2026 Best Software Awards are here!See the list

Best Vulnerability Scanner Software with Manual Application Testing Capabilities

Benefits of Vulnerability Scanner Software with Manual Application Testing capabilities include: Allows users to perfrom hands-on live simulations and penetration tests.
Below are the top-rated Vulnerability Scanner Software with Manual Application Testing capabilities, as verified by G2’s Research team. Real users have identified Manual Application Testing as an important function of Vulnerability Scanner Software. Compare different products that offer this feature so you can decide which is best for your business needs.
Show More
Show Less

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
9 Listings in Vulnerability Scanner Available
(204)4.8 out of 5
Optimized for quick response
4th Easiest To Use in Vulnerability Scanner software
Entry Level Price:Starting at $149.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 58% Small-Business
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    41
    Vulnerability Detection
    30
    Customer Support
    26
    User Interface
    24
    Vulnerability Identification
    24
    Cons
    Expensive
    10
    Slow Scanning
    8
    Licensing Issues
    7
    False Positives
    6
    Limited Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.3
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 9.0
    9.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    977 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    85 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an exposure management platform for scaling to mid-market businesses. Over 3000 companies - across all industries - use Intruder to find critical exposures, respond faster and prevent bre

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 58% Small-Business
  • 35% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
41
Vulnerability Detection
30
Customer Support
26
User Interface
24
Vulnerability Identification
24
Cons
Expensive
10
Slow Scanning
8
Licensing Issues
7
False Positives
6
Limited Features
6
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.3
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 9.0
9.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
977 Twitter followers
LinkedIn® Page
www.linkedin.com
85 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Burp Suite is a complete ecosystem for web application and API security testing, combining two products: Burp Suite DAST - a best-of-breed, precision DAST solution that automates runtime testing, and

    Users
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Burp Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    12
    User Interface
    8
    Testing Services
    7
    Features
    5
    Clear Interface
    4
    Cons
    Expensive
    5
    Slow Performance
    5
    High Learning Curve
    2
    Learning Curve
    2
    Limited Customization
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Burp Suite features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2008
    HQ Location
    Knutsford, GB
    Twitter
    @Burp_Suite
    136,440 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    262 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Burp Suite is a complete ecosystem for web application and API security testing, combining two products: Burp Suite DAST - a best-of-breed, precision DAST solution that automates runtime testing, and

Users
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 31% Small-Business
Burp Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
12
User Interface
8
Testing Services
7
Features
5
Clear Interface
4
Cons
Expensive
5
Slow Performance
5
High Learning Curve
2
Learning Curve
2
Limited Customization
2
Burp Suite features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2008
HQ Location
Knutsford, GB
Twitter
@Burp_Suite
136,440 Twitter followers
LinkedIn® Page
www.linkedin.com
262 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Amazon Inspector is an automated vulnerability management service that continuously scans AWS workloads—including Amazon EC2 instances, container images in Amazon ECR, AWS Lambda functions, and code r

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 44% Small-Business
    • 32% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Amazon Inspector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    3
    Customer Support
    2
    Centralization Management
    1
    Collaboration
    1
    Security
    1
    Cons
    Complexity
    1
    Complexity Issues
    1
    Learning Curve
    1
    Limited Features
    1
    Not User-Friendly
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Amazon Inspector features and usability ratings that predict user satisfaction
    9.3
    Has the product been a good partner in doing business?
    Average: 9.2
    8.9
    Detection Rate
    Average: 8.9
    8.9
    Automated Scans
    Average: 9.0
    7.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,220,069 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    152,002 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

Amazon Inspector is an automated vulnerability management service that continuously scans AWS workloads—including Amazon EC2 instances, container images in Amazon ECR, AWS Lambda functions, and code r

