Home / Threat Intelligence and Detection / Vulnerability Scanning and Management

Vulnerability Scanning and Management

Proactive vulnerability scanning and management to detect and mitigate cyber threats effectively.

Try these 222 AI Vulnerability Scanning and Management Tools

Muscope Cybersecurity
Free

Muscope Cybersecurity View Muscope Cybersecurity

Muscope Cybersecurity, now part of TeamSystem, provides a robust platform for comprehensive cyber risk assessment and continuous monitoring. It meticulously analyzes your organization's external attack surface, quantifies cybersecurity posture with an industry-benchmarked rating, and proactively identifies critical vulnerabilities. Gain actionable insights into potential threats, evaluate security control effectiveness, and understand the potential impact of cyber attacks to fortify your defenses.

External Attack Surface Management
Cybersecurity Risk Assessment
Automated Vulnerability Identification
MyKRIS Asia
Free

MyKRIS Asia View MyKRIS Asia

MyKRIS Asia is a leading provider of comprehensive digital services focused on bolstering corporate network and data security. We deliver expert management of internet network services and advanced cybersecurity solutions tailored for enterprises. Our signature Continuous Cyber Security Assessment and Management Service proactively identifies and mitigates threats through ongoing scanning, monitoring, and vulnerability management, ensuring your IT infrastructure remains robust against external risks.

Managed Internet Network Services
Comprehensive Cybersecurity Solutions
Continuous Cyber Security Assessment
Nanitor
Free

Nanitor View Nanitor

Nanitor is an advanced cybersecurity management platform designed to strengthen security across your entire IT infrastructure, from on-premise to cloud environments. It offers unparalleled visibility and control over security challenges, enabling automated asset discovery and continuous identification of critical cybersecurity vulnerabilities for trusted stakeholder reporting. Nanitor empowers organizations to proactively enforce technical policies aligned with corporate requirements, compliance frameworks, and industry best practices through a single, intuitive platform, ensuring operational efficiency and collaboration between IT and security teams.

Automated global IT asset discovery (on-premise and cloud)
Continuous identification of fundamental cybersecurity issues
Active enforcement of custom technical policies
Nassec
Free

Nassec View Nassec

Nassec stands as a premier cybersecurity firm, specializing in comprehensive vulnerability management and tailored security solutions. Our expert team, comprised of globally recognized cybersecurity practitioners, delivers robust offensive security services including penetration testing, web/mobile application security, and blockchain security, all adhering to international standards. We empower businesses across diverse sectors like Fintech, SAAS, and E-commerce by proactively identifying and mitigating risks, ensuring a secure digital landscape.

Vulnerability Assessment & Penetration Testing
Web and Mobile Application Security
Information Security Audits
NDAY Security
Free

NDAY Security View NDAY Security

NDAY Security offers a cutting-edge Continuous Threat Exposure Management (CTEM) platform that delivers unparalleled attack surface visibility and vulnerability identification in seconds. Our scientifically-based risk rating and exploitability focus empower organizations to prioritize and manage threats proactively, moving beyond traditional point-in-time assessments for comprehensive, ongoing security.

Continuous Threat Exposure Management (CTEM)
Enhanced Attack Surface Coverage
Scientific Risk Rating & Exploitability Focus
New Net Technologies (NNT)
Free

New Net Technologies (NNT) View New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls through advanced vulnerability management, intelligent change control and real-time breach detection. NNT is the leading provider of SecureOps™. SecureOps™ combines the essential, foundational security controls as prescribed by all leading security frameworks such as CIS and NIST with the operational discipline of change management. By ensuring you have the prescribed essential security controls in place combined with the ability to correlate changes within your environment with an approved ticket or set of intelligent rules, organizations are able to prevent - and protect themselves against - all forms of breach as well as gaining full control of changes for both security and operational peace of mind. Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law. Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NorthStar
Free

NorthStar View NorthStar

NorthStar delivers advanced, risk-based vulnerability management and exploit prediction capabilities to cyber security teams. Our platform provides critical visibility by intelligently automating data collection, cleansing, and enrichment from multiple sources. This enables organizations to effectively prioritize remediation efforts, focusing on the most severe vulnerabilities impacting their most important business functions and assets for tangible risk reduction.

Risk-based vulnerability management
Vulnerability exploit prediction
Automated, enriched data collection
NST Cyber
Free

NST Cyber View NST Cyber

NST Cyber empowers global banks and Forbes 2000 companies with advanced Threat Exposure Management solutions designed for today's AI-driven threat landscape. Our flagship NST Assure CTEM platform delivers rapid threat assessment, continuous vulnerability prioritization, and automated response capabilities, ensuring robust digital asset protection and operational integrity while maintaining compliance. We are committed to providing organizations with the essential tools and processes to proactively defend against evolving cyber threats.

