Introducing G2.ai, the future of software buying.Try now

Best Vulnerability Scanner Software - Page 7

Lauren Worth
LW
Researched and written by Lauren Worth

Vulnerability scanners are tools that constantly monitor applications and networks to identify security vulnerabilities. They work by maintaining an up-to-date database of known vulnerabilities, and conduct scans to identify potential exploits. Vulnerability scanners are used by companies to test applications and networks against known vulnerabilities and to identify new vulnerabilities. The scanners typically produce analytical reports detailing the state of an application or network security and provide recommendations to remedy known issues. Some vulnerability scanners work in a similar manner to dynamic application security testing (DAST) tools, but scan tools instead of mimicking attacks or performing penetration tests.

To qualify for inclusion in the Vulnerability Scanner category, a product must:

Maintain a database of known vulnerabilities
Continuously scan applications for vulnerabilities
Produce reports analyzing known vulnerabilities and new exploits
Show More
Show Less

Featured Vulnerability Scanner Software At A Glance

Free Plan Available:
Aikido Security
Sponsored
Leader:
Highest Performer:
Easiest to Use:
Top Trending:
Show LessShow More
Highest Performer:
Easiest to Use:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

Coming Soon
Get Trending Vulnerability Scanner Products in Your Inbox

A weekly snapshot of rising stars, new launches, and what everyone's buzzing about.

Sample Trending Products Newsletter
No filters applied
209 Listings in Vulnerability Scanner Available
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    6.7
    Automated Scans
    Average: 8.9
    5.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,091 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
6.7
Automated Scans
Average: 8.9
5.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,091 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Born out of a GCHQ accelerator in 2017, CyberSmart was created by a group of forward-thinking security experts, who noticed that many companies needed to secure themselves and achieve information secu

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CyberSmart Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Aware
    1
    Customer Support
    1
    Ease of Use
    1
    Implementation Ease
    1
    Navigation Ease
    1
    Cons
    Bugs
    1
    Technical Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CyberSmart features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    London, GB
    Twitter
    @CyberSmartUK
    1,960 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Born out of a GCHQ accelerator in 2017, CyberSmart was created by a group of forward-thinking security experts, who noticed that many companies needed to secure themselves and achieve information secu

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 33% Enterprise
CyberSmart Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Aware
1
Customer Support
1
Ease of Use
1
Implementation Ease
1
Navigation Ease
1
Cons
Bugs
1
Technical Issues
1
CyberSmart features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2016
HQ Location
London, GB
Twitter
@CyberSmartUK
1,960 Twitter followers
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intigriti is the trusted leader in crowdsourced security, empowering the world’s largest organizations to find and fix vulnerabilities before cybercriminals can exploit them. Since 2016, the compa

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 62% Mid-Market
    • 31% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intigriti features and usability ratings that predict user satisfaction
    9.5
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    5.0
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intigriti
    Year Founded
    2016
    HQ Location
    Antwerpen, BE
    Twitter
    @intigriti
    199,423 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    557 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intigriti is the trusted leader in crowdsourced security, empowering the world’s largest organizations to find and fix vulnerabilities before cybercriminals can exploit them. Since 2016, the compa

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 62% Mid-Market
  • 31% Enterprise
Intigriti features and usability ratings that predict user satisfaction
9.5
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
5.0
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Intigriti
Year Founded
2016
HQ Location
Antwerpen, BE
Twitter
@intigriti
199,423 Twitter followers
LinkedIn® Page
www.linkedin.com
557 employees on LinkedIn®
(3)4.3 out of 5
View top Consulting Services for SentinelOne Singularity Identity Posture Management
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Singularity Ranger AD is an identity configuration assessment solution that identifies misconfigurations, vulnerabilities, and real-time indicators of attack targeting Active Directory (AD) and Azure

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SentinelOne Singularity Identity Posture Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Implementation Ease
    1
    Security
    1
    Setup Ease
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SentinelOne Singularity Identity Posture Management features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Mountain View, CA
    Twitter
    @SentinelOne
    56,787 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3,094 employees on LinkedIn®
    Ownership
    NASDAQ: S
Product Description
How are these determined?Information
This description is provided by the seller.

