Vulnerability Management17Vulnerability Management Software scans discovered IT assets for known vulnerabilities, i.e. configurations and setups that are open to security threats and malware. To make these scans effective, vulnerability management suites and platforms often must operate in tandem with a security or threat intelligence platform, a repository of ever-expanding known threats.FireMon1https://dudodiprj2sv7.cloudfront.net/product-logos/pS/gi/BCQ32GLX7WMA.PNGRapid7 Nexpose2https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEGQualysguard3https://dudodiprj2sv7.cloudfront.net/product-logos/1N/CX/TQWNNZZX56H0.jpegSkybox Security4https://dudodiprj2sv7.cloudfront.net/product-logos/8v/Lp/XU1660ZPG60R.PNGTenable SecurityCenter5https://dudodiprj2sv7.cloudfront.net/vendor-logos/wa/hv/KXRS2SLG7A4A-180x180.JPEGAlienVault OSSIM6https://dudodiprj2sv7.cloudfront.net/vendor-logos/Gr/1i/U8I0UCHEN0SA-180x180.JPEGAlert Logic Cloud Insight7https://dudodiprj2sv7.cloudfront.net/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGTripwire IP3608https://dudodiprj2sv7.cloudfront.net/product-logos/vQ/0Z/932ABHUO2Q9I.JPEGSecurityScorecard9https://dudodiprj2sv7.cloudfront.net/product-logos/2m/h6/J94H6FIUL4NT.jpegRetina Network Security Scanner10https://dudodiprj2sv7.cloudfront.net/product-logos/75/RY/0ODNMGAOIERW.jpegSecPoint Penetrator Vulnerability Scanner11https://dudodiprj2sv7.cloudfront.net/product-logos/WU/Ab/WU3XBHMB2J0H.pngCritical Watch FusionVM12https://dudodiprj2sv7.cloudfront.net/product-logos/Aq/4X/S9HAQALHDV2P.jpegSkyport Systems13https://dudodiprj2sv7.cloudfront.net/product-logos/Vr/pk/TANN98T4A60W.pngRecorded Future14https://dudodiprj2sv7.cloudfront.net/product-logos/V6/cA/H6TNWLOOA8UR.pngIvanti Endpoint Security (powered by Heat)15https://dudodiprj2sv7.cloudfront.net/vendor-logos/2m/YN/CD77EEAQ0FMW-180x180.JPEGIntel Security Foundstone16https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGDigital Shadows17https://dudodiprj2sv7.cloudfront.net/product-logos/6r/uT/UDS9G6I1OI3U.pngAttivo Networks18https://dudodiprj2sv7.cloudfront.net/product-logos/La/Hw/SN3WRK1R809O.pngAorato19https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGAptean Verdiem20https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jo/9d/XMWSJCWFM4LS-180x180.PNGSecPod Saner21https://dudodiprj2sv7.cloudfront.net/product-logos/Nt/Op/FC6R823LNFLB.PNGAnchorPoint Integrated Threat Response22https://dudodiprj2sv7.cloudfront.net/product-logos/ij/Fo/CRDDCO10QF6W.PNGRiskIQ23https://dudodiprj2sv7.cloudfront.net/vendor-logos/rO/Yo/Z7WL83JA13US-180x180.JPEGSIEMphonic Essentials24https://dudodiprj2sv7.cloudfront.net/product-logos/Mz/Ux/ODI3IUHAZKET.JPEGCode Dx Enterprise25https://dudodiprj2sv7.cloudfront.net/vendor-logos/Tw/sB/HJM6ILGVAHKH-180x180.JPEG

Vulnerability Management Tools

Vulnerability Management Tools Overview

What is Vulnerability Management Tools?

Vulnerability management tools are an approach to network security that differs from peripheral solutions like firewalls, antivirus and antispyware software, and Intrusion Detection Systems (IDS). All of these peripheral approaches are designed to prevent unauthorized attack to network assets by focusing on attacks as they happen. Vulnerability management tools instead searches for potential network weaknesses and fixing them before an attempted intrusion occurs.

Vulnerability management tools initially assess the network using a network and port scanners, IP scanners etc. and then prioritize any revealed weaknesses so that the most significant are addressed first.

Reducing network weaknesses in this way, reduces dependence on peripheral intrusion detection technologies since even if access to the network is achieved, there are no vulnerabilities to exploit. However, for this to work, it is imperative that any vulnerabilities discovered as a result of scans must be remediated quickly in accordance with a priority schedule. A best practice is to do limited scans and then remediate immediately, instead of very extensive scans which leave vulnerabilities unremediated for too long.

