they offer valuable insight into how software performs in the hands of professionals. Together, these inputs power the G2 Score, a standardized way to compare tools within every category.

  
## Which Risk-Based Vulnerability Management Software Is Best for Your Use Case?

- **Leader:** [Arctic Wolf](https://www.g2.com/products/arctic-wolf/reviews)
- **Highest Performer:** [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews)
- **Easiest to Use:** [RiskProfiler - External Threat Exposure Management](https://www.g2.com/products/riskprofiler-external-threat-exposure-management/reviews)
- **Top Trending:** [Pentera](https://www.g2.com/products/pentera/reviews)
- **Best Free Software:** [Cisco Vulnerability Management (formerly Kenna.VM)](https://www.g2.com/products/cisco-vulnerability-management-formerly-kenna-vm/reviews)

  
---

**Sponsored**

### Upwind

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric that maps your environment as it runs - revealing what’s truly at risk, what’s actively happening, and how to respond quickly and effectively. With Upwind, security, dev, and ops teams move faster, stay focused, and fix risks that matter most.



[Visit website](https://www.g2.com/external_clickthroughs/record?secure%5Bad_program%5D=ppc&amp;secure%5Bad_slot%5D=category_product_list&amp;secure%5Bcategory_id%5D=2246&amp;secure%5Bdisplayable_resource_id%5D=2246&amp;secure%5Bdisplayable_resource_type%5D=Category&amp;secure%5Bmedium%5D=sponsored&amp;secure%5Bplacement_reason%5D=page_category&amp;secure%5Bplacement_resource_ids%5D%5B%5D=2246&amp;secure%5Bprioritized%5D=false&amp;secure%5Bproduct_id%5D=1333227&amp;secure%5Bresource_id%5D=2246&amp;secure%5Bresource_type%5D=Category&amp;secure%5Bsource_type%5D=category_page&amp;secure%5Bsource_url%5D=https%3A%2F%2Fwww.g2.com%2Fcategories%2Frisk-based-vulnerability-management%3Fpage%3D8&amp;secure%5Btoken%5D=1f71cd40dbfea5d228a7e18aa6b7e184faff986e7aab7ef3ffb703b56fd9ade4&amp;secure%5Burl%5D=https%3A%2F%2Fwww.upwind.io&amp;secure%5Burl_type%5D=custom_url)

---

  ## What Are the Top-Rated Risk-Based Vulnerability Management Software Products in 2026?
### 1. [SightGain Readiness Platform](https://www.g2.com/products/sightgain-readiness-platform/reviews)
  Tests and measures cyber readiness using real-world attack techniques safely executed in customer&#39;s live environment. From this we can determine if the cybersecurity systems are working, where problems exists, and make recommendations to improve before retesting. The SightGain Readiness Platform can be used to evaluate against frameworks (e.g. MITRE ATT&amp;CK, SOC 2, NIST 800-53, etc), training standards, purple teaming, and incorporated into risk frameworks to increase confidence levels. Focuses on providing action plans to optimize security. Produces empiric data SightGain is a Continuous readiness platform for organizations looking for cybersecurity risk assessment toolsand remediation strategies



**Who Is the Company Behind SightGain Readiness Platform?**

- **Seller:** [SightGain](https://www.g2.com/sellers/sightgain)
- **Year Founded:** 2016
- **HQ Location:** McLean, US
- **LinkedIn® Page:** https://www.linkedin.com/company/sightgain/ (6 employees on LinkedIn®)



### 2. [Silobreaker](https://www.g2.com/products/silobreaker/reviews)
  Silobreaker is an AI-native intelligence platform that unifies data, advanced analytics and human expertise to deliver high-quality insights where it matters most. Designed for security, threat and risk teams, the Silobreaker proprietary intelligence engine automates the collection, fusion and analysis of cyber, geopolitical and physical data. With PIR-driven workflows, agentic automation and executive-ready reporting, Silobreaker helps global enterprises and governments anticipate threats, accelerate decisions, protect their people, operations and assets, and build resilience with confidence.


