Home / Threat Intelligence and Detection / Vulnerability Scanning and Management

Vulnerability Scanning and Management

Proactive vulnerability scanning and management to detect and mitigate cyber threats effectively.

Try these 222 AI Vulnerability Scanning and Management Tools

Quantum Armor
Free

Quantum Armor View Quantum Armor

Quantum Armor is a cutting-edge, agentless cybersecurity monitoring platform designed to provide continuous visibility into your security posture. Leveraging advanced artificial intelligence, it proactively identifies emerging threats, vulnerabilities, and abnormal activity across your network, web applications, and infrastructure. Quantum Armor delivers unique operational insights by analyzing externally available data and integrating with existing cloud and web application APIs, offering unparalleled flexibility with SaaS, on-premises, and hybrid deployment options.

Agentless, continuous cybersecurity monitoring
AI-powered threat, vulnerability, and anomaly detection
Network, web application, and infrastructure insights
Quantum Squint
Free

Quantum Squint View Quantum Squint

Quantum Squint pioneers advanced regression management for robust cybersecurity. Our Automated Regression Management Machine (LeapARMM) meticulously monitors websites for any unintended alterations, swiftly identifying potential malware or vulnerabilities. By providing automated, scheduled scans and real-time email alerts upon change detection, LeapARMM empowers organizations to proactively safeguard their digital assets, ensuring operational confidence and uninterrupted business continuity.

Automated website vulnerability detection
Unintended change monitoring
Scheduled scanning with customizable frequency
R2S Technologies
Free

R2S Technologies View R2S Technologies

In today's rapidly evolving digital landscape, R2S Technologies offers industry-leading Vulnerability Assessment & Penetration Testing (VA-PT) services to bolster your defenses against sophisticated cyber threats. Our certified ethical hackers provide comprehensive security assessments for web and mobile applications, delivering clear, actionable reports and expert remediation services to ensure your digital assets are secure. With a global team of seasoned cybersecurity professionals, R2S Technologies is your trusted partner in navigating the complexities of modern cybersecurity.

Certified Vulnerability Assessment & Penetration Testing (VA-PT)
Expert Remediation Services for Identified Vulnerabilities
Comprehensive Web Application Security Testing
Raman Power Technologies
Free

Raman Power Technologies View Raman Power Technologies

Raman Power Technologies delivers comprehensive IT services and solutions focused on driving business value and overcoming complex challenges, with a core specialization in advanced cybersecurity. Our Next Generation Pentest platform offers robust attack surface management to fortify your infrastructure, complemented by a leading-edge Vulnerability Assessment tool that automates and streamlines the reporting process. Furthermore, our Cyber Risk Planning services integrate business context across all organizational levels, enabling effective understanding, prioritization, and management of cyber risks from strategic planning to full implementation.

Next Generation Pentest for attack surface management
Automated Vulnerability Assessment and reporting
Cyber Risk Planning with business context integration
Randori
Free

Randori View Randori

Randori, now part of Palo Alto Networks through the acquisition of IBM Security QRadar, offers a sophisticated attack platform delivering 'red-teaming' as a service. It simulates advanced threat actor tactics by combining continuous reconnaissance, real-time target analysis, and on-demand attack execution. This provides an attacker's perspective to proactively identify and address vulnerabilities before they can be exploited.

Continuous Reconnaissance
Real-time Target Analysis
On-Demand Attack Execution
RankedRight
Free

RankedRight View RankedRight

RankedRight, now part of Lansweeper, empowers organizations to master their vulnerability management programs by prioritizing risks based on business context. We provide a unified, intelligent view of vulnerabilities, equipping security teams with the actionable insights needed to focus on and remediate the most critical threats, thereby strengthening their overall security posture.

Risk-based vulnerability prioritization
Unified view of all vulnerabilities
Actionable insights for remediation
Rapid7
Free

Rapid7 View Rapid7

Rapid7 is a comprehensive cybersecurity platform that unifies cloud risk management and advanced threat detection to proactively secure your business and ensure resilience against emerging threats. It enables organizations to significantly reduce their attack surface and eliminate vulnerabilities with industry-leading solutions like Cloud Risk Complete, offering unlimited vulnerability management and dynamic application security testing across the entire cloud lifecycle. Furthermore, Rapid7's Threat Complete provides world-class Managed Detection & Response (MDR) powered by elite SOC experts, covering your complete attack surface to detect and eradicate threats early.

Integrated Cloud Risk Management and Threat Detection
Unlimited Vulnerability Management
Dynamic Application Security Testing (DAST)
RedHunt Labs
Free

RedHunt Labs View RedHunt Labs

RedHunt Labs empowers organizations with comprehensive Attack Surface Management (ASM) through its advanced NVADR platform and expert Penetration Testing services. NVADR provides continuous, high-fidelity visibility into your external digital footprint, encompassing dynamic infrastructure, cloud environments, third-party integrations, and even assets exposed by sales, marketing, or M&A activities. By meticulously profiling and inventorying all external assets, RedHunt Labs enables precise risk identification and prioritization, eliminating noise and false positives to strengthen your overall cybersecurity posture.

