Introducing G2.ai, the future of software buying.Try now

Best Vulnerability Scanner Software with Automated Scans Capabilities

Benefits of Vulnerability Scanner Software with Automated Scans capabilities include: Runs pre-scripted vulnerability scans without requiring manual work.
Below are the top-rated Vulnerability Scanner Software with Automated Scans capabilities, as verified by G2’s Research team. Real users have identified Automated Scans as an important function of Vulnerability Scanner Software. Compare different products that offer this feature so you can decide which is best for your business needs.
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Vulnerability Scanner Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All
10 Listings in Vulnerability Scanner Available
(296)4.5 out of 5
Optimized for quick response
8th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    18
    Automated Scanning
    15
    Vulnerability Detection
    14
    Ease of Use
    13
    Features
    13
    Cons
    Slow Scanning
    8
    Limited Features
    6
    False Positives
    5
    Complexity
    4
    Slow Performance
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 8.9
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 33% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
18
Automated Scanning
15
Vulnerability Detection
14
Ease of Use
13
Features
13
Cons
Slow Scanning
8
Limited Features
6
False Positives
5
Complexity
4
Slow Performance
4
Tenable Nessus features and usability ratings that predict user satisfaction
8.7
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 8.9
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
(197)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at $149.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    35
    Vulnerability Detection
    26
    Customer Support
    25
    User Interface
    22
    Vulnerability Identification
    22
    Cons
    Expensive
    10
    Licensing Issues
    7
    Limited Features
    6
    Pricing Issues
    6
    Slow Scanning
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 8.9
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 35% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
35
Vulnerability Detection
26
Customer Support
25
User Interface
22
Vulnerability Identification
22
Cons
Expensive
10
Licensing Issues
7
Limited Features
6
Pricing Issues
6
Slow Scanning
5
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 8.9
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
978 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(121)4.5 out of 5
Optimized for quick response
View top Consulting Services for Tenable Vulnerability Management
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 55% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Scanning Efficiency
    12
    Ease of Use
    11
    Vulnerability Identification
    11
    Automated Scanning
    9
    Features
    8
    Cons
    Expensive
    6
    Pricing Issues
    6
    Complexity
    5
    Inadequate Reporting
    5
    Limited Reporting
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.3
    Automated Scans
    Average: 8.9
    8.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,329 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,267 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 55% Enterprise
  • 33% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Scanning Efficiency
12
Ease of Use
11
Vulnerability Identification
11
Automated Scanning
9
Features
8
Cons
Expensive
6
Pricing Issues
6
Complexity
5
Inadequate Reporting
5
Limited Reporting
5
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.3
Automated Scans
Average: 8.9
8.7
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,329 Twitter followers
LinkedIn® Page
www.linkedin.com
2,267 employees on LinkedIn®
Ownership
NASDAQ: TENB
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 44% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Amazon Inspector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    3
    Customer Support
    2
    Security
    2
    Vulnerability Identification
    2
    Centralization Management
    1
    Cons
    Complexity
    1
    Complexity Issues
    1
    Lack of Information
    1
    Learning Curve
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Amazon Inspector features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    8.9
    Automated Scans
    Average: 8.9
    7.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,217,364 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    143,584 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

Users
No information available
Industries
  • Computer Software
Market Segment
  • 44% Small-Business
  • 32% Mid-Market
Amazon Inspector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
3
Customer Support
2
Security
2
Vulnerability Identification
2
Centralization Management
1
Cons
Complexity
1
Complexity Issues
1
Lack of Information
1
Learning Curve
1
Limited Features
1
Amazon Inspector features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
8.9
Automated Scans
Average: 8.9
7.8
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,217,364 Twitter followers
LinkedIn® Page
www.linkedin.com
143,584 employees on LinkedIn®
Ownership
NASDAQ: AMZN
(68)4.6 out of 5
Optimized for quick response
12th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Invicti (formerly Netsparker)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 47% Enterprise
    • 26% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invicti (formerly Netsparker) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Scanning Technology
    6
    Vulnerability Detection
    6
    Vulnerability Identification
    6
    Accuracy of Results
    5
    Cons
    Slow Performance
    3
    Slow Scanning
    3
    API Issues
    2
    Complex Setup
    2
    Inefficient Scanning
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 47% Enterprise
  • 26% Mid-Market
Invicti (formerly Netsparker) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Scanning Technology
6
Vulnerability Detection
6
Vulnerability Identification
6
Accuracy of Results
5
Cons
Slow Performance
3
Slow Scanning
3
API Issues
2
Complex Setup
2
Inefficient Scanning
2
Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,557 Twitter followers
LinkedIn® Page
www.linkedin.com
292 employees on LinkedIn®
(114)4.4 out of 5
13th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LevelBlue USM Anywhere Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    8.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LevelBlue
    HQ Location
    Dallas, Texas, United States
    LinkedIn® Page
    www.linkedin.com
    455 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
LevelBlue USM Anywhere Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
8.6
Configuration Monitoring
Average: 8.4
Seller Details
Seller
LevelBlue
HQ Location
Dallas, Texas, United States
LinkedIn® Page
www.linkedin.com
455 employees on LinkedIn®
(105)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Easy Integrations
    2
    User Interface
    2
    Accuracy of Results
    1
    Affordable
    1
    Cons
    Poor Customer Support
    3
    Expensive
    2
    Licensing Issues
    2
    Poor Management
    2
    Slow Performance
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 8.9
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    292 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 34% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Easy Integrations
2
User Interface
2
Accuracy of Results
1
Affordable
1
Cons
Poor Customer Support
3
Expensive
2
Licensing Issues
2
Poor Management
2
Slow Performance
2
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 8.9
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,557 Twitter followers
LinkedIn® Page
www.linkedin.com
292 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fast, Flexible Code Security! Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Secu

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiuwan Code Security & Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy
    2
    Accuracy of Findings
    2
    Customer Support
    2
    Ease of Use
    2
    Automation Testing
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 8.9
    6.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,376 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fast, Flexible Code Security! Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Secu

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 35% Mid-Market
Kiuwan Code Security & Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy
2
Accuracy of Findings
2
Customer Support
2
Ease of Use
2
Automation Testing
1
Cons
This product has not yet received any negative sentiments.
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 8.9
6.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,376 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Dashboard Usability
    1
    Features
    1
    Integrations
    1
    Vulnerability Identification
    1
    Cons
    Access Restrictions
    1
    Expensive
    1
    Poor Customer Support
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.0
    Automated Scans
    Average: 8.9
    7.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 35% Mid-Market
Qualys VM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Dashboard Usability
1
Features
1
Integrations
1
Vulnerability Identification
1
Cons
Access Restrictions
1
Expensive
1
Poor Customer Support
1
Pricing Issues
1
Qualys VM features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.0
Automated Scans
Average: 8.9
7.6
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,189 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veracode Application Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Vulnerability Detection
    3
    Comprehensive Solutions
    2
    Detection
    2
    Ease of Use
    2
    Cons
    Expensive
    2
    Licensing Issues
    2
    Pricing Issues
    2
    Complexity
    1
    Cost Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Application Security Platform features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,091 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    541 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 28% Mid-Market
Veracode Application Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Vulnerability Detection
3
Comprehensive Solutions
2
Detection
2
Ease of Use
2
Cons
Expensive
2
Licensing Issues
2
Pricing Issues
2
Complexity
1
Cost Issues
1
Veracode Application Security Platform features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,091 Twitter followers
LinkedIn® Page
www.linkedin.com
541 employees on LinkedIn®