Browse Software
List Your Product
Loading...
Refine Results Clear All
Artificial Intelligence
  • (1)
Starting Price
  • (1)
  • (2)
  • (2)
  • (1)
  • (8)
Deployment
  • (6)
  • (4)
  • (37)
Customer Types
  • (1)
  • (1)
  • (38)
  • (38)
  • (33)
Pricing Model
  • (9)
  • (10)
  • (2)
  • (18)
  • (30)
Integrated With
  • (4)
  • (3)
  • (3)
  • (2)
  • (2)
  • (2)
  • (2)
  • (2)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
  • (1)
Apply Filters
Showing 1 - 20 of 38 Products

Top 10 Qualys VM Alternatives

Deepengine logo
Proactive Security, Seamless Protection Write a Review
View Details + Add to Compare

What is Deepengine and how does it work?

Deepengine strengthens the security by minimizing the external attack surface and protecting the infrastructure. It detects vulnerabilities across public IPs, subnets, APIs, firewalls, and hosted applications, identifying weak points before attackers can exploit them. Automate vulnerability management with flexible scanning schedules—Monthly, Weekly, or Daily—to ensure continuous protection. Powered by a database of over 150,000 vulnerabilities, Deepengine provides actionable insights to address risks effectively. Simplify compliance with industry standards through executive summaries that highlight critical vulnerabilities. For web, mobile, and cloud applications, it uncovers issues like injections, XSS scripting, misconfigurations, and faulty authentication, safeguarding the application portfolio. Real-time internal network scans reveal security gaps, while automated workflows with Webhooks and instant updates via Slack enhance collaboration between dev and IT teams. Stay ahead of threats with a solution that adapts to the environment. With Deepengine, security isn’t reactive—it’s proactive.

Read more Read less

Deepengine Pricing

  • Free Trial Not Available
  • Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Aquila I logo
Prevent cyber threats with Aquila I Write a Review
View Details + Add to Compare

What is Aquila I and how does it work?

Aquila I delivers comprehensive solutions to assess, monitor, prioritise and prevent modern-day cyber threats. It seamlessly helps maximise one’s ability to secure people, infrastructure, brand and business communication. With this threat protection solution, a team of experts help users gain actionable threat intelligence and prevent cyber threats from impacting a business. Furthermore, businesses can also depend on expert-curated threat intelligence programs to assess, train, monitor and prevent cyber threats, safeguarding their organisation’s critical assets. The platform understands different threats demand approaches and thus it creates a secure environment against future cyber threats. Furthermore, it ensures mitigation of the current cyber security posture that is attained to the best possible scenario. For employee vulnerability Aquila I ensures cyber-attack simulation and cyber awareness. In case of infrastructure vulnerability, the system features vulnerability scan and incident management. For brand vulnerability, Aquila I focuses on brand monitoring and social media monitoring. Additionally, the system pays attention to DRAMC and BIMI for business communication vulnerability.

Read more Read less

Aquila I Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Corgea logo
Smarter, Faster, and Seamless Application Security for Modern Teams Write a Review
View Details + Add to Compare

What is Corgea and how does it work?

Corgea revolutionizes vulnerability detection by identifying critical business logic and code logic flaws that other tools miss. Powered by advanced AI, it reduces false positives by up to 30%, saving time and ensuring teams focus only on real threats. Unlike traditional systems, Corgea eliminates the need for custom rule writing. Instead, simply provide the business context in natural language for precise detection and tailored fixes. For valid findings, Corgea generates developer-ready fixes and integrates seamlessly with tools like GitHub and Azure DevOps (GitLab and Bitbucket support coming soon). Engineers can stay within their favorite IDEs without learning new commands. Corgea also enforces strict security compliance with Blocking Rules to prevent non-compliant code from shipping and tracks SLAs to ensure vulnerabilities are addressed promptly. Stay ahead of threats, streamline workflow, and protect the codebases with Corgea’s cutting-edge approach to application security.

Read more Read less

Corgea Pricing

  • Free Trial Not Available
  • Starts at $14.0. Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Attaxion logo
Simplifying Complexity, Amplifying Security Write a Review
View Details + Add to Compare

What is Attaxion and how does it work?

