---
description: Page 5 - See the list of the best Vulnerability Management Software for businesses in Australia. Our free interactive tool makes software selection fast and easy allowing to filter by price, feature or user rating.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 5 - Vulnerability Management Software - Comparison & Reviews - Capterra Australia 2026
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](https://www.capterra.com.au/directory/31062/vulnerability-management/software) > [Page 5](https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5)

# Vulnerability Management Software

Canonical: https://www.capterra.com.au/directory/31062/vulnerability-management/software

Page: 5 / 10\
Prev: [Previous page](https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=4)\
Next: [Next page](https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=6)

> Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [Nanitor](https://www.capterra.com.au/software/1043778/nanitor) — 5.0/5 (4 reviews) — Nanitor provides real-time detection of cybersecurity issues and proactive threat response for small and medium-sized businesses.
2. [Quadrant XDR](https://www.capterra.com.au/software/1049353/sagan) — 5.0/5 (4 reviews) — Quadrant combines the best security technology and talent in a single XDR solution.
3. [BIMA](https://www.capterra.com.au/software/1063789/bima) — 5.0/5 (4 reviews) — BIMA by Perisai merges EDR, NDR, XDR, and SIEM features for a holistic cybersecurity approach. For specifics, consult Perisai directly.
4. [Techowlshield](https://www.capterra.com.au/software/1065992/techowlshield) — 4.5/5 (4 reviews) — Cloud-based vulnerability scanner that helps businesses identify threats, analyze historical trends, access heatmaps, and more.
5. [CAST Highlight](https://www.capterra.com.au/software/177188/cast-highlight) — 5.0/5 (3 reviews) — CAST Highlight is a SaaS product that provides rapid insights across application portfolios.
6. [Crashtest Security](https://www.capterra.com.au/software/199325/crashtest-security) — 4.7/5 (3 reviews) — Crashtest Security is a DAST vulnerability scanner helping you automate your security scanning and achieve protection at DevOps speed.
7. [Lightspin](https://www.capterra.com.au/software/215630/lightspin) — 4.7/5 (3 reviews) — Attack-path-based cloud security platform that enables detection, prioritization, and remediation of risks to your cloud stack.
8. [Bugcrowd](https://www.capterra.com.au/software/218813/bugcrowd) — 5.0/5 (3 reviews) — Bugcrowd is a crowdsourced cybersecurity platform that helps organizations proactively identify and remediate security vulnerabilities.
9. [AWS Shield](https://www.capterra.com.au/software/1017251/aws-shield) — 4.3/5 (3 reviews) — DDoS protection solution that helps manage, block and respond to incidents.
10. [Apiiro](https://www.capterra.com.au/software/1020206/apiiro) — 4.3/5 (3 reviews) — Apiiro helps organizations secure their Software Development Lifecycle (SDLC).
11. [CODA Footprint](https://www.capterra.com.au/software/1021315/coda-footprint) — 5.0/5 (3 reviews) — Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
12. [Enzoic for Active Directory Lite](https://www.capterra.com.au/software/1030841/active-directory-lite) — 4.7/5 (3 reviews) — Free Password Auditing Tool Detects breached, weak, and reused passwords in Active Directory and provides fast, actionable insights.
13. [ISS](https://www.capterra.com.au/software/1036001/iss) — 4.3/5 (3 reviews) — Compliance management solution that helps conduct audits, track regulatory data, and more.
14. [Threatspy](https://www.capterra.com.au/software/1037300/threatspy) — 4.7/5 (3 reviews) — Developer-first Application \&amp; API Security Management Platform
15. [OX Security](https://www.capterra.com.au/software/1043847/ox-security) — 4.7/5 (3 reviews) — OX Security provides full visibility and end-to-end traceability over your entire software supply chain from code to cloud.
16. [SAINT Security Suite](https://www.capterra.com.au/software/130576/saint-security-suite) — 4.5/5 (2 reviews) — Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
17. [Intruder](https://www.capterra.com.au/software/161379/intruder) — 5.0/5 (2 reviews) — Intruder is a proactive vulnerability scanner that finds weaknesses in your exposed systems and helps with their remediation.
