Introducing G2.ai, the future of software buying.Try now

Best Vulnerability Scanner Software - Page 4

Lauren Worth
LW
Researched and written by Lauren Worth

Vulnerability scanners are tools that constantly monitor applications and networks to identify security vulnerabilities. They work by maintaining an up-to-date database of known vulnerabilities, and conduct scans to identify potential exploits. Vulnerability scanners are used by companies to test applications and networks against known vulnerabilities and to identify new vulnerabilities. The scanners typically produce analytical reports detailing the state of an application or network security and provide recommendations to remedy known issues. Some vulnerability scanners work in a similar manner to dynamic application security testing (DAST) tools, but scan tools instead of mimicking attacks or performing penetration tests.

To qualify for inclusion in the Vulnerability Scanner category, a product must:

Maintain a database of known vulnerabilities
Continuously scan applications for vulnerabilities
Produce reports analyzing known vulnerabilities and new exploits
Show More
Show Less

Featured Vulnerability Scanner Software At A Glance

Free Plan Available:
Intruder
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Vulnerability Scanner Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
209 Listings in Vulnerability Scanner Available
Product Description
Pros and Cons

Users value the actionable intelligence provided by Evolve Security, enhancing their ability to address vulnerabilities effectively.

Users appreciate the excellent communication from Evolve Security, ensuring clarity during the pentesting process.

Users commend the ease of use of Evolve Security, appreciating the straightforward interface and efficient onboarding process.

View All Pros and Cons
Product Description
Pros and Cons

Users appreciate the accuracy of results from Kiuwan, valuing its user-friendly interface and effective reporting capabilities.

Users appreciate the accuracy of findings from Kiuwan, leading to high satisfaction with code scans and reports.

Users praise the wonderful customer support of Kiuwan, appreciating their effective assistance and user-friendly experience.

View All Pros and Cons

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
Product Avatar Image
Product Description
Pros and Cons

Users value the excellent customer support from Qualys VMDR, enhancing their experience and ensuring prompt assistance.

Users value the time-saving features of Qualys VMDR, with automated approval paths and comprehensive reporting enhancing efficiency.

Users value the complete solution for vulnerability detection in Qualys VMDR, appreciating its ease of deployment and swift remediation.

Users find the interface complex and difficult to navigate, especially for new users during initial use.

Users find the complex reporting of Qualys VMDR challenging, especially for newcomers navigating the system initially.

Users find the complex setup of Qualys VMDR challenging, especially for newcomers trying to navigate the interface.

View All Pros and Cons
Product Avatar Image
G2 recognized ARMO Platform
Product Description
Pros and Cons

Users value the robust security features of ARMO Platform, enhancing protection for pods and clusters effortlessly.

Users find the ease of use of ARMO Platform impressive, thanks to its intuitive design and user-friendly dashboard.

Users appreciate the intuitive interface and powerful scanning features of ARMO Platform, enhancing Kubernetes security efficiently.

Users face a learning curve with ARMO Platform, needing better documentation and tutorials for effective usage.

Users report limited third-party integrations, making it challenging to fully optimize the ARMO Platform's capabilities.

Users face a difficult learning curve with ARMO Platform, particularly when navigating its extensive features and functionality.

View All Pros and Cons
Product Description
Pros and Cons

Users value the precise vulnerability detection of Contrast Security, enhancing their software security with real-time insights.

Users value the high accuracy of findings from Contrast Security, enhancing their understanding and management of vulnerabilities.

Users benefit from real-time vulnerability detection, significantly enhancing their organization's security posture during software development.

Users find Contrast Security lacking in critical features, such as SAST options and comprehensive analytics for effective security management.

Users face challenges with false positives, which can be discouraging despite Contrast's advantages in identifying libraries.

Users find the reporting inadequate, leading to challenges in monitoring and managing Contrast Security effectively.

View All Pros and Cons
Product Description
Pros and Cons

Users appreciate the ease of use of Harness Platform, facilitating quick setup and efficient feature management.

Users value the scalable architecture of Harness Platform, enhancing CI consistency and enriching functionalities tailored to needs.

Users appreciate the seamless control over software functionality provided by Harness's feature flags, enhancing testing and deployment.

Users find the missing features like API limitations and filtering issues frustrating on the Harness Platform.

Users find it challenging due to configuration and access limitations, which can hinder efficiency and control over data.

Users note a limited feature set, with many requests pending and difficult navigation impacting usability.