Continuous Attack Surface Visibility
Automated Asset Profiling and Inventory
Dynamic Infrastructure Monitoring
RedLattice
Free

RedLattice View RedLattice

REDLattice is at the forefront of cybersecurity innovation, proactively defending critical infrastructure and securing the nation's digital frontier through advanced AI-assisted vulnerability research and cutting-edge tool development. We empower organizations with superior threat intelligence and strategic cyber capabilities, ensuring a decisive advantage against evolving adversarial tactics. By integrating endpoint management and security, REDLattice fosters unparalleled efficiency and collaborative defense between IT and security teams.

AI-Assisted Vulnerability Research
Proactive Threat Identification and Neutralization
Critical Infrastructure Protection
ReFirm Labs
Free

ReFirm Labs View ReFirm Labs

ReFirm Labs, now part of Microsoft, offers advanced solutions for comprehensive firmware security. Leveraging the expertise of former U.S. government cyber professionals, the platform excels in firmware vetting, in-depth analysis, and continuous IoT security monitoring to uncover sophisticated cyber threats embedded within connected devices.

Expert Firmware Analysis and Vetting
Continuous IoT Security Monitoring
Discovery of Sophisticated Cyber Threats
ResilientX
Free

ResilientX View ResilientX

ResilientX is a comprehensive All-In-One Security Testing Platform empowering MSPs and SMBs to conduct robust security assessments internally, eliminating the need for outsourcing. We deliver advanced, innovative solutions designed to proactively minimize cyber attack risks and enhance organizational security posture through customized managed services and dedicated partner support for MSPs and System Integrators.

All-In-One Security Testing Platform
Internal Security Assessments
Minimized Cyber Attack Risks
Ridge Security
Free

Ridge Security View Ridge Security

Ridge Security empowers organizations of all sizes, from enterprises and ISVs to government and educational institutions, to proactively secure their systems through intelligent, risk-based vulnerability management. RidgeBot, their flagship automated penetration testing solution, emulates real attackers by leveraging a vast collective knowledge of threats and exploits to efficiently identify and document vulnerabilities, making sophisticated security testing affordable and scalable for all.

Intelligent, risk-based vulnerability management
Automated penetration testing with RidgeBot
Emulates real attacker techniques and exploits
Root Evidence
Free

Root Evidence View Root Evidence

Root Evidence empowers organizations to transform vulnerability management from a technical exercise into a strategic business imperative. By quantifying digital risk into measurable financial outcomes, we enable security teams to prioritize remediation efforts on the vulnerabilities posing the greatest threat, thereby demonstrably reducing the likelihood of a breach. Our evidence-based approach ensures security investments are directly aligned with tangible business impact.

Evidence-driven vulnerability prioritization
Quantifiable financial risk assessment
Attack surface management integration
Rootshell Security
Free

Rootshell Security View Rootshell Security

Rootshell Security revolutionizes vulnerability management and offensive security with its vendor-agnostic Prism Platform and elite RedForce offensive security assessments. The Prism Platform streamlines remediation by contextualizing vulnerabilities and providing real-time insights, while the RedForce team, comprising certified and highly skilled testers, delivers advanced red team services including penetration testing, managed scanning, and phishing simulations. This comprehensive approach fortifies organizations against sophisticated cyber threats by mimicking real-world adversarial tactics.

Vendor-agnostic Prism Platform for streamlined vulnerability management
Real-time insights and contextualized issue prioritization
Industry-leading red team assessments by certified testers
rThreat
Free

rThreat View rThreat

rThreat, now part of Reveald, is a cloud-based SaaS platform empowering organizations to proactively test their cybersecurity posture. By simulating real-world and advanced custom threats within a secure, isolated environment, rThreat validates defenses against both known and emergent attack vectors, including zero-day exploits. Built on cutting-edge technology and informed by extensive field experience, rThreat provides a robust, corporate-integrated testing solution to ensure superior resilience against sophisticated cyber threats.

Cloud-based SaaS for accessibility and scalability
Simulation of real-world and custom attack scenarios
Secure, isolated testing environment
S4E (Security for Everyone)
Free

S4E (Security for Everyone) View S4E (Security for Everyone)

S4E.io is a cutting-edge SaaS cybersecurity platform dedicated to democratizing digital security. We provide individuals and businesses of all sizes with accessible, simple, and effective solutions for comprehensive protection of digital assets, making robust security a necessity and not a luxury. Our continuously enhanced threat exposure management tools empower users to safeguard their online presence with ease, contributing to a safer digital landscape.