18. [MetricStream CyberGRC](https://www.capterra.com.au/software/166091/metricstream-it-grc-solution) — 3.5/5 (2 reviews) — Actively manage cyber risk by automating \&amp; enhancing your cyber \&amp; IT governance, risk \&amp; compliance processes with MetricStream CyberGRC
19. [DefectDojo](https://www.capterra.com.au/software/178929/defectdojo) — 4.0/5 (2 reviews) — DefectDojo is an open source application security testing software that enables teams to identify and manage vulnerabilities.
20. [Pentera](https://www.capterra.com.au/software/178964/pcysys) — 5.0/5 (2 reviews) — Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times.
21. [Application Security Platform](https://www.capterra.com.au/software/180356/stealth-security) — 5.0/5 (2 reviews) — Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.
22. [Teleport](https://www.capterra.com.au/software/185545/teleport) — 5.0/5 (2 reviews) — The easiest, most secure way to access and protect all your infrastructure.
23. [Detectify](https://www.capterra.com.au/software/187632/detectify) — 5.0/5 (2 reviews) — Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
24. [Versio.io](https://www.capterra.com.au/software/198825/versio-io-cmdb) — 4.5/5 (2 reviews) — SaaS and on-premise enterprise software solution for smarter and easier DevSecOps \&amp; ITSM operations.
25. [Strobes RBVM](https://www.capterra.com.au/software/200791/strobes) — 5.0/5 (2 reviews) — Strobes RBVM offers advanced reporting capabilities that empower organizations to gain deeper insights into their security posture.

-----

Page: 5 / 10\
Prev: [Previous page](https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=4)\
Next: [Next page](https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.capterra.com.au/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.com.au/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.com.au/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.com.au/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.com.au/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.com.au/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.com.au/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Australia","address":{"@type":"PostalAddress","addressLocality":"Sydney","addressRegion":"NSW","postalCode":"2060","streetAddress":"Level 18 40 Mount Street North Sydney NSW 2060 Australia"},"description":"Capterra Australia helps millions of people find the best business software with user reviews, ratings and price comparisons.","email":"info@capterra.com.au","url":"https://www.capterra.com.au/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.com.au/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.linkedin.com/company/capterra/","https://www.youtube.com/channel/UCjRCDmEibpHwyX3m2b3y80w"]},{"name":"Capterra Australia","url":"https://www.capterra.com.au/","@type":"WebSite","@id":"https://www.capterra.com.au/#website","publisher":{"@id":"https://www.capterra.com.au/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.com.au/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Page 5 - See the list of the best Vulnerability Management Software for businesses in Australia. Our free interactive tool makes software selection fast and easy allowing to filter by price, feature or user rating.","url":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5","about":{"@id":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5#webpage","mainEntity":{"@id":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5#itemlist"},"isPartOf":{"@id":"https://www.capterra.com.au/#website"},"inLanguage":"en-AU","publisher":{"@id":"https://www.capterra.com.au/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"https://www.capterra.com.au/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5","@type":"ListItem"}],"@id":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Vulnerability Management Software - Comparison &amp; Reviews - Capterra Australia 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Nanitor","position":1,"description":"Nanitor is a powerful vulnerability management solution focusing on hardening security fundamentals across your global IT infrastructure. The platform provides unique visibility and control of your security challenges that stakeholders can trust, at a fraction of the cost and time of alternatives.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8383ed11-8196-4130-91b3-e86dd31622e9.png","url":"https://www.capterra.com.au/software/1043778/nanitor","@type":"ListItem"},{"name":"Quadrant XDR","position":2,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWe leverage our own proprietary technology (Quadrant XDR), operated by seasoned security analysts around the clock. We differentiate by being best at the “R” in XDR - response is where we excel. Significantly improve mean time to remediate by eliminating internal escalation and hand-off, achieved via Sagan, powered by a flat analyst org in our SOC.