Singularity Ranger AD is an identity configuration assessment solution that identifies misconfigurations, vulnerabilities, and real-time indicators of attack targeting Active Directory (AD) and Azure

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
SentinelOne Singularity Identity Posture Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Implementation Ease
1
Security
1
Setup Ease
1
Cons
This product has not yet received any negative sentiments.
SentinelOne Singularity Identity Posture Management features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2013
HQ Location
Mountain View, CA
Twitter
@SentinelOne
56,787 Twitter followers
LinkedIn® Page
www.linkedin.com
3,094 employees on LinkedIn®
Ownership
NASDAQ: S
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 71% Mid-Market
    • 29% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Upwind Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Visibility
    3
    Customer Support
    2
    Detection Efficiency
    2
    Implementation Ease
    2
    Cons
    Alert Overload
    1
    Compliance Issues
    1
    Data Management
    1
    Data Overload
    1
    False Positives
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Upwind features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Upwind
    Company Website
    Year Founded
    2022
    HQ Location
    San Francisco, California, United States
    LinkedIn® Page
    www.linkedin.com
    217 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Upwind is the runtime-first cloud security platform that secures your deployments, configurations, and applications by providing real-time visibility from the inside out. We’ve built a unified fabric

Users
No information available
Industries
No information available
Market Segment
  • 71% Mid-Market
  • 29% Enterprise
Upwind Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Visibility
3
Customer Support
2
Detection Efficiency
2
Implementation Ease
2
Cons
Alert Overload
1
Compliance Issues
1
Data Management
1
Data Overload
1
False Positives
1
Upwind features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Upwind
Company Website
Year Founded
2022
HQ Location
San Francisco, California, United States
LinkedIn® Page
www.linkedin.com
217 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Xygeni Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Comprehensive Security
    2
    Prioritization
    2
    Risk Management
    2
    Security
    2
    Cloud Integration
    1
    Cons
    Difficult Setup
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Xygeni features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    6.7
    Automated Scans
    Average: 8.9
    9.2
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Madrid, ES
    Twitter
    @xygeni
    189 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    30 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure your Software Development and Delivery! Xygeni Security specializes in Application Security Posture Management (ASPM), using deep contextual insights to effectively prioritize and manage secur

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 40% Mid-Market
Xygeni Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Comprehensive Security
2
Prioritization
2
Risk Management
2
Security
2
Cloud Integration
1
Cons
Difficult Setup
1
Learning Curve
1
Xygeni features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
6.7
Automated Scans
Average: 8.9
9.2
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2021
HQ Location
Madrid, ES
Twitter
@xygeni
189 Twitter followers
LinkedIn® Page
www.linkedin.com
30 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before every release. Our state-of-the-art dynamic application securi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Crashtest Security features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    0.0
    No information available
    10.0
    Automated Scans
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Burlington, Massachusetts, United States
    LinkedIn® Page
    www.linkedin.com
    541 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Crashtest Security is a SaaS-based security vulnerability scanner allowing agile development teams to ensure continuous security before every release. Our state-of-the-art dynamic application securi

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Crashtest Security features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
0.0
No information available
10.0
Automated Scans
Average: 8.9
0.0
No information available
Seller Details
Year Founded
2006
HQ Location
Burlington, Massachusetts, United States
LinkedIn® Page
www.linkedin.com
541 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FYND is an automated cybersecurity monitoring platform built to help small and medium-sized businesses (SMBs) protect their online assets with ease. Designed for teams without dedicated security exper

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FYND Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Scanning
    1
    Automation
    1
    Customer Support
    1
    Dashboard Usability
    1
    Ease of Use
    1
    Cons
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FYND features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    6.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FYND is an automated cybersecurity monitoring platform built to help small and medium-sized businesses (SMBs) protect their online assets with ease. Designed for teams without dedicated security exper

