Vulnerability Management17Vulnerability Management Software scans discovered IT assets for known vulnerabilities, i.e. configurations and setups that are open to security threats and malware. To make these scans effective, vulnerability management suites and platforms often must operate in tandem with a security or threat intelligence platform, a repository of ever-expanding known threats.AlienVault USM1https://dudodiprj2sv7.cloudfront.net/product-logos/6i/pV/S7QULUJUMN0O.JPEGFireMon2https://dudodiprj2sv7.cloudfront.net/product-logos/pS/gi/BCQ32GLX7WMA.PNGRapid7 Nexpose3https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jt/nm/DMQHRCTTH9CT-180x180.JPEGQualysguard4https://dudodiprj2sv7.cloudfront.net/product-logos/1N/CX/TQWNNZZX56H0.jpegTenable SecurityCenter5https://dudodiprj2sv7.cloudfront.net/vendor-logos/wa/hv/KXRS2SLG7A4A-180x180.JPEGLieberman RED6https://dudodiprj2sv7.cloudfront.net/vendor-logos/m8/iZ/F6U1N5QM17HK-180x180.JPEGAlienVault OSSIM7https://dudodiprj2sv7.cloudfront.net/vendor-logos/Gr/1i/U8I0UCHEN0SA-180x180.JPEGAlert Logic Cloud Insight8https://dudodiprj2sv7.cloudfront.net/vendor-logos/6s/Kj/LNDO4FAX2DHG-180x180.JPEGSkybox Security9https://dudodiprj2sv7.cloudfront.net/product-logos/8v/Lp/XU1660ZPG60R.PNGTripwire IP36010https://dudodiprj2sv7.cloudfront.net/product-logos/vQ/0Z/932ABHUO2Q9I.JPEGSecurityScorecard11https://dudodiprj2sv7.cloudfront.net/product-logos/2m/h6/J94H6FIUL4NT.jpegRetina Network Security Scanner12https://dudodiprj2sv7.cloudfront.net/product-logos/75/RY/0ODNMGAOIERW.jpegSecPoint Penetrator Vulnerability Scanner13https://dudodiprj2sv7.cloudfront.net/product-logos/WU/Ab/WU3XBHMB2J0H.pngCritical Watch FusionVM14https://dudodiprj2sv7.cloudfront.net/product-logos/Aq/4X/S9HAQALHDV2P.jpegSkyport Systems15https://dudodiprj2sv7.cloudfront.net/product-logos/Vr/pk/TANN98T4A60W.pngRecorded Future16https://dudodiprj2sv7.cloudfront.net/product-logos/V6/cA/H6TNWLOOA8UR.pngIvanti Endpoint Security (powered by Heat)17https://dudodiprj2sv7.cloudfront.net/vendor-logos/2m/YN/CD77EEAQ0FMW-180x180.JPEGIntel Security Foundstone18https://dudodiprj2sv7.cloudfront.net/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGDigital Shadows19https://dudodiprj2sv7.cloudfront.net/product-logos/6r/uT/UDS9G6I1OI3U.pngAttivo Networks20https://dudodiprj2sv7.cloudfront.net/product-logos/La/Hw/SN3WRK1R809O.pngAorato21https://dudodiprj2sv7.cloudfront.net/vendor-logos/tf/J4/RTX1AO2GSVNS-180x180.JPEGAptean Verdiem22https://dudodiprj2sv7.cloudfront.net/vendor-logos/Jo/9d/XMWSJCWFM4LS-180x180.PNGSecPod Saner23https://dudodiprj2sv7.cloudfront.net/product-logos/Nt/Op/FC6R823LNFLB.PNGAnchorPoint Integrated Threat Response24https://dudodiprj2sv7.cloudfront.net/product-logos/ij/Fo/CRDDCO10QF6W.PNGRiskIQ25https://dudodiprj2sv7.cloudfront.net/vendor-logos/rO/Yo/Z7WL83JA13US-180x180.JPEG

Vulnerability Management Tools

Vulnerability Management Tools Overview

What is Vulnerability Management Tools?

Vulnerability management tools are an approach to network security that differs from peripheral solutions like firewalls, antivirus and antispyware software, and Intrusion Detection Systems (IDS). All of these peripheral approaches are designed to prevent unauthorized attack to network assets by focusing on attacks as they happen. Vulnerability management tools instead searches for potential network weaknesses and fixing them before an attempted intrusion occurs.

Vulnerability management tools initially assess the network using a network and port scanners, IP scanners etc. and then prioritize any revealed weaknesses so that the most significant are addressed first.

