Introducing G2.ai, the future of software buying.Try now

Best Vulnerability Scanner Software with Static Code Analysis Capabilities

Why You Can Trust G2's Software Rankings

30 Analysts and Data Experts
6,300+ Authentic Reviews
209+ Products
Unbiased Rankings
Learn more about G2's scoring methodology
Coming Soon
Get Trending Vulnerability Scanner Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
1 filter applied
Clear All
6 Listings in Vulnerability Scanner Available
Product Description
Pros and Cons

Users value the security protection of Amazon Inspector, effectively identifying vulnerabilities in cloud applications.

Users commend the excellent customer support from AWS, which aids in navigating cloud security effectively.

Users value the centralization management of Amazon Inspector, enhancing log analysis and compliance monitoring effectively.

Users find the complexity of configuring AWS security features a significant barrier that requires well-trained administrators.

Users find complexity issues in configuring AWS security features, requiring well-trained admins to ensure proper implementation.

Users find the steep learning curve of Amazon Inspector challenging, requiring skilled admins for proper configuration.

View All Pros and Cons
Product Description
Pros and Cons

Users value Invicti's ease of use and quick setup, ensuring seamless integration into their testing workflows.

Users value the advanced scanning technology of Invicti, enabling quick vulnerability detection and streamlined security workflows.

Users value Invicti's user-friendly interface and detailed reporting features, enhancing API security analysis and integration.

Users find the customer support lacking, often experiencing slow responses and inadequate solutions to their issues.

Users experience slow performance during scans and setup, impacting efficiency and user satisfaction in operation.

Users experience slow scanning times, especially for API endpoints, impacting the overall efficiency of Invicti.

View All Pros and Cons

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
Product Description
Pros and Cons

Users appreciate the ease of use of Acunetix, benefiting from its intuitive interface and efficient setup.

Users value the accurate and fast vulnerability detection of Acunetix, ensuring robust security for web applications.

Users commend the accuracy of results from Acunetix, highlighting its reliable vulnerability scanning and minimal false positives.

Users highlight the high costs of Acunetix, making it less accessible for smaller organizations or startups.

Users often find Acunetix complex and resource-intensive, especially for deep scans, which can disrupt workflows.

Users find the setup complex, requiring technical skills and patience, especially for integrations and initial configurations.

View All Pros and Cons
Product Description
Pros and Cons

Users appreciate the accuracy of results from Kiuwan, valuing its user-friendly interface and effective reporting capabilities.

Users appreciate the accuracy of findings from Kiuwan, leading to high satisfaction with code scans and reports.

Users praise the wonderful customer support of Kiuwan, appreciating their effective assistance and user-friendly experience.

View All Pros and Cons
Product Avatar Image
Product Description
Pros and Cons

Users appreciate the ease of use of Zenmap, making it ideal for penetration testers and cyber security analysts.

Users value the ease of implementation with Zenmap, making it accessible for penetration testers and ethical hackers.

Users face limited command options in Zenmap, impacting functionality and user experience significantly.

Users criticize Zenmap for its poor interface design, finding it difficult to navigate and utilize effectively.

View All Pros and Cons
Product Description
Pros and Cons

Users value the comprehensive security analysis of Veracode, enabling effective identification and remediation of vulnerabilities.

Users value the effective vulnerability detection of Veracode, which enhances security and streamlines the development process.

Users value the comprehensive solutions offered by Veracode, effectively enhancing application security and streamlining development.

Users find the platform expensive, with rising costs and hard-to-justify licensing for each application request.

Users express concerns over the complex licensing issues and discrepancies between promises and actual delivery of features.

Users face pricing issues, including complex licensing models and escalating costs without justifiable value.

View All Pros and Cons