User-centric SaaS cybersecurity platform
Accessible and easy-to-use solutions
Comprehensive digital asset protection
SafeBreach
Free

SafeBreach View SafeBreach

SafeBreach empowers security leaders to definitively answer critical questions from the CEO and board regarding enterprise security posture. By continuously simulating real-world, attacker-driven breach methods across the entire kill chain, our platform proactively identifies and prioritizes potential breach scenarios before they can be exploited. This "virtual hacker" approach provides quantifiable risk insights, validates the effectiveness of existing security controls, and enables the strategic weaponization of threat intelligence for continuous security validation and improvement.

Automated Breach Simulation
Full Kill Chain Coverage
Continuous Security Validation
Salt Cybersecurity
Free

Salt Cybersecurity View Salt Cybersecurity

Salt Cybersecurity empowers organizations of all sizes to robustly defend against modern cyber threats. Leveraging extensive enterprise experience, we've distilled complex security needs into an affordable, four-pronged approach, featuring customized security policies and quarterly vulnerability assessments. Our solutions are designed for easy deployment, ensuring essential information security is accessible and effective for every business.

Customized Security Policy Development
Quarterly Internal & External Vulnerability Assessments
Four-Pronged Information Security Approach
Sansec
Free

Sansec View Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers! Sansec forensic investigators were the first to document the emerging fraud of online skimming in 2015 and have since identified and analyzed more than 50 thousand cases. Digital skimming attacks are rampant. While largely invisible to consumers and merchants alike, criminals make millions by stealing payment and personal data. It takes a highly trained eye to identify these skimming attacks, which Sansec experts do on a daily basis. We are proud to have bundled our years of experience into our eComscan software, for the benefit of merchants and consumers around the world. The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient. BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Sasken Technologies
Free

Sasken Technologies View Sasken Technologies

Sasken Technologies is a leader in Product Engineering and Digital Transformation, offering comprehensive R&D solutions from concept to market. Their specialized Cybersecurity Services empower businesses to launch secure digital products, ensuring operational excellence and robust security postures. Through their advanced Security Labs, Sasken provides end-to-end vulnerability assessment and penetration testing across a wide spectrum of hardware and software, including critical sectors like automotive, industrial IoT, and cloud environments.

End-to-end R&D solutions
Specialized Cybersecurity Services
Comprehensive Vulnerability Assessment
Scanmeter
Free

Scanmeter View Scanmeter

Scanmeter is a comprehensive vulnerability management solution designed to proactively identify and remediate security weaknesses in software and systems before they can be exploited. Its flexible licensing and automated security testing capabilities enable cost-effective, recurring risk assessments throughout the development lifecycle, from development and acceptance testing to ongoing operation. By integrating Scanmeter, organizations can ensure early detection of critical security flaws, enhance overall security posture, and achieve continuous compliance.

Automated vulnerability scanning and identification
Proactive risk assessment and management
Early detection of security-critical errors
Scantist
Free

Scantist View Scantist

Scantist, a distinguished cybersecurity spin-off from Nanyang Technological University, empowers enterprises with advanced vulnerability management solutions. Our offerings include Scantist SCA, which meticulously inventories open-source dependencies to proactively identify security and legal risks. We also provide the Smart Fuzzer, a proprietary, architecture-agnostic platform for discovering unknown vulnerabilities at both source-code and binary levels, alongside BackupVault for robust, automated cloud backup and critical data protection against modern threats.

Comprehensive Software Composition Analysis (SCA)
Detection of open-source security and legal risks
Proprietary Smart Fuzzer for unknown vulnerabilities
Secarma
Free

Secarma View Secarma

Secarma offers comprehensive penetration testing and security assessment services designed to proactively identify and mitigate vulnerabilities within your digital infrastructure. Leveraging deep expertise across a broad spectrum of attack and compromise simulation disciplines, Secarma empowers organizations to build robust defenses against evolving cybersecurity threats.

Web Application Penetration Testing
Mobile Application Security Assessments
Infrastructure Security Testing
SecPoint
Free

SecPoint View SecPoint

SecPoint is a leading Scandinavian IT security innovator, dedicated to safeguarding your network infrastructure against sophisticated remote and local threats. Our comprehensive suite of security solutions includes robust UTM VPN Firewall Appliances featuring advanced anti-spam and web filtering, alongside powerful penetration testing appliances like IPS Penetrator for vulnerability scanning and assessment. We also offer the Portable Penetrator, a specialized Wi-Fi penetration testing tool for WEP/WPA/WPA2 password recovery, empowering organizations with robust defense and proactive security.

UTM VPN Firewall Appliance with Anti-Spam and Web Filter
IPS Penetrator for Vulnerability Scanning and Assessment
Portable Penetrator for Wi-Fi Password Recovery (WEP, WPA, WPA2)