Comprehensive Threat Exposure Management (CTEM)
Rapid Threat Assessment
Continuous Vulnerability Prioritization
Nucleus Security
Free

Nucleus Security View Nucleus Security

Nucleus Security is a comprehensive vulnerability and risk management platform designed to streamline and automate your entire remediation workflow. By integrating seamlessly with your existing security and IT tools, Nucleus consolidates data to provide unparalleled visibility and control over your threat landscape, enabling faster, more effective responses to evolving cyber threats. Gain significant operational efficiencies and achieve rapid time-to-value with a solution built for modern enterprises seeking to proactively defend against sophisticated attacks.

Centralized Vulnerability Management
Automated Remediation Workflows
Integrations with Security & IT Tools
Onward Security
Free

Onward Security View Onward Security

Onward Security is a leading provider of comprehensive security solutions, specializing in network and application assessments, robust product security testing, and expert consulting services. Leveraging advanced technology and proprietary methodologies, we proactively secure, defend, and respond to evolving threats across information, distribution, and network systems. Our accredited Onward Security Assessment Laboratory excels at uncovering Zero-day vulnerabilities (CVE IDs) and ensuring products meet stringent international standards, thereby reducing security defects and providing critical assurance.

Network & Application Security Assessment
Product Security Testing & Assurance
Zero-day Vulnerability Discovery (CVE IDs)
OryxLabs
Free

OryxLabs View OryxLabs

OryxLabs delivers comprehensive enterprise digital risk protection through 24/7 continuous assessment, monitoring, and improvement to proactively safeguard your network against evolving cyber threats. Engineered by a diverse, global team with deep cybersecurity expertise, OryxLabs provides best-in-class intelligence and technical solutions designed to mitigate current and future attacks, ensuring robust security posture.

24/7 Continuous Assessment & Monitoring
Advanced Network Security
Digital Risk Protection Solutions
OutKept
Free

OutKept View OutKept

OutKept empowers organizations to fortify their defenses against phishing threats through high-fidelity simulation campaigns. Leveraging a dedicated community of ethical phishers, our platform meticulously assesses and strengthens employee awareness and resilience against sophisticated scams. We provide actionable insights and straightforward, privacy-respecting solutions to proactively identify vulnerabilities and enhance your organization's overall security posture.

Advanced phishing simulation with realistic threat scenarios
Community-driven ethical phishing expertise
Comprehensive awareness and resilience testing
Outpost24
Free

Outpost24 View Outpost24

Outpost24 delivers advanced vulnerability management technology and services, simplifying the intricate security challenges faced by contemporary organizations. Our state-of-the-art platform offers real-time threat intelligence and actionable reporting, enabling businesses to proactively identify, prioritize, and mitigate critical security weaknesses across their entire digital estate.

Comprehensive Vulnerability Scanning
Automated Threat Prioritization
Real-time Vulnerability Alerts
Palindrome Technologies
Free

Palindrome Technologies View Palindrome Technologies

Palindrome Technologies delivers comprehensive cybersecurity solutions, safeguarding clients against sophisticated threats across hardware, software, cloud, and human elements. Since 2005, we've partnered with Fortune 500 and emerging organizations across vital sectors to build robust cyber-resilience. Our 'Symmetric Defense' philosophy uniquely integrates deep expertise with cutting-edge research to proactively identify and neutralize vulnerabilities, ensuring the continuous protection of your digital assets and operations.

Comprehensive Cyber Attack Surface Defense
Trusted Partner for Fortune 500 & Growing Organizations
Sector Expertise (Finance, Healthcare, Government, etc.)
Pangu Laboratory
Free

Pangu Laboratory View Pangu Laboratory

Pangu Laboratory, founded by the renowned Pangu cyber security team, is a leading entity in advanced security and attack/defense research. With deep expertise in operating systems, virtualization, IoT, and application security, Pangu Laboratory drives innovation in complex security domains. Their work directly informs the development of cutting-edge security solutions and strategies for enterprise-level protection.

Advanced Security Research
Attack and Defense Research
Operating System Security Expertise
PatchAdvisor
Free

PatchAdvisor View PatchAdvisor

PatchAdvisor, now part of Core4ce, offers elite IT security services by adopting an attacker's perspective to identify and exploit vulnerabilities within enterprise networks. Our approach leverages advanced methodologies, proprietary toolkits, and unparalleled expertise to deliver superior vulnerability assessments, penetration testing, application security analysis, and incident response.