  **Average Rating:** 4.3/5.0
  **Total Reviews:** 2

**Who Is the Company Behind Silobreaker?**

- **Seller:** [Silobreaker](https://www.g2.com/sellers/silobreaker)
- **Year Founded:** 2005
- **HQ Location:** London, GB
- **Twitter:** @Silobreaker (1,948 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/silobreaker/ (68 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 50% Enterprise, 50% Small-Business


### 3. [Software Vulnerability Manager](https://www.g2.com/products/software-vulnerability-manager/reviews)
  Software Vulnerability Manager allows you to identify, prioritize and remediate software vulnerabilities rapidly to dramatically reduce risk to your organization. Gain visibility over software vulnerabilities affecting your environment, and automate patch management tasks to accelerate your ability to respond to vulnerabilities. Enjoy security advisories covering more third-party software than any solution on the market, and prioritize and patch quickly leveraging the power of threat intelligence coupled with the largest third-party patch catalog on the market.


  **Average Rating:** 4.5/5.0
  **Total Reviews:** 2
**How Do G2 Users Rate Software Vulnerability Manager?**

- **Reporting:** 10.0/10 (Category avg: 8.8/10)
- **Vulnerability Intelligence:** 10.0/10 (Category avg: 8.7/10)
- **Risk-Prioritization:** 10.0/10 (Category avg: 8.8/10)

**Who Is the Company Behind Software Vulnerability Manager?**

- **Seller:** [Flexera](https://www.g2.com/sellers/flexera)
- **Year Founded:** 2008
- **HQ Location:** Itasca, IL
- **Twitter:** @flexera (4,733 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/574962/ (2,045 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market, 50% Enterprise


#### What Are Software Vulnerability Manager's Pros and Cons?

**Pros:**

- Reliability (2 reviews)
- Vulnerability Identification (2 reviews)
- Asset Management (1 reviews)
- Automation (1 reviews)
- Coverage Effectiveness (1 reviews)

**Cons:**

- Complexity (1 reviews)
- Confusing Interface (1 reviews)
- Difficult Setup (1 reviews)
- Installation Issues (1 reviews)
- Learning Curve (1 reviews)

### 4. [Stream Security](https://www.g2.com/products/stream-security/reviews)
  SecOps deserve better than raw cloud telemetry. Most tools patch over noise, ignoring the state of your cloud. We fix the root cause. Stream turns raw cloud telemetry into a stateful real-time model, powering risk-based detection and response.



**Who Is the Company Behind Stream Security?**

- **Seller:** [Stream.Security](https://www.g2.com/sellers/stream-security)
- **Year Founded:** 2020
- **HQ Location:** Tel Aviv, IL
- **LinkedIn® Page:** https://www.linkedin.com/company/streamsecurity (76 employees on LinkedIn®)



### 5. [TechGuard Security](https://www.g2.com/products/techguard-security/reviews)
  Our team of TechGuardians are highly educated and certified professionals who have utilized their extensive IT security experience to support both Fortune 500 businesses and multiple governmental agencies. We take a unique approach to protecting your critical infrastructure.



**Who Is the Company Behind TechGuard Security?**

- **Seller:** [TechGuard Security](https://www.g2.com/sellers/techguard-security)
- **Year Founded:** 2000
- **HQ Location:** O&#39;Fallon, US
- **Twitter:** @TGScyber (179 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/107631 (92 employees on LinkedIn®)



### 6. [Tenacy](https://www.g2.com/products/tenacy/reviews)
  Tenacy is the SaaS platform that simplifies cybersecurity management for all IT security teams. Thanks to intelligent modeling of frameworks and risks, Tenacy interconnects all your cyber processes. As a result, you can continuously measure your level of security, effectively monitor your operations, and unite all stakeholders around your cyber vision.



**Who Is the Company Behind Tenacy?**

- **Seller:** [Tenacy](https://www.g2.com/sellers/tenacy)
- **Year Founded:** 2019
- **HQ Location:** Lyon, FR
- **Twitter:** @Tenacy__ (81 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/tenacy-cybersecurity-management/ (50 employees on LinkedIn®)