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.capterra.com.au/software/1049353/sagan","@type":"ListItem"},{"name":"BIMA","position":3,"description":"BIMA by Peris.ai is redefining cybersecurity with its integrated EDR, NDR, XDR, and SIEM framework, enhanced by the power of generative AI and advanced machine learning. \n\nThese innovations not only bolster defense mechanisms but also bring predictive analytics and adaptive responses to the forefront, making BIMA a powerhouse in proactive cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7367a3f6-d166-4e8b-90a3-ebc9cf001fd1.png","url":"https://www.capterra.com.au/software/1063789/bima","@type":"ListItem"},{"name":"Techowlshield","position":4,"description":"We are committed to shielding you from the ever-evolving landscape of cyber threats. With years of experience and expertise, we stand as your \"Digital Defender,\" ready to safeguard your business, personal data, and online presence.\n\nAt TechOwl Shield, we harness cutting-edge Cyber Intelligence, strategic Brand Monitoring, in-depth Attack Surface Analysis, robust Infrastructure Surveillance, and thorough Supply Chain Risk Management to optimize and fortify our clients' digital security posture.\n\nWhether you're in healthcare, finance, retail, or any other sector, TechOwl Shield offers a suite of specialized services such as Anti-Phishing, Anti-Rogue activities, Dark web Monitoring, Brand Monitoring, Attack Surface Monitoring, and Mail Health Monitoring-that are tailored to meet the unique cybersecurity needs of every industry","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7d081281-d4ac-4479-90e6-d57d991b51da.png","url":"https://www.capterra.com.au/software/1065992/techowlshield","@type":"ListItem"},{"name":"CAST Highlight","position":5,"description":"CAST Highlight is a SaaS product that provides rapid insights across a portfolio of applications. It acts as an application ‘control tower’ by automatically understanding the source code of hundreds of applications in hours and delivering actionable insights on Software Health (resiliency, agility, technical debt), Cloud Readiness, Software Composition Analysis (open source risks), and Green Impact. Built-in surveys capture organizational context for more informed decision-making.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cce5449e-e558-43ea-8401-00dfa2ee4d7b.jpeg","url":"https://www.capterra.com.au/software/177188/cast-highlight","@type":"ListItem"},{"name":"Crashtest Security","position":6,"description":"Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation.\n\nWe offer the most advanced crawling options.\n\nOur software is able to directly detect attack vectors in all web applications:\n\nRevolutionary Single-Page application scanning\nPainless Multi-Page application setup\nDocumentation-based API scanning\n\nOur software is user-friendly yet powerful and provides detailed and accurate vulnerability reports.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d8be4a0a-b3a6-47a3-8926-b98697e4caab.png","url":"https://www.capterra.com.au/software/199325/crashtest-security","@type":"ListItem"},{"name":"Lightspin","position":7,"description":"Why Lightspin?\n\nLightspin’s attack-path-based cloud security platform enables detection, prioritization, and remediation of risks to your cloud stack, from build to runtime, and empowers Security and DevOps teams to eliminate risks and maximize productivity while minimizing friction between them. The platform reduces the noise generated by legacy cloud security providers, allowing your team to focus?on the risks that matter most. Lightspin supports AWS, Azure, GCP, and any Kubernetes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae22aae1-ed1f-47f4-9ad4-4f88c12c1d5a.png","url":"https://www.capterra.com.au/software/215630/lightspin","@type":"ListItem"},{"name":"Bugcrowd","position":8,"description":"Bugcrowd is a crowdsourced cybersecurity platform that offers continuous security testing to help organizations identify and remediate vulnerabilities. The Bugcrowd platform provides multiple security solutions including penetration testing, bug bounty programs, vulnerability disclosure, and attack surface management powered by a community of trusted security researchers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4364b39f-deed-4f72-9915-ae551eb3b6fc.jpeg","url":"https://www.capterra.com.au/software/218813/bugcrowd","@type":"ListItem"},{"name":"AWS Shield","position":9,"description":"DDoS protection solution that helps manage, block and respond to incidents.