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
FYND Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Scanning
1
Automation
1
Customer Support
1
Dashboard Usability
1
Ease of Use
1
Cons
Integration Issues
1
FYND features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
6.7
Configuration Monitoring
Average: 8.4
Seller Details
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Lynis Enterprise is a security solution for systems that run a Unix like Linux and macOS. It helps companies to perform daily security health scans. It can discover configuration issues, including vul

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lynis Enterprise features and usability ratings that predict user satisfaction
    0.0
    No information available
    8.3
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CISOFY
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Lynis Enterprise is a security solution for systems that run a Unix like Linux and macOS. It helps companies to perform daily security health scans. It can discover configuration issues, including vul

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Lynis Enterprise features and usability ratings that predict user satisfaction
0.0
No information available
8.3
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
CISOFY
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Patrowl offers a continuous and comprehensive risk coverage tool, safeguarding against accidental, opportunistic, and targeted attacks. Protecting your business from all external threat scenarios. Pa

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PatrOwl features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 8.9
    5.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    PatrOwl
    Year Founded
    2020
    HQ Location
    Paris, FR
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Patrowl offers a continuous and comprehensive risk coverage tool, safeguarding against accidental, opportunistic, and targeted attacks. Protecting your business from all external threat scenarios. Pa

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
PatrOwl features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 8.9
5.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
PatrOwl
Year Founded
2020
HQ Location
Paris, FR
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Peach Fuzzer is an automated security testing platform that prevents zero-day attacks by findng vulnerabilities in hardware and software systems.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Peach Fuzzer features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    San Francisco, California, United States
    LinkedIn® Page
    www.linkedin.com
    3,120 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Peach Fuzzer is an automated security testing platform that prevents zero-day attacks by findng vulnerabilities in hardware and software systems.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Peach Fuzzer features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2014
HQ Location
San Francisco, California, United States
LinkedIn® Page
www.linkedin.com
3,120 employees on LinkedIn®
(2)4.8 out of 5
View top Consulting Services for Vulners Scanner
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vulners is curating the largest correlated database of vulnerabilities and exploits and offers the tool for a customised vulnerability management solution, through API, Python SD, plugins and ready to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Vulners Scanner features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Vulners
    Year Founded
    2015
    HQ Location
    Wilmington, US
    LinkedIn® Page
    www.linkedin.com
    6 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vulners is curating the largest correlated database of vulnerabilities and exploits and offers the tool for a customised vulnerability management solution, through API, Python SD, plugins and ready to

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Vulners Scanner features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Vulners
Year Founded
2015
HQ Location
Wilmington, US
LinkedIn® Page
www.linkedin.com
6 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BinaryEdge combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BinaryEdge features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Detection Rate
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Zürich, CH
    LinkedIn® Page
    www.linkedin.com
    5 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BinaryEdge combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
BinaryEdge features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Detection Rate
Average: 8.9
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Zürich, CH
LinkedIn® Page
www.linkedin.com
5 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Brakeman is a free vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Brakeman features and usability ratings that predict user satisfaction
    0.0
    No information available
    6.7
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Brakeman
    Twitter
    @brakeman
    1,413 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Brakeman is a free vulnerability scanner specifically designed for Ruby on Rails applications. It statically analyzes Rails application code to find security issues at any stage of development.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Brakeman features and usability ratings that predict user satisfaction
0.0
No information available
6.7
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
0.0
No information available
Seller Details
Seller
Brakeman
Twitter
@brakeman
1,413 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CloudSploit provide a software for security and configuration scanner that can detect threats in AWS account.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CloudSploit features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 9.2
    10.0
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 8.9
    10.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Burlington, US
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CloudSploit provide a software for security and configuration scanner that can detect threats in AWS account.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
CloudSploit features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 9.2
10.0
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 8.9
10.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2015
HQ Location
Burlington, US
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®