Attaxion External Attack Surface Management (EASM) Platform stands out as a crucial ally for security teams. Designed to cater to any security budget, this platform excels in enabling even small-sized teams to efficiently manage their Internet-facing assets. With a focus on attack surface discovery and continuous monitoring, Attaxion brings shadow IT into the light, simplifying the complexity of vulnerability management software. Professionals can now access a real-time inventory of their assets, unveiling vulnerabilities, connections, and technologies instantly. What sets Attaxion apart is its ability to proactively discover unsanctioned, forgotten, and misconfigured assets before they become exploit targets. By prioritizing vulnerabilities and streamlining risk remediation, teams can continually eliminate pressing attack vectors within their expanding digital perimeter. This approach not only enhances security posture but also ensures that critical issues are addressed swiftly and efficiently. In essence, Attaxion empowers security professionals by transforming complexity into clarity, fostering a secure and resilient digital environment.

Read more Read less

Attaxion Pricing

  • Free Trial Available
  • Starts at $107.5. Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Tenable.io logo
Analyze Everything But Predict What Matters 4.6 Based on 92 Ratings
View Details + Add to Compare

What is Tenable.io and how does it work?

Tenable.io is a vulnerability management solution that lets users get a risk-based view of their entire attack surface from IT to cloud to containers. This enables them to identify, investigate, and prioritize vulnerabilities quickly. It provides comprehensive vulnerability coverage with the ability to predict which security issues to remediate first. Users get unified visibility and a continuous view of all of their assets (known and previously unknown) through active scanning, agents, passive monitoring, cloud connectors, and CMDB integrations. Tenable has an extensive CVE and security configuration support to help users understand all of their exposures; it provides coverage for more than 55,000 vulnerabilities. It enables users to quickly assess risk and know which vulnerabilities to fix first by combining vulnerability data, threat intelligence, and data science. They can also integrate Tenable.ot with Tenable.io, allowing them to gain full visibility of their OT risk and manage their environment from the cloud.

Read more Read less

Tenable.io Pricing

  • Free Trial Not Available
  • Starts at $4708.2.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

Products Similar to Qualys VM

Nessus logo
You are safe with Nessus 4.6 Based on 310 Ratings
View Details + Add to Compare

What is Nessus and how does it work?

Nessus is an industry leading vulnerability assessment tool that can help you automate vulnerability scanning, save time during compliance cycles, and engage your IT staff. Nessus, which is powered by Tenable Research, provides the industry's largest vulnerability coverage, with new detections being introduced to the platform on a regular basis. It offers predictive prioritization that prioritizes the most essential security concerns and quickly comprehends and effectively conveys the top ten high, critical, and most common vulnerabilities discovered after a scan. By integrating data science, threat intelligence, and vulnerability information, the Tenable VPR (Vulnerability Priority Rating) lets you home in on the most critical vulnerabilities. In order to target your repair efforts, it provides suggestions on which vulnerabilities represent the highest risk. It additionally offers pre-configured templates for a variety of IT and mobile assets that are supplied out of the box, ranging from patch management effectiveness to configuration audits, to assist you rapidly identify where you have vulnerabilities. Furthermore, you can create reports quickly using customizable views, such as specific vulnerability categories, vulnerabilities by host, or vulnerabilities by plugin.

Read more Read less

Nessus Pricing

  • Free Trial Available
  • Starts at $2790.00.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

  • Comprehensive vulnerability detection, User-friendly interface
  • High pricing, Occasional false positives
View Details
Enfoa Cybersecurity logo
Worry-Free Cybersecurity Write a Review
View Details + Add to Compare

What is Enfoa Cybersecurity and how does it work?

Enfoa Cybersecurity is their one-stop solution for worry-free protection. At Enfoa, they understand that cybersecurity can be a daunting and expensive task for businesses of all sizes. That's why they have made it this mission to provide transparent pricing and a user-friendly platform that takes the stress out of cybersecurity. With Enfoa, they can now initiate comprehensive Penetration Testing for their entire company in just 10 minutes no more lengthy and complicated processes or hidden fees! This advanced PTaaS (Penetration Testing as a Service) platform is what sets us apart from the rest. It enables real-world cyber-attack simulations by Ethical Hackers, providing them with a comprehensive and accurate assessment of their company's vulnerabilities. With Enfoa, they can identify and mitigate potential threats before they can be exploited by malicious actors, giving they peace of mind and the assurance that their sensitive data is safe. But Enfoa is not just for businesses. They also offer these services to individuals, making it easier for everyone to protect their online presence. Whether they are professionals or just someone who values their online privacy, this platform is here to make cybersecurity accessible and affordable for all.