### 7. [TENET](https://www.g2.com/products/tenet-tenet/reviews)
  TENET is a Cloud Risk Intelligence Platform that delivers unified visibility and proactive risk assessment across every Azure subscription and tenant. It serves as a single source of truth for identifying, prioritizing, and mitigating cloud risk at scale—enabling organizations to shift from reactive security posture management to continuous, intelligence-driven security operations. Key Features: - Attack Surface Management: Visualize attack paths, map risks to MITRE ATT&amp;CK techniques, and manage incidents and remediation tasks from a single unified platform. - Anomaly Detection: Detect anomalies early with real-time analysis across workloads, applications, identities, and cost to catch issues early before they impact your business. - Compliance Readiness: Stay audit-ready with continuous compliance monitoring, risk-based prioritization, and guided remediation that reduces effort and lowers audit costs. - Access Governance: Monitor human and non-human identities across Entra ID and RBAC, with clear visibility into who has access to what with no gaps. - AI Monitoring: Discover and monitor AI models, agents, and services across Azure, tracking performance, cost, and security to identify and prioritize AI-native risks. - AI-Powered Insights: Resolve issues faster with BriteAI — turn live data into insights, identify root causes using natural language, and automate remediation with full context via the TENET MCP server. Core Value: TENET helps reduce mean time to resolution (MTTR) through intelligent, automated remediation while eliminating blind spots with full-stack Azure visibility. It lowers compliance costs and audit overhead, enables teams to proactively detect and mitigate risks before they escalate into incidents, and scales security operations efficiently with AI-driven insights. For more information, visit https://aesonsolutions.com.



**Who Is the Company Behind TENET?**

- **Seller:** [AESON Solutions](https://www.g2.com/sellers/aeson-solutions)
- **Year Founded:** 2025
- **HQ Location:** Lodz, PL
- **LinkedIn® Page:** https://www.linkedin.com/company/aeson-solutions/ (1 employees on LinkedIn®)



### 8. [The Nanitor Continuous Threat Exposure Management (CTEM) Platform](https://www.g2.com/products/the-nanitor-continuous-threat-exposure-management-ctem-platform/reviews)
  Nanitor Continuous Threat Exposure Management (CTEM) Platform is an enterprise-grade cybersecurity solution built to help organizations continuously monitor, assess, and reduce their real security exposures - not just known vulnerabilities - across all IT assets. Rather than relying on periodic scans or patch-cycles, Nanitor implements a continuous, asset-centric, and risk-based approach to threat exposure. At its core, Nanitor’s CTEM platform transforms security from reactive patch-management into proactive, business-aligned risk management - giving leadership transparency over what matters most and security teams clarity on what to fix next.



**Who Is the Company Behind The Nanitor Continuous Threat Exposure Management (CTEM) Platform?**

- **Seller:** [Nanitor](https://www.g2.com/sellers/nanitor)
- **Year Founded:** 2014
- **HQ Location:** Reykjavík, IS
- **LinkedIn® Page:** http://www.linkedin.com/company/nanitor (12 employees on LinkedIn®)



### 9. [ThreatAware](https://www.g2.com/products/threataware/reviews)
  Know what’s protected and gain a trusted view of your endpoints. ThreatAware delivers verified visibility into endpoint security posture, enabling security and IT teams to answer the question, “Are we protected?” Within 30 minutes, teams gain a single source of truth across their endpoint estate. The platform continuously identifies devices, validates that security controls are working as intended, and unifies disconnected tools into one clear view, so teams can see what’s protected, where gaps exist, and where to focus remediation.



**Who Is the Company Behind ThreatAware?**

- **Seller:** [ThreatAware](https://www.g2.com/sellers/threataware)
- **Company Website:** https://threataware.com
- **Year Founded:** 2019
- **HQ Location:** London, GB
- **Twitter:** @Threat_Aware (171 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/14838071/ (34 employees on LinkedIn®)



### 10. [Thrivaca](https://www.g2.com/products/thrivaca/reviews)
  Utilize real-world insights into the impacts and dynamics driving digital risk. Know where, why, and how much digital risk is impacting the organization with Thrivaca. Efficiently direct cyber investment and effort to the largest sources of risk and address the areas of most significant impact. Demonstrate the relationship between cyber budget and mitigated risk through our T-Score and Cyber Efficiency Index. The Thrivaca platform provides comprehensive data and advanced quantitative processes: • Threat trend-tracking on your industry derived from over 9 million attacks per day • A machine learning algorithm that simulates actual threat actor patterns • Industry-specific risk-probability patterns derived from multi-year history • Top Gartner-rated vulnerability scanning technology • Delivered via a SOC 1 / SOC 2 cloud platform • Insurance-grade quantitative models that utilize actuarially-based risk valuations • Thrivaca M&amp;A provides pre-and post-merger analyses, identifying specific mitigation strategies, solutions, and cost-of-risk effects • Thrivaca CI provides the Cyber Insurance industry – underwriters and brokers – with rapid turnaround of any actuarially-driven risk valuation solution, with minimally invasive data collection • Thrivaca Cloud brings a complete ongoing analysis of all cloud environments individually and collectively including cloud migration and integration risk exposure at its sources • Fully auditable and traceable results, based on “Zero-Trust” principles throughout Arx Nimbus Thrivaca measures controls across the entire enterprise in alignment with regulator-mandated standards, including FFIEC, NIST 800-53, FERC, SANS, HIPAA, and ISO. Knowing the financial trade-offs of options and strategies allows companies to prioritize and invest with confidence and precision. Our accelerated delivery cycle allows for the rapid reprioritization of cyber solutions and actionable next steps.