Vulnerability Management Products

Listings (1-25 of 36)

FireMon

32 Ratings

FireMon's Network Security Policy Management (NSPM) platform gives security and operations teams automated visibility and analysis for network security devices. FireMon's web-based UI allows users to dissect their network security policies, locate compliance failures, and assess security...

Rapid7 Nexpose

21 Ratings

NeXpose from Boston-based Rapid7 is a vulnerability management option.

Qualysguard

13 Ratings

Qualysguard, from San Francisco-based Qualys, is network security and vulnerability management software.

Skybox Security

3 Ratings

Skybox Security offers vulnerability and threat management solutions.

Tenable SecurityCenter

13 Ratings

Tenable SecurityCenter, from Tenable Network Security in Baltimore, presents a vulnerabiliy management option.

AlienVault OSSIM

14 Ratings

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset...

Tripwire IP360

4 Ratings

IP360 from Tripwire is a vulnerability management solution; the technology was acquired with nCircle in 2013 and based on the nCircle 360 Suite product.

SecurityScorecard

We don't have enough ratings and reviews to provide an overall score.

New York-based SecurityScorecard presents a vulnerability management solution.

Retina Network Security Scanner

6 Ratings

BeyondTrust offers vulnerability management, with the Retina Network Security Scanner. This technology was developed by eEye, before that company's acquisition by BeyondTrust in 2012.

SecPoint Penetrator Vulnerability Scanner

We don't have enough ratings and reviews to provide an overall score.

The Penetrator Vulnerability Scanner from Denmark-based SecPoint is a vulnerability management solution.

Critical Watch FusionVM

We don't have enough ratings and reviews to provide an overall score.

Dallas-based Critical Watch offers FusionVM, a vulnerability management solution.

Skyport Systems

We don't have enough ratings and reviews to provide an overall score.

Mountain View, California based Skyport Systems presents a vulnerability management solution.

Recorded Future

We don't have enough ratings and reviews to provide an overall score.

Boston-based Recorded Future presents a vulnerability management solution.

Ivanti Endpoint Security (powered by Heat)

We don't have enough ratings and reviews to provide an overall score.

Ivanti Endpoint Security, powered by Heat (formerly known as Heat Unified Endpoint Management & Security, which in turn was formerly a Lumension supported product) presents a vulnerability management and antivirus solution.

Intel Security Foundstone

We don't have enough ratings and reviews to provide an overall score.

Foundstone is a vulnerability management option from Intel Security / McAfee.

Digital Shadows

We don't have enough ratings and reviews to provide an overall score.

San Francisco-based Digital Shadows presents a vulnerability management solution.

Attivo Networks

We don't have enough ratings and reviews to provide an overall score.

Attivo Networks in Fremont, California presents a vulnerability management solution.

Aorato

7 Ratings

Aorato, now from Microsoft, presents a vulnerability management solution.

Aptean Verdiem

We don't have enough ratings and reviews to provide an overall score.

Aptean Verdiem includes Verdiem Surveyor and Verdiem EvokeIT and presents a device wake and power management solution to measure keyboard, mouse, CPU, print network, and disk activity as well as support patching and updating, conserve power, and prevent vulnerabilities across the network.

SecPod Saner

We don't have enough ratings and reviews to provide an overall score.

SecPod Saner endpoint security solution provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy...

AnchorPoint Integrated Threat Response

We don't have enough ratings and reviews to provide an overall score.

AnchorPoint’s Integrated Threat Response (ITR) service is a combination of advanced security tools, threat intelligence, and expert action. This service focuses on detection and response. The primary purpose of ITR is to decrease attacker dwell time in an organization’s network. According to the...

RiskIQ

We don't have enough ratings and reviews to provide an overall score.

SIEMphonic Essentials

We don't have enough ratings and reviews to provide an overall score.

SIEMphonic Essentials is designed to help organizations strengthen their security defenses, respond effectively, control costs, and optimize their team's capabilities. The vendor says they have automated and simplified SIEM capabilities to analyze event data in real time, then collect, store,...

Code Dx Enterprise

We don't have enough ratings and reviews to provide an overall score.

Code Dx Enterprise is an automated vulnerability management tool for applications, meant to provide security while integrating with application lifecycle management tools as well.