Read more Read less

Enfoa Cybersecurity Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Nucleus logo
Level-up vulnerability response with Nucleus 4.9 Based on 118 Ratings
View Details + Add to Compare

What is Nucleus and how does it work?

Nucleus provides enterprise vulnerability management solutions via data unification and smart automation of tasks throughout the entire workflow. It unifies existing tools in an enterprise’s security stack, creating a centralised hub to control the chaos, triage and vulnerability analysis. Furthermore, the platform ingests and normalises all of the vulnerability data, besides enabling a company to organise their assets, measure key performance indicators and search out vulnerability information. When it comes to prioritising vulnerabilities, every company’s approach is different. Nucleus lets all these companies customise the vulnerability prioritisation and risk scoring algorithm based on the attributes that are most important to the vulnerability management team. Also, it provides accurate risk reports based on vulnerability intelligence. The remediation process is the most time-consuming phase of vulnerability management. Everything needs to be tracked once the remediation process occurs. It is Nucleus that automates the entire process. Furthermore, it offers real-time views of all active vulnerabilities and their current remediation status. Integrating with over 100 scanners and external security tools, Nucleus mitigates vulnerabilities 10x faster.

Read more Read less

Nucleus Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
ManageEngine Vulnerability Manager Plus logo
A Software For Assessment, Remediation Of Threats, And Visibility 4.7 Based on 7 Ratings
Visit Website + Add to Compare

What is ManageEngine Vulnerability Manager Plus and how does it work?

Vulnerability Manager Plus is a strategic tool designed for security configuration management. The tool identifies and assesses real risks from a plethora of vulnerabilities that are spread across networks. It seamlessly downloads, tests, and deploys patches to multiple operating systems and 250+3rd-party applications. The inbuilt patch management module helps users automate complete patching while letting them customize every aspect of the patching process. Users can keep track of configuration drifts and deploy secure configurations to eliminate security loopholes. It comes with features to identify and mitigate zero-day vulnerabilities with pre-built tested scripts. The tool constantly assesses the system and hardens the defenses. It detects and remediates expired SSLs, inappropriate web root directory access, and other web server flaws. The solution analyses and uninstalls software that is unsafe, unauthorized, and unsupported by the vendor. Users can get information on systems in which antivirus is absent, not-up-to-date, and inactive. The tool monitors ports in use and processes running in it and also identifies unintended ports that may be activated by malware.

Read more Read less

ManageEngine Vulnerability Manager Plus Pricing

  • Free Trial Available
  • Starts at $695.00. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
Visit Website
ThreatSpy logo
AI enable vulnerability scanner Write a Review
View Details + Add to Compare

What is ThreatSpy and how does it work?

ThreatSpy is a Next-Gen AI enable vulnerability scanner that enables you to predict the potential threat and provide you real-time vulnerability assessment reports across Technology Stack. Multiple scanning mechanisms which can be used based on the level of threat. Schedule scans on your web application at regular intervals to stay updated. Get instant scores for your web application and servers depending on the threat levels. Easy to use interface that enables you to visualize assessment reports effectively.

Read more Read less

ThreatSpy Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Cybersecurity Help Vulnerability Management logo
Stay Ahead of Threats with Intelligent Vulnerability Management Write a Review
View Details + Add to Compare

What is Cybersecurity Help Vulnerability Management and how does it work?

Cybersecurity Help Vulnerability Management platform acts as a vigilant guardian, consistently detecting, prioritizing, and helping remediate potential threats before hackers can exploit them. Through the CSH Agent, a robust vulnerability scanner deployable on desktop and server systems, companies can continuously monitor their assets. This tool instantly alerts users to ongoing or potential threats, ensuring comprehensive risk assessment across the entire network using both agent and agentless approaches. By understanding which vulnerabilities need immediate attention, companies can maintain security and allow their IT departments to plan and execute tasks efficiently. With an intuitive dashboard providing real-time data on new vulnerabilities, exploits, and zero-days, users can make informed decisions to swiftly mitigate threats. This platform offers continuous monitoring, even for offline systems, eliminating the need for delayed scan results. Leveraging a constantly updated database of known vulnerabilities, they deliver actionable, personalized vulnerability intelligence, empowering businesses to stay secure and proactive.