**Who Is the Company Behind Thrivaca?**

- **Seller:** [Arx Nimbus](https://www.g2.com/sellers/arx-nimbus)
- **Year Founded:** 2016
- **HQ Location:** Chicago, US
- **LinkedIn® Page:** https://www.linkedin.com/company/arx-nimbus/ (12 employees on LinkedIn®)



### 11. [VulnDB](https://www.g2.com/products/vulndb/reviews)
  VulnDB® is the most comprehensive vulnerability database and timely source of intelligence available. It allows organizations to search for and be alerted on the latest vulnerabilities, both in end-user software and third-party libraries and dependencies.



**Who Is the Company Behind VulnDB?**

- **Seller:** [Risk Based Security](https://www.g2.com/sellers/risk-based-security)
- **Year Founded:** 2010
- **HQ Location:** New York, New York, United States
- **Twitter:** @riskbased (1,796 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/flashpoint-intel/ (395 employees on LinkedIn®)



### 12. [VULNERA](https://www.g2.com/products/vulnera/reviews)
  VULNERA is an end-to-end vulnerability management solution that accelerates vulnerability discovery, prioritization, and remediation. Continuous vulnerability scanning identifies assets, network services, and vulnerabilities across the organizations internal, external, and cloud environments. Risk-based vulnerability prioritization accompanied with asset criticality ratings maximizes risk-reduction, allowing resources to focus on the most critical issues on the most important assets. Remediation validation celebrates vulnerability management ROI, continuously identifying when and why vulnerabilities were remediated. A unified source of truth for the organizations assets and vulnerabilities, enabling communication across teams, and providing an objective view of the organizations security posture, exposure, and remediation efforts.



**Who Is the Company Behind VULNERA?**

- **Seller:** [VULNERA](https://www.g2.com/sellers/vulnera)
- **Year Founded:** 2022
- **HQ Location:** Los Angeles, US
- **LinkedIn® Page:** https://www.linkedin.com/company/vulnera/ (3 employees on LinkedIn®)



### 13. [Vulnerability and Compliance Scan](https://www.g2.com/products/vulnerability-and-compliance-scan/reviews)
  SecureVia simplifies securing and hardening business applications by giving you a prioritized list of vulnerabilities to be remediated. You don&#39;t need to be a security expert as we do the research and apply the best security standards automatically.



**Who Is the Company Behind Vulnerability and Compliance Scan?**

- **Seller:** [SecureVia](https://www.g2.com/sellers/securevia)
- **Year Founded:** 2020
- **HQ Location:** Acton, US
- **Twitter:** @securevia (17 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/75411915 (1 employees on LinkedIn®)



### 14. [Wabbi](https://www.g2.com/products/wabbi-wabbi/reviews)
  Delivering Scalable Application Security for Enterprise Development teams.



**Who Is the Company Behind Wabbi?**

- **Seller:** [Wabbi](https://www.g2.com/sellers/wabbi)
- **Year Founded:** 2018
- **HQ Location:** Boston, US
- **LinkedIn® Page:** https://linkedin.com/company/hiwabbi (15 employees on LinkedIn®)



### 15. [we45](https://www.g2.com/products/we45/reviews)
  AppSec Testing(AST) - Whatever your motivation, a proactive security push or a compliance compulsion, our AST service can help keep your application secure against external threats. Security Automation - Secure your agile Software Development Life Cycle(SDLC) without compromising on quality or time. AppSec Training - Our numerous/variegated training offerings help product teams gain the security understanding necessary to keep their deployments secure. Orchestron - Make Application Security efficient with one of the most integral parts of a modern DevSecOps toolchain - An AVC engine. Threat PlayBook - A (relatively) Unopinionated framework that faciliates Threat Modeling as Code married with Application Security Automation on a single Fabric. Perform Iterative Threat Modeling in an Agile Environment with Threat Playbook.