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e98fc689-14cc-460e-afb5-dee743df030a.jpeg","url":"https://www.capterra.com.au/software/1017251/aws-shield","@type":"ListItem"},{"name":"Apiiro","position":10,"description":"Apiiro performs deep code risk assessment across all source control systems and CI/CD pipelines and uses context across multiple data sources to remediate critical risks such as design flaws, misconfigurations, vulnerabilities, drifts & supply chain attacks before production.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d1b5a5a-c21c-4234-b7e5-7fa790f52638.png","url":"https://www.capterra.com.au/software/1020206/apiiro","@type":"ListItem"},{"name":"CODA Footprint","position":11,"description":"CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.? It is operating under the NIST Cybersecurity Framework.\n\nCODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e6f7da51-d70e-4a67-86ed-95658f9b49ee.jpeg","url":"https://www.capterra.com.au/software/1021315/coda-footprint","@type":"ListItem"},{"name":"Enzoic for Active Directory Lite","position":12,"description":"Quickly evaluate your Active Directory security with Enzoic’s Free Password Auditing Tool. In minutes, uncover critical password vulnerabilities and take action to protect your organization.\n\nKey Features:\n\n- Detect Breached Passwords: Find passwords exposed in known breaches.\n- Flag Weak Passwords: Identify common, weak, and guessable passwords.\n- Spot Password Reuse: Detect instances of repeated passwords across accounts.\n\nBacked by Enzoic’s advanced threat intelligence, the tool provides a detailed, downloadable report with actionable insights to strengthen password security.\n\nAssess your password risks today—fast, free, and effective.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/90512de1-b34d-4f8f-9b43-7badb16cfaa0.png","url":"https://www.capterra.com.au/software/1030841/active-directory-lite","@type":"ListItem"},{"name":"ISS","position":13,"description":"INSSIDE Security Suite is a leading platform in regulatory compliance solutions that allows companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes. In addition, ISS is a highly customizable platform and can be adapted to the specific needs of each company, which guarantees a unique and effective solution for each case.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f29459a-66d2-4eef-806d-ba859aa849e7.jpeg","url":"https://www.capterra.com.au/software/1036001/iss","@type":"ListItem"},{"name":"Threatspy","position":14,"description":"Threatspy is a Developer-first AI-powered AppSec Management platform (DAST) that enables developers and Security Teams to proactively identify and mitigate known and unknown vulnerabilities in their applications & API through automating detection, prioritization, and remediation processes.\n\nIt uses a heuristic approach to identify vulnerabilities, prioritizing them based on a custom-built Reachability Framework that provides a Security Posture score based on contextual analysis. The platform streamlines remediation by providing a Remediation Playbook and Mitigation Campaign, which automates actions and provides curated steps for efficient remediation. The platform also calculates ROI by evaluating the number of manual hours saved using the platform.\n\nEndorsed by industry leaders and holding a stellar 4.7 rating on Gartner Peer Insight, Capterra, G2, and Product Hunt.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/49d03218-d5c4-48bd-9a60-0a48cac286d0.png","url":"https://www.capterra.com.au/software/1037300/threatspy","@type":"ListItem"},{"name":"OX Security","position":15,"description":"OX Security provides full visibility and end-to-end OX Security's Active ASPM platform unifies application security practices and prevents risks across the software supply chain, empowering organizations to take the first step toward eliminating manual practices while confidently enabling scalable and secure development.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6172ed09-fe03-4356-abe9-c7d7e95bf53a.png","url":"https://www.capterra.com.au/software/1043847/ox-security","@type":"ListItem"},{"name":"SAINT Security Suite","position":16,"description":"From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business  with minimum impact to your daily operations. We build long-term relationships with our customers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d2a7750e-f290-46d2-939a-7bcfb3e7444f.png","url":"https://www.capterra.com.au/software/130576/saint-security-suite","@type":"ListItem"},{"name":"Intruder","position":17,"description":"Intruder is a proactive vulnerability scanner that finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur.\n\nCloud Connectors for AWS, Google Cloud and Azure help you synchronise your systems, so no stone gets left unturned.\n\nDeveloper integrations with Slack and Jira make keeping up to date a breeze.