Users
No information available
Industries
  • Computer Software
Market Segment
  • 44% Small-Business
  • 32% Mid-Market
Amazon Inspector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
3
Customer Support
2
Centralization Management
1
Collaboration
1
Security
1
Cons
Complexity
1
Complexity Issues
1
Learning Curve
1
Limited Features
1
Not User-Friendly
1
Amazon Inspector features and usability ratings that predict user satisfaction
9.3
Has the product been a good partner in doing business?
Average: 9.2
8.9
Detection Rate
Average: 8.9
8.9
Automated Scans
Average: 9.0
7.8
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,220,069 Twitter followers
LinkedIn® Page
www.linkedin.com
152,002 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    8.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    LevelBlue
    HQ Location
    Dallas, Texas, United States
    LinkedIn® Page
    www.linkedin.com
    638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
LevelBlue USM Anywhere features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
8.6
Configuration Monitoring
Average: 8.4
Seller Details
Seller
LevelBlue
HQ Location
Dallas, Texas, United States
LinkedIn® Page
www.linkedin.com
638 employees on LinkedIn®
(105)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Detection
    7
    Ease of Use
    6
    Security
    5
    Vulnerability Identification
    5
    Accuracy of Results
    4
    Cons
    Expensive
    4
    Complexity
    3
    Complex Setup
    3
    Slow Scanning
    3
    Difficult Customization
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 9.0
    7.9
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,556 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    332 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 34% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Detection
7
Ease of Use
6
Security
5
Vulnerability Identification
5
Accuracy of Results
4
Cons
Expensive
4
Complexity
3
Complex Setup
3
Slow Scanning
3
Difficult Customization
2
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 9.0
7.9
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,556 Twitter followers
LinkedIn® Page
www.linkedin.com
332 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys Vulnerability Management (VM) is a cloud-based service that provides organizations with immediate, global visibility into potential vulnerabilities within their IT systems. By continuously dete

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 50% Enterprise
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Vulnerability Identification
    2
    Automated Scanning
    1
    Dashboard Usability
    1
    Features
    1
    Cons
    Access Restrictions
    1
    Expensive
    1
    Inefficient Filtering
    1
    Limited Customization
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.2
    Automated Scans
    Average: 9.0
    7.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,180 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys Vulnerability Management (VM) is a cloud-based service that provides organizations with immediate, global visibility into potential vulnerabilities within their IT systems. By continuously dete

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 50% Enterprise
  • 33% Mid-Market
Qualys VM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Vulnerability Identification
2
Automated Scanning
1
Dashboard Usability
1
Features
1
Cons
Access Restrictions
1
Expensive
1
Inefficient Filtering
1
Limited Customization
1
Poor Customer Support
1
Qualys VM features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.2
Automated Scans
Average: 9.0
7.6
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,180 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fast, Flexible Code Security! Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Secu

    Users
    No information available
    Industries
    • Information Technology and Services
    • Banking
    Market Segment
    • 44% Enterprise
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiuwan Code Security & Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy
    2
    Accuracy of Findings
    2
    Customer Support
    2
    Ease of Use
    2
    Automation Testing
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 9.0
    6.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,361 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fast, Flexible Code Security! Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Secu

Users
No information available
Industries
  • Information Technology and Services
  • Banking
Market Segment
  • 44% Enterprise
  • 34% Mid-Market
Kiuwan Code Security & Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy
2
Accuracy of Findings
2
Customer Support
2
Ease of Use
2
Automation Testing
1
Cons
This product has not yet received any negative sentiments.
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 9.0
6.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,361 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner, designed to make network scanning accessible for both beginners and experienced users. This multi-platform, free, a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Zenmap Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Cons
    Issue Management
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Zenmap features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 9.0
    7.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nmap
    HQ Location
    N/A
    Twitter
    @nmap
    136,978 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zenmap is the official graphical user interface (GUI) for the Nmap Security Scanner, designed to make network scanning accessible for both beginners and experienced users. This multi-platform, free, a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 39% Small-Business
Zenmap Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Cons
Issue Management
1
Poor Interface Design
1
Zenmap features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 9.0
7.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Nmap
HQ Location
N/A
Twitter
@nmap
136,978 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 72% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veracode Application Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Vulnerability Detection
    2
    Accuracy of Results
    1
    Automated Scanning
    1
    Code Quality
    1
    Cons
    Expensive
    1
    Licensing Issues
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Application Security Platform features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,029 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    521 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 72% Enterprise
  • 28% Mid-Market
Veracode Application Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Vulnerability Detection
2
Accuracy of Results
1
Automated Scanning
1
Code Quality
1
Cons
Expensive
1
Licensing Issues
1
Pricing Issues
1
Veracode Application Security Platform features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,029 Twitter followers
LinkedIn® Page
www.linkedin.com
521 employees on LinkedIn®