**Who Is the Company Behind we45?**

- **Seller:** [we45](https://www.g2.com/sellers/we45)
- **Year Founded:** 2019
- **HQ Location:** San Jose, US
- **LinkedIn® Page:** https://www.linkedin.com/company/1155059 (37 employees on LinkedIn®)



### 16. [XRATOR](https://www.g2.com/products/xrator/reviews)
  XRATOR is a comprehensive cybersecurity platform designed to empower organizations, particularly small and medium-sized businesses (SMBs, to proactively manage and mitigate cyber risks. By integrating continuous threat exposure management with strategic risk assessment, XRATOR enables businesses to identify vulnerabilities, prioritize them based on actual business impact, and implement effective remediation strategies. This approach not only enhances security posture but also aligns cybersecurity efforts with organizational objectives, facilitating resilient business growth. Key Features and Functionality: - Complete Visibility: XRATOR provides thorough asset discovery across all environments, including cloud and on-premises, ensuring no asset—be it shadow IT or forgotten infrastructure—is overlooked. - Smart Prioritization: The platform prioritizes vulnerabilities by assessing their real-world business impact and threat context, allowing organizations to focus on the most critical 3% of vulnerabilities that could significantly affect operations. - Integrated Compliance: Compliance is seamlessly embedded into the scanning and reporting processes, eliminating the need for separate compliance tools and enabling continuous monitoring without added complexity. - Right-Sized Solution: XRATOR offers enterprise-level capabilities without the complexity or cost associated with large-scale risk management systems, making it an ideal solution for SMBs seeking comprehensive yet straightforward cybersecurity management. - Intelligent Vulnerability Management: The platform continuously maps infrastructure and identifies weaknesses across both cloud and on-premises environments. - Collaborative Management: XRATOR provides a unified platform for security teams, facilitating cross-functional workflow integration and enhancing collaboration. - Automated Compliance: It streamlines regulatory compliance processes by aligning with industry standards, reducing the burden of manual compliance efforts. - Business Risk Quantification: The platform automatically quantifies vulnerabilities, assigning risk scores based on business impact to aid in smarter prioritization. - Cyber Attack Surface Management: XRATOR offers complete visibility and control over digital assets, enabling proactive vulnerability management. - Threat Intelligence Integration: Real-time threat intelligence feeds provide updates on emerging threats and vulnerabilities, keeping organizations informed and prepared. Primary Value and Problem Solved: XRATOR addresses the critical challenge of managing cyber risks in a rapidly evolving threat landscape. By providing a platform that combines risk-based vulnerability management with cyber risk quantification and attack surface management, XRATOR enables organizations to: - Proactively Identify and Mitigate Threats: Organizations can discover and address vulnerabilities before they are exploited, reducing the likelihood of cyber incidents. - Align Cybersecurity with Business Objectives: By quantifying risks based on business impact, XRATOR ensures that cybersecurity efforts are in sync with organizational goals, optimizing resource allocation. - Simplify Compliance and Reporting: The platform automates compliance monitoring and reporting, easing the burden of regulatory requirements and facilitating clear communication with stakeholders. - Enhance Operational Efficiency: By focusing on the most impactful vulnerabilities and integrating with existing security tools, XRATOR streamlines cybersecurity operations, allowing teams to work more effectively. In essence, XRATOR empowers organizations to build inherent resistance to cyber threats, transforming cybersecurity from a reactive necessity into a strategic asset that supports and accelerates business growth.



**Who Is the Company Behind XRATOR?**

- **Seller:** [XRATOR](https://www.g2.com/sellers/xrator)
- **Year Founded:** 2021
- **HQ Location:** Nantes, FR
- **LinkedIn® Page:** https://www.linkedin.com/company/xrator (19 employees on LinkedIn®)



### 17. [Zeguro](https://www.g2.com/products/zeguro/reviews)
  Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Zeguro Cyber Safety. Designed for small to midsize businesses, our Cyber Safety platform includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Zeguro Cyber Safety users can also enjoy potential savings in their cyber insurance, which Zeguro prices based on your organization&#39;s risk profile. Zeguro&#39;s cyber insurance is back by HSB/MunichRe&#39;s global 24/7 claims team with over 20 years in cyber insurance claims experience. Our insurance is A++ rated (A.M. Best). Together, Zeguro&#39;s cyber insurance and Cyber Safety solutions protect your business from insider and outsider threats and provide a safety net in the event of a data breach.