Comprehensive Network Vulnerability Assessments
Advanced Penetration Testing
In-depth Application Security Analysis
PDQ
Free

PDQ View PDQ

PDQ provides comprehensive device management solutions built by and for system administrators, emphasizing simplicity, security, and speed. It empowers IT professionals to efficiently manage and organize hardware, software, and configuration data across Windows and Apple devices. PDQ Detect identifies and prioritizes high-risk vulnerabilities across your entire attack surface, including on-prem, remote, and internet-facing assets, enabling proactive security and continuous remediation for enhanced cyber resilience.

Comprehensive Windows and Apple device management
Hardware, software, and configuration data organization
Vulnerability detection and risk prioritization
Pentera Security
Free

Pentera Security View Pentera Security

Pentera is a leading automated security validation platform that continuously mimics sophisticated attacker behaviors to proactively identify and remediate misconfigurations and threats. By emulating real-world attack paths without disrupting operations, Pentera provides continuous assessment and actionable insights, keeping organizations ahead of evolving cyber risks. Our platform empowers security teams to reduce their attack surface and optimize their security posture with data-driven, threat-oriented validation.

Automated Pentration Testing
Continuous Security Validation
Threat Emulation
Phosphorus Cybersecurity
Free

Phosphorus Cybersecurity View Phosphorus Cybersecurity

Phosphorus Cybersecurity addresses the rapidly expanding threat landscape of connected devices by providing automated remediation for critical IoT vulnerabilities, including outdated firmware and default credentials. Our advanced technology, DigitalStakeout, empowers security professionals to proactively reduce cyber risk, delivering immediate improvements in security posture and demonstrable ROI. Complementing our core offering, MIRACL provides seamless, single-step Multi-Factor Authentication, simplifying password replacement across all devices and enhancing overall organizational security.

Automated remediation of outdated IoT firmware
Automated remediation of default IoT credentials
Proactive cybersecurity risk reduction
Prequel
Free

Prequel View Prequel

Prequel is an advanced real-time platform designed for proactive incident prevention and rapid resolution, leveraging collective global reliability intelligence. It intelligently aggregates and analyzes critical failure knowledge dispersed across platforms like GitHub, Discord channels, and post-mortems. This distilled knowledge fuels an extensible library of sophisticated problem detectors, specifically targeting open-source bugs, common misconfigurations, and systemic software antipatterns, ensuring your systems are production-ready and resilient against unforeseen issues.

Real-time problem detection and alerting
Global failure knowledge aggregation
Extensible library of problem detectors
ProjectDiscovery
Free

ProjectDiscovery View ProjectDiscovery

ProjectDiscovery is a leading open-source cybersecurity organization dedicated to building powerful software solutions for security engineers and developers. Our robust suite of tools empowers the InfoSec community and major internet companies like Microsoft, Cloudflare, and Fastly to automate and accelerate vulnerability detection and management. With a massive global user base and over 1,000 contributors innovating collaboratively, ProjectDiscovery provides a vital framework for efficient, large-scale security operations and proactive vulnerability remediation.

Open-source cybersecurity software
Automated vulnerability detection framework
Trusted by top internet companies
PureSoftware
Free

PureSoftware View PureSoftware

PureSoftware, now part of Happiest Minds Technologies, is a global leader in digital transformation services. We empower top organizations across diverse industries to realize their business vision through a comprehensive suite of solutions, including Application Modernization, Data & Analytics, Cloud Services, Intelligent Automation, Customer Experience, and advanced Cybersecurity. Our expert cybersecurity team leverages industry-leading practices to deliver robust assessments, threat detection, and incident response, safeguarding businesses against emerging threats.

Digital Transformation Services
Application Modernization
Data & Analytics Solutions
Purple Knight
Free

Purple Knight View Purple Knight

Purple Knight, developed by industry-leading Microsoft identity experts, is a free Active Directory security assessment tool designed to proactively identify and remediate vulnerabilities. By simulating common attack vectors and evaluating your AD environment, Purple Knight uncovers risky configurations and security gaps. Receive prioritized, actionable guidance to strengthen your defenses against sophisticated threats and ensure the integrity of your identity infrastructure.

Comprehensive Active Directory security assessment
Identifies common and advanced attack vectors
Uncovers risky configurations and vulnerabilities
Qualys
Free

Qualys View Qualys

Qualys is a leading provider of cloud-based security and compliance solutions, empowering over 10,300 organizations in more than 130 countries. Its unified platform streamlines security and compliance initiatives, integrating seamlessly into digital transformation for enhanced agility and significant cost savings. The Qualys Cloud Platform delivers continuous, critical security intelligence, enabling automated auditing, compliance, and protection across on-premises, endpoint, and cloud environments.

Cloud-based security and compliance platform
Continuous security intelligence
Automated auditing and compliance