Best Risk-Based Vulnerability Management Software - Page 9

BS
Researched and written by Brandon Summers-Miller

Risk-based vulnerability management software is used to identify and prioritize vulnerabilities based on customizable risk factors. These tools are more advanced than traditional vulnerability management solutions, as they assist in the prioritization of issues and execution of remedies based on the results of machine learning algorithms.

Companies use risk-based vulnerability management solutions to analyze entire organizations’ IT systems, cloud services, and/or applications and identify priorities. Instead of manually identifying vulnerabilities and remediating them in order of discovery, an organization can automate that process to remediate vulnerabilities impacting critical business components first. From there, they can address issues as the system has ordered by impact and remediation time. Companies can customize these priorities as they see fit by weighing risk factors differently.

Risk-based vulnerability management solutions are primarily used by IT professionals and security staff. These teams will integrate system and application information, outline priorities, and analyze assets. Automation within these tools saves significant time; furthermore, addressing critical vulnerabilities first can significantly reduce the likelihood of security incidents, failover, and data loss.

There is some overlap between risk-based vulnerability management solutions and security risk analysis software, but there are a few key differences. Security risk analysis tools provide similar capabilities in identifying vulnerabilities and other security risks. But security risk analysis tools, aside from a few outlier products, will not utilize machine learning and automation to assist in the prioritization and execution of vulnerability remediation.

To qualify for inclusion in the Risk-Based Vulnerability Management category, a product must:

Integrate threat intelligence and contextual data for analysis
Analyze applications, networks, and cloud services for vulnerabilities
Utilize risk factors and machine learning to prioritize vulnerabilities

Best Risk-Based Vulnerability Management Software At A Glance

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
175 Listings in