Vulnerability Management17Vulnerability Management Software scans discovered IT assets for known vulnerabilities, i.e. configurations and setups that are open to security threats and malware. To make these scans effective, vulnerability management suites and platforms often must operate in tandem with a security or threat intelligence platform, a repository of ever-expanding known threats.FireMon1https://dudodiprj2sv7.cloudfront.net/product-logos/pS/gi/BCQ32GLX7WMA.PNGRapid7 Nexpose2https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEGAlienVault OSSIM3https://dudodiprj2sv7.cloudfront.net/vendor-logos/Gr/1i/U8I0UCHEN0SA-180x180.JPEGQualys Cloud Platform (formerly Qualysguard)4https://dudodiprj2sv7.cloudfront.net/product-logos/1N/CX/TQWNNZZX56H0.jpegSkybox Security5https://dudodiprj2sv7.cloudfront.net/product-logos/8v/Lp/XU1660ZPG60R.PNGTenable SecurityCenter6https://dudodiprj2sv7.cloudfront.net/vendor-logos/wa/hv/KXRS2SLG7A4A-180x180.JPEGRetina Network Security Scanner7https://dudodiprj2sv7.cloudfront.net/product-logos/75/RY/0ODNMGAOIERW.jpegQualys Private Cloud Platform8https://dudodiprj2sv7.cloudfront.net/product-logos/1N/CX/IQ87IQUEH042.jpegAlert Logic Cloud Insight9https://dudodiprj2sv7.cloudfront.net/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGTripwire IP36010https://dudodiprj2sv7.cloudfront.net/product-logos/vQ/0Z/932ABHUO2Q9I.JPEGSecurityScorecard11https://dudodiprj2sv7.cloudfront.net/product-logos/2m/h6/J94H6FIUL4NT.jpegSecPoint Penetrator Vulnerability Scanner12https://dudodiprj2sv7.cloudfront.net/product-logos/WU/Ab/WU3XBHMB2J0H.pngCritical Watch FusionVM13https://dudodiprj2sv7.cloudfront.net/product-logos/Aq/4X/S9HAQALHDV2P.jpegSkyport Systems14https://dudodiprj2sv7.cloudfront.net/product-logos/Vr/pk/TANN98T4A60W.pngRecorded Future15https://dudodiprj2sv7.cloudfront.net/product-logos/V6/cA/H6TNWLOOA8UR.pngIvanti Endpoint Security (powered by Heat)16https://dudodiprj2sv7.cloudfront.net/vendor-logos/2m/YN/CD77EEAQ0FMW-180x180.JPEGIntel Security Foundstone17https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGDigital Shadows18https://dudodiprj2sv7.cloudfront.net/product-logos/6r/uT/UDS9G6I1OI3U.pngAttivo Networks19https://dudodiprj2sv7.cloudfront.net/product-logos/La/Hw/SN3WRK1R809O.pngAorato20https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGAptean Verdiem21https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jo/9d/XMWSJCWFM4LS-180x180.PNGSecPod Saner22https://dudodiprj2sv7.cloudfront.net/product-logos/Nt/Op/FC6R823LNFLB.PNGAnchorPoint Integrated Threat Response23https://dudodiprj2sv7.cloudfront.net/product-logos/ij/Fo/CRDDCO10QF6W.PNGRiskIQ24https://dudodiprj2sv7.cloudfront.net/vendor-logos/rO/Yo/Z7WL83JA13US-180x180.JPEGSIEMphonic Essentials25https://dudodiprj2sv7.cloudfront.net/product-logos/Mz/Ux/ODI3IUHAZKET.JPEG

Vulnerability Management Tools

Vulnerability Management Tools Overview

What is Vulnerability Management Tools?

Vulnerability management tools scan enterprise networks for weaknesses that may be exploited by would-be intruders. Should the scan find a weakness the vulnerability software suggests or initiates remediation action. In this way, vulnerability management software reduces the potential of a network attack. This approach to network security differs from firewalls, antivirus or antispyware software, and Intrusion Detection Systems (IDS). These security tools are designed to manage attacks on the network as they occur. In contrast, vulnerability management tools instead search for potential weaknesses and fix them in an attempt to mitigate potential future network attacks.


Vulnerability management tools initially assess the network using network and port scanners, IP scanners etc. They then prioritize remediation so that the most significant issues are addressed first. Best practice is to allow vulnerability management tools to perform limited scans, and remediate located weaknesses immediately, rather than conduct extensive scans. Conducting more extensive scans delay remediation while the scan completes and therefore leaves weaknesses found during the scan unattended until the scan is complete.


Remediation should happen quickly, and according to the vulnerability software’s prioritization schedule. Systematically eliminating network weaknesses reduces dependence on peripheral intrusion detection technologies. And even if access to the network is achieved, attacks can be minimized by removing vulnerabilities intruders may encounter.


Features of Vulnerability Management Tools

To achieve attack surface reduction, vulnerability management tools include the following features and capabilities:

  • Continuous monitoring and scanning for potential vulnerabilities

  • Monitoring profile & rule system (IT can determine which systems and assets to monitor)

  • Ability to set notifications rules

  • Attack surface visualization

  • Attack vector analytics and modeling

  • Threat intelligence platform integration, data used to update scan heuristics

  • Graphical attack modeling

  • Attack simulation and risk-scoring against current network security state

  • Patch simulation to model patch & update scenarios

  • Automated update and patching prioritization scheme

  • Network access path analysis to identify problematic access routes suggest lower risk traffic redirections

  • Reachability analysis for endpoints and secured assets

  • Customizable reporting, (e.g. policy-driven compliance reports)

Pricing Information

Vulnerability management tools are available via the cloud or, for entities facing strict data governance and sovereignty rules, on-premise. Pricing is dependent on the number of assets and systems monitored. Additionally, vulnerability management software vendors may offer additional modules (e.g. web application firewall) which increase subscription cost. Most vendors offer a 30-day free trial of small business and enterprise products.

Vulnerability Management Products

Listings (1-25 of 41)

40 Ratings

FireMon's Network Security Policy Management (NSPM) platform gives security and operations teams automated visibility and analysis for network security devices. FireMon's web-based UI allows users to dissect their network security policies, locate compliance failures, and assess security vulnerab...

14 Ratings

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset dis...

We don't have enough ratings and reviews to provide an overall score.

Aptean Verdiem includes Verdiem Surveyor and Verdiem EvokeIT and presents a device wake and power management solution to measure keyboard, mouse, CPU, print network, and disk activity as well as support patching and updating, conserve power, and prevent vulnerabilities across the network.

We don't have enough ratings and reviews to provide an overall score.

SecPod Saner endpoint security solution provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one ea...

We don't have enough ratings and reviews to provide an overall score.

AnchorPoint’s Integrated Threat Response (ITR) service is a combination of advanced security tools, threat intelligence, and expert action. This service focuses on detection and response. The primary purpose of ITR is to decrease attacker dwell time in an organization’s network. According to the...

We don't have enough ratings and reviews to provide an overall score.

SIEMphonic Essentials is designed to help organizations strengthen their security defenses, respond effectively, control costs, and optimize their team's capabilities. The vendor says they have automated and simplified SIEM capabilities to analyze event data in real time, then collect, store, inv...