  **Average Rating:** 4.0/5.0
  **Total Reviews:** 1
**How Do G2 Users Rate Zeguro?**

- **Has the product been a good partner in doing business?:** 8.3/10 (Category avg: 9.3/10)

**Who Is the Company Behind Zeguro?**

- **Seller:** [Zeguro](https://www.g2.com/sellers/zeguro)
- **Year Founded:** 2016
- **HQ Location:** San Francisco, US
- **Twitter:** @Zeguroinc (199 Twitter followers)
- **LinkedIn® Page:** https://linkedin.com/company/zeguro (4 employees on LinkedIn®)

**Who Uses This Product?**
  - **Company Size:** 100% Mid-Market


#### What Are Zeguro's Pros and Cons?

**Pros:**

- Ease of Use (1 reviews)
- User Interface (1 reviews)

**Cons:**

- Deployment Issues (1 reviews)

### 18. [ZeroNorth](https://www.g2.com/products/zeronorth/reviews)
  Continuous security delivery fabric for modern enterprise infrastructure.



**Who Is the Company Behind ZeroNorth?**

- **Seller:** [ZeroNorth](https://www.g2.com/sellers/zeronorth)
- **Year Founded:** 2015
- **HQ Location:** Boston, US
- **LinkedIn® Page:** https://www.linkedin.com/company/10284735/admin/ (4 employees on LinkedIn®)



### 19. [Zscaler Unified Vulnerability Management](https://www.g2.com/products/zscaler-unified-vulnerability-management/reviews)
  Zscaler Unified Vulnerability Management (UVM) empowers organizations to comprehensively understand and address cybersecurity risks through a single, integrated platform. Built on the Data Fabric for Security, Zscaler UVM seamlessly aggregates, deduplicates, and contextualizes data from across your security stack, correlating related findings to deliver true risk-based prioritization. UVM enables remediation strategies that reflect your unique business context and mitigating controls, while automated, customizable workflows deliver measurable improvements to your security posture. By breaking down silos and allowing fully tailored risk scoring and reporting, UVM enables security teams to focus on what matters most and respond faster than ever. Key Features and Benefits: • Unify exposure findings from every source: Aggregate and enrich exposure data with threat intelligence and business context using 200+ pre-built connectors. • Prioritize and act on the most critical risks: Identify which vulnerabilities and security gaps to address first, with contextual risk scoring based on custom factors and complete data input. • Gain real-time insight into KPIs and SLAs: Access dynamic, pre-built, and custom reports to measure security posture and team performance from any perspective. • Accelerate resolution with intelligent, flexible workflows: Speed incident response by clustering related findings, tracking ticket status and exceptions, and empowering remediation teams with AI-guided recommendations and interactive smart prompts.



**Who Is the Company Behind Zscaler Unified Vulnerability Management?**

- **Seller:** [Zscaler](https://www.g2.com/sellers/zscaler)
- **Year Founded:** 2008
- **HQ Location:** San Jose, California
- **Twitter:** @zscaler (17,556 Twitter followers)
- **LinkedIn® Page:** https://www.linkedin.com/company/234625/ (8,743 employees on LinkedIn®)
- **Ownership:** NASDAQ:ZS




    ## What Is Risk-Based Vulnerability Management Software?
  [Vulnerability Management Software](https://www.g2.com/categories/vulnerability-management)
  ## What Software Categories Are Similar to Risk-Based Vulnerability Management Software?
    - [Threat Intelligence Software](https://www.g2.com/categories/threat-intelligence)
    - [Vulnerability Scanner Software](https://www.g2.com/categories/vulnerability-scanner)
    - [Penetration Testing Tools](https://www.g2.com/categories/penetration-testing-tools)
    - [Dark Web Monitoring Tools](https://www.g2.com/categories/dark-web-monitoring)
    - [ Attack Surface Management Software](https://www.g2.com/categories/attack-surface-management)
    - [Exposure Management Platforms](https://www.g2.com/categories/exposure-management-platforms)
    - [Digital Risk Protection (DRP) Platforms](https://www.g2.com/categories/digital-risk-protection-drp-platforms)

  
    