Reducing network weaknesses in this way, reduces dependence on peripheral intrusion detection technologies since even if access to the network is achieved, there are no vulnerabilities to exploit. However, for this to work, it is imperative that any vulnerabilities discovered as a result of scans must be remediated quickly in accordance with a priority schedule. A best practice is to do limited scans and then remediate immediately, instead of very extensive scans which leave vulnerabilities unremediated for too long.

Vulnerability Management Products

Listings (1-25 of 37)

AlienVault USM

316 Ratings

Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat...

FireMon

32 Ratings

FireMon's Network Security Policy Management (NSPM) platform gives security and operations teams automated visibility and analysis for network security devices. FireMon's web-based UI allows users to dissect their network security policies, locate compliance failures, and assess security...

Rapid7 Nexpose

21 Ratings

NeXpose from Boston-based Rapid7 is a vulnerability management option.

Qualysguard

13 Ratings

Qualysguard, from San Francisco-based Qualys, is network security and vulnerability management software.

Tenable SecurityCenter

13 Ratings

Tenable SecurityCenter, from Tenable Network Security in Baltimore, presents a vulnerabiliy management option.

Lieberman RED

4 Ratings

Lieberman Red (formerly Lieberman Enterprise Random Password Manager) is an adaptive privilege management platform that is designed to protect organizations against malicious insiders, advanced persistent threats (APTs) and other sophisticated cyber attacks. It ensures that powerful privileged...

AlienVault OSSIM

12 Ratings

OSSIM leverages the power of the AlienVault Open Threat Exchange by allowing users to both contribute and receive real-time information about malicious hosts. AlienVault OSSIM is an open source Security Information and Event Management (SIEM) product. It is a unified platform providing: Asset...

Skybox Security

1 Ratings

Skybox Security offers vulnerability and threat management solutions.

Tripwire IP360

4 Ratings

IP360 from Tripwire is a vulnerability management solution; the technology was acquired with nCircle in 2013 and based on the nCircle 360 Suite product.

SecurityScorecard

We don't have enough ratings and reviews to provide an overall score.

New York-based SecurityScorecard presents a vulnerability management solution.

Retina Network Security Scanner

6 Ratings

BeyondTrust offers vulnerability management, with the Retina Network Security Scanner. This technology was developed by eEye, before that company's acquisition by BeyondTrust in 2012.

SecPoint Penetrator Vulnerability Scanner

We don't have enough ratings and reviews to provide an overall score.

The Penetrator Vulnerability Scanner from Denmark-based SecPoint is a vulnerability management solution.

Critical Watch FusionVM

We don't have enough ratings and reviews to provide an overall score.

Dallas-based Critical Watch offers FusionVM, a vulnerability management solution.

Skyport Systems

We don't have enough ratings and reviews to provide an overall score.

Mountain View, California based Skyport Systems presents a vulnerability management solution.

Recorded Future

We don't have enough ratings and reviews to provide an overall score.

Boston-based Recorded Future presents a vulnerability management solution.

Ivanti Endpoint Security (powered by Heat)

We don't have enough ratings and reviews to provide an overall score.

Ivanti Endpoint Security, powered by Heat (formerly known as Heat Unified Endpoint Management & Security, which in turn was formerly a Lumension supported product) presents a vulnerability management and antivirus solution.

Intel Security Foundstone

We don't have enough ratings and reviews to provide an overall score.

Foundstone is a vulnerability management option from Intel Security / McAfee.

Digital Shadows

We don't have enough ratings and reviews to provide an overall score.

San Francisco-based Digital Shadows presents a vulnerability management solution.

Attivo Networks

We don't have enough ratings and reviews to provide an overall score.

Attivo Networks in Fremont, California presents a vulnerability management solution.

Aorato

7 Ratings

Aorato, now from Microsoft, presents a vulnerability management solution.

Aptean Verdiem

We don't have enough ratings and reviews to provide an overall score.

Aptean Verdiem includes Verdiem Surveyor and Verdiem EvokeIT and presents a device wake and power management solution to measure keyboard, mouse, CPU, print network, and disk activity as well as support patching and updating, conserve power, and prevent vulnerabilities across the network.

SecPod Saner

We don't have enough ratings and reviews to provide an overall score.

SecPod Saner endpoint security solution provides continuous visibility and control for all endpoints. It proactively remediates risks and detects and responds to threats. Saner combines endpoint vulnerability, patch and compliance management with endpoint threat detection and response into one easy...

AnchorPoint Integrated Threat Response

We don't have enough ratings and reviews to provide an overall score.

AnchorPoint’s Integrated Threat Response (ITR) service is a combination of advanced security tools, threat intelligence, and expert action. This service focuses on detection and response. The primary purpose of ITR is to decrease attacker dwell time in an organization’s network. According to the...

RiskIQ

We don't have enough ratings and reviews to provide an overall score.