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c619ce63-b45d-4ff9-ad81-bf492b7f301b.png","url":"https://www.capterra.com.au/software/161379/intruder","@type":"ListItem"},{"name":"MetricStream CyberGRC","position":18,"description":"MetricStream CyberGRC helps organizations actively manage cyber risk through an IT and Cyber Risk and Compliance Framework that aligns with established security standards so you can pass IT audits more efficiently and get buy-in from top management. Gain comprehensive visibility into the overall IT risk posture and cybersecurity investment priorities. Get your IT and Cyber Compliance program up and running quickly with pre-packaged content and industry frameworks such as ISO 27001, NIST CSF, and NIST SP800-53, and map policies to IT controls and policy exceptions. Leverage best practices, insightful reporting, and risk quantification.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b73f2754-a57f-40af-9d87-02bae7ea4990.png","url":"https://www.capterra.com.au/software/166091/metricstream-it-grc-solution","@type":"ListItem"},{"name":"DefectDojo","position":19,"description":"DefectDojo is an open-source application vulnerability management tool designed for both DevSecOps and traditional application security. DefectDojo integrates with 150 security tools, has bi-directional integration with JIRA, and algorithms that learn overtime to automatically reduce noise and distill results. The tool provides reporting at every level including tests, engagements, and products, and offers a variety of metrics to gain visibility into vulnerability trends and insights.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/22fb511c-b726-41b4-964d-2b980133b007.png","url":"https://www.capterra.com.au/software/178929/defectdojo","@type":"ListItem"},{"name":"Pentera","position":20,"description":"Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations","url":"https://www.capterra.com.au/software/178964/pcysys","@type":"ListItem"},{"name":"Application Security Platform","position":21,"description":"Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications.  The extensible software platform can be deployed on premises or in the cloud.  It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fbc946ce-6f61-4577-b5c7-78993de9aec2.png","url":"https://www.capterra.com.au/software/180356/stealth-security","@type":"ListItem"},{"name":"Teleport","position":22,"description":"Teleport is the Infrastructure Identity Company, modernizing identity, access, and policy for infrastructure, improving engineering velocity and infrastructure resiliency against human factors and compromise. \n\nThe Teleport Infrastructure Identity Platform implements trusted computing at scale, with unified cryptographic identities for humans, machines and workloads, endpoints, infrastructure assets, and AI agents. Our identity-everywhere approach vertically integrates access management, zero trust networking, identity governance, and identity security into a single platform, eliminating overhead and operational silos. Headquartered in Oakland, CA, Teleport operates globally, with industry-leading customers such as Nasdaq, Moody’s, Adobe, and Elastic.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/adfb3088-111b-407a-9358-515210336eaf.png","url":"https://www.capterra.com.au/software/185545/teleport","@type":"ListItem"},{"name":"Detectify","position":23,"description":"Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f9a350c-9c53-4fa9-918f-9e8022f9eb54.png","url":"https://www.capterra.com.au/software/187632/detectify","@type":"ListItem"},{"name":"Versio.io","position":24,"description":"Versio.io is a SaaS and on-premise enterprise software platform for smarter and easier DevSecOps & ITSM operations.\n\nThe following solutions are provided by Versio.io:\n\n- Asset and Configuration Inventory (CMDB)\n- Change Management\n- Product release and patch management\n- IT vulnerabilities detection\n- IT governance\n- Enterprise architecture analysis & management\n\nVersio.io is used in data centers, (multi-) cloud environments and for SaaS applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/12bb47c7-cafc-4c74-88cc-c29dfff3ccbf.png","url":"https://www.capterra.com.au/software/198825/versio-io-cmdb","@type":"ListItem"},{"name":"Strobes RBVM","position":25,"description":"Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors. Through seamless automation, integration, and comprehensive reporting, organizations can proactively enhance their cybersecurity posture.\n\nStrobes Vulnerability Management software goes beyond the capabilities of a standalone vulnerability scanner.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07331f99-2c76-4084-9b8c-7f28a3427920.png","url":"https://www.capterra.com.au/software/200791/strobes","@type":"ListItem"}],"@id":"https://www.capterra.com.au/directory/31062/vulnerability-management/software?page=5#itemlist","numberOfItems":25}
</script>