Read more Read less

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Qualys Cloud Platform logo
Revolutionary IT security structure Write a Review
View Details + Add to Compare

What is Qualys Cloud Platform and how does it work?

Qualys Cloud Platform offers you a continuous, always-on assessment of your global IT, security, and compliance posture, with 2-second visibility across all your IT assets, wherever they exist. It has automated, built-in threat prioritization, patching, and other response capabilities, which makes it a complete, end-to-end security solution.The software’s capabilities include asset discovery and inventory, vulnerability management, remediation prioritization, compliance monitoring, container security, web application scanning and firewall, file integrity monitoring, endpoint detection and response, and others.On-premises, at endpoints, on mobile, in containers, or the cloud, Qualys Cloud Platform sensors are always on, giving you continuous 2-second visibility of all your IT assets. The sensors are remotely deployable, centrally managed, and self-updating, come as physical or virtual appliances or lightweight agents. The cloud agents work on servers, mobile devices, endpoints, everywhere. Local hardware scanners for internal storage. With out-of-band sensors, you can secure highly locked-down devices and an air gapper network.

Read more Read less

Qualys Cloud Platform Pricing

  • Free Trial Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
InsightVM logo
A complete vulnerability assessment platform for you 4.4 Based on 115 Ratings
View Details + Add to Compare

What is InsightVM and how does it work?

Rapid7's Insight platform combines Rapid7's library of exposure analytics, global attacker behavior, vulnerability research, Internet-wide scanning data, exploit knowledge and real-time reporting to provide a fully efficient, scalable and smart way to collect and analyse your vulnerability data. It provides live vulnerability and endpoint analyses by collecting data from all of your endpoints, even those from distant employees and sensitive assets that can't be actively scanned or only join the corporate network on rare occasions. InsightVM offers smart tools and anyone, from system administrators to CISOs can simply design custom cards and customize dashboards, using easy language to monitor the progress of your security program. With threat feeds and business context to back it up, InsightVM allows you to prioritise vulnerabilities like an attacker would. With Insight VM, your security teams can use Remediation Projects to assign and track remediation tasks in real time, giving them constant visibility into how successfully issues are being resolved. Additionally, users can connect InsightVM with IT's ticketing systems, allowing remediation to be effortlessly integrated into their regular tasks.

Read more Read less

InsightVM Pricing

  • Free Trial Available
  • Starts at $22.00.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

  • Agent-based scanning, Detailed Vulnerability Reporting
  • High Memory Consumption, Slow Search Functionality
View Details
pwn.guide logo
Learn ethical hacking Write a Review
View Details + Add to Compare

What is pwn.guide and how does it work?

pwn.guide is the ultimate cybersecurity learning platform for professionals like themWith pwn.guide, they can become masters in cybersecurity by learning how to attack and defend with ease. This platform offers a wide range of tutorials, from basic concepts to advanced techniques, all designed to be simple and easy to understand. Most of these tutorials are completely free because we believe that knowledge should be accessible to everyone. They cater to beginners and experts alike, so whether they're just starting out or looking to sharpen their skills, pwn.guide has something for them. That's why they only log the minimal data required, and they can visit this privacy policy for more information. They can feel safe and secure while learning with them. With pwn.guide, learning is made even easier with this user-friendly interface. Simply type their search query into the right corner of the app pages and let this platform do the rest. With pwn.guide, the possibilities are endless.

Read more Read less

pwn.guide Pricing

  • Free Trial Not Available
  • Starts at $4.79. Offers Free-forever plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Exploit Alarm logo
Streamlining Vulnerability Management for Informed Security Decisions Write a Review
View Details + Add to Compare

What is Exploit Alarm and how does it work?