View All Pros and Cons
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qualys VM Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Dashboard Usability
    1
    Features
    1
    Integrations
    1
    Vulnerability Identification
    1
    Cons
    Access Restrictions
    1
    Expensive
    1
    Poor Customer Support
    1
    Pricing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.0
    Automated Scans
    Average: 8.9
    7.6
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,196 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,393 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 35% Mid-Market
Qualys VM Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Dashboard Usability
1
Features
1
Integrations
1
Vulnerability Identification
1
Cons
Access Restrictions
1
Expensive
1
Poor Customer Support
1
Pricing Issues
1
Qualys VM features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.0
Automated Scans
Average: 8.9
7.6
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,196 Twitter followers
LinkedIn® Page
www.linkedin.com
3,393 employees on LinkedIn®
(124)4.5 out of 5
View top Consulting Services for Snyk
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 37% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Snyk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    3
    Integrations
    3
    Integration Support
    3
    Version Control
    3
    Git Integration
    2
    Cons
    Complex Configuration
    2
    Alert Overload
    1
    Bugs
    1
    Command Line Difficulty
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Snyk features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    8.4
    Detection Rate
    Average: 8.9
    9.1
    Automated Scans
    Average: 8.9
    8.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Snyk
    HQ Location
    Boston, Massachusetts
    Twitter
    @snyksec
    20,100 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,221 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Snyk (pronounced sneak) is a developer security platform for securing custom code, open source dependencies, containers, and cloud infrastructure all from a single platform. Snyk’s developer securit

Users
  • Software Engineer
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 37% Small-Business
Snyk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
3
Integrations
3
Integration Support
3
Version Control
3
Git Integration
2
Cons
Complex Configuration
2
Alert Overload
1
Bugs
1
Command Line Difficulty
1
Complexity
1
Snyk features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
8.4
Detection Rate
Average: 8.9
9.1
Automated Scans
Average: 8.9
8.2
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Snyk
HQ Location
Boston, Massachusetts
Twitter
@snyksec
20,100 Twitter followers
LinkedIn® Page
www.linkedin.com
1,221 employees on LinkedIn®
Product Description
Pros and Cons

Users value the ease of use of Defendify, appreciating quick setup and effective onboarding for staff training.

Users highlight the ease of onboarding and comprehensive features of Defendify, enhancing cybersecurity effectiveness.

Users value the easy setup, which allowed quick onboarding and efficient understanding of cybersecurity posture.

Users express a desire for inadequate reporting in Defendify, seeking more detailed and concise test results.

Users find poor reporting a significant drawback, seeking more concise and detailed insights from testing and assessments.

Users desire more detailed penetration testing reports for better clarity and comprehension of the process.

View All Pros and Cons
Product Avatar Image
Product Description
Pros and Cons

Users appreciate the user-friendly features of BugProve, which simplify tasks like firmware analysis and detail extraction.

Users appreciate the ease of use of BugProve, which simplifies tasks and enhances accessibility for all users.

Users commend BugProve for its user-friendly features that simplify tasks and enhance accessibility for all levels.

View All Pros and Cons
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifie

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Vulnerability Assessment features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    10.0
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,128 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    339,241 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifie

Users
No information available
Industries
No information available
Market Segment
  • 58% Enterprise
  • 25% Mid-Market
IBM Guardium Vulnerability Assessment features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
10.0
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,128 Twitter followers
LinkedIn® Page
www.linkedin.com
339,241 employees on LinkedIn®
Ownership
SWX:IBM
Product Description
Pros and Cons

Users value the automated scanning feature of Bright Security, enabling thorough vulnerability detection with minimal training.

Users appreciate the excellent customer support of Bright Security, ensuring effective solutions and addressing all issues promptly.

Users find Bright Security to be very user-friendly, praising its ease of understanding and efficient configuration.

Users face a high learning curve with Bright Security due to complex configurations and limited documentation.

Users report that the complex setup of Bright Security makes scaling difficult for lean appsec teams.

Users face setup complexity with Bright Security, especially with intricate authenticated scans and authentication configurations.

View All Pros and Cons
Product Avatar Image
Product Description
Pros and Cons

Users appreciate the easy integrations of FOSSA with their existing tools, enhancing their development workflow.

Users value the issue resolution capabilities of FOSSA, which effectively identifies vulnerabilities and recommends fixes.

Users value the comprehensive remediation solutions provided by FOSSA, effectively addressing security and quality issues in their applications.

View All Pros and Cons
Product Description
Pros and Cons

Users appreciate the extensive features for Vulnerability Management in DefectDojo, enabling easy reporting of testing metrics.

Users experience slow performance with the Enterprise version, especially when uploading large files.

View All Pros and Cons
Product Description
Pros and Cons

Users value S4E for its robust security measures, ensuring peace of mind with continuous updates and actionable reports.

Users value the quick identification of vulnerabilities by S4E, ensuring their systems remain secure and stress-free.

Users praise the automated scanning of S4E for its efficiency, making vulnerability management simple and stress-free.

Users find a learning curve with S4E, noting it takes time to adapt to the numerous features.

Users feel that the navigation could be improved for a more seamless and enjoyable experience with S4E.

View All Pros and Cons