Exploit Alarm offers unmatched access to detailed vulnerability information, going beyond standard CVSS scores with enriched context. By aggregating data from various sources, it saves users valuable time, enabling them to concentrate on system security. Users can conduct in-depth searches with granular filters like CVSS vectors, EPSS, and change history. All vulnerability details—scores, references, timelines, and exploits—are easily accessible. Real-time alerts via email, SMS, Slack, and Discord keep them informed according to the preferences. Customizable reports and data visualizations help users identify trends and make informed decisions. Team productivity is boosted with features for inviting members, assigning roles, and sharing searches and alerts. The robust API allows seamless integration with existing tools for automated vulnerability management. Users can easily notify external stakeholders about new or updated vulnerabilities, ensuring they focus on relevant issues and stay updated on critical risks. With Exploit Alarm, securing the environment is streamlined and efficient.

Read more Read less

Exploit Alarm Pricing

  • Free Trial Not Available
  • Starts at $17.0. Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Astra Pentest logo
Trust in business’s security Write a Review
View Details + Add to Compare

What is Astra Pentest and how does it work?

Fix every single vulnerability before it hurts business and achieve your compliance goals, with Astra’s comprehensive Pentests. Astra helps team work together by enabling developers to integrate security in CI/CD. We also make it easy for CXOs to track progress via Slack and from product managers to collaborate and flag vulnerabilities through Jira.

Read more Read less

Astra Pentest Pricing

  • Free Trial Not Available
  • Starts at $83.25.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Snyk logo
A Tool to Fix vulnerabilities in minutes 4.7 Based on 133 Ratings
View Details + Add to Compare

What is Snyk and how does it work?

Snyk software is a platform used to Identify container image vulnerabilities and auto-upgrade to the most secure base image. Monitor applications dependencies to automatically find and fix new vulnerabilities. Manage License compliance with legal risk associated with your dependencies and drive license compliance throughout your SDLC. It integrates with Jira, GitHub, GitLab, and more. For Developers, Small, Medium and Large companies make use of the software.

Read more Read less

Snyk Pricing

  • Free Trial Not Available
  • Starts at $25.0. Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

  • Accurate Vulnerability Detection, Comprehensive Vulnerability Reporting
  • Occasional False Positives, Limited Free Plan
View Details
GetSecured logo
Comprehensive Enterprise Data Protection Program Write a Review
View Details + Add to Compare

What is GetSecured and how does it work?

GetSecured is a security scanning tool that can be used to find breached data, web app vulnerabilities, data leakage, whether the employees' emails are breached somewhere or not and many more. Our tool can be easily understood by a non-technical person also. We have a super cool dashboard in which you can view all your previous scan details like from which country the asset is located and many more.

Read more Read less

GetSecured Pricing

  • Free Trial Not Available
  • Starts at $199.00. Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Tanium Comply logo
Converged Endpoint Management platform 4 Based on 3 Ratings
View Details + Add to Compare

What is Tanium Comply and how does it work?

Tanium Comply conducts vulnerability and compliance assessments against operating systems, applications, and security configurations and policies. It provides the data necessary to help eliminate security exposures, improve overall IT hygiene and simplify preparation for audits.

Read less

Tanium Comply Pricing

  • Free Trial Not Available
  • Offers Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details
Threatwatch logo
Next generation threat protection for all attack surfaces 4.9 Based on 10 Ratings
View Details + Add to Compare

What is Threatwatch and how does it work?

ThreatWatch can help detect and prioritize the impact of critical threats up to 3 months earlier than leading scanners without the need for redundant scanning or having to deploy black-box agents. Secure your entire DevOps pipeline as an asset. Protect your source code repository, open-source dependencies, containers, and production cloud against malware, vulnerabilities, security misconfiguration, and information leaks (secrets in source code). Model virtually any kind of asset including network devices, IOT devices, golden images, and other assets that are hard to scan or out of reach of traditional scanning tools.

Read more Read less

Threatwatch Pricing

  • Free Trial Available
  • Offers Free-forever and Custom plan.

SW Score Breakdown The SW Score breakdown shows individual score for product features.Read more

coming soon image

User Sentiment

Not Enough Reviews!

Write a Review
View Details

We understand SaaS better

SaaSworthy helps stakeholders choose the right SaaS platform based on detailed product information, unbiased reviews, SW score and recommendations from the active community.

icon

Buyers

Looking for the right SaaS

We can help you choose the best SaaS for your specific requirements. Our in-house experts will assist you with their hand-picked recommendations.

icon

Makers

Want more customers?

Our experts will research about your product and list it on SaaSworthy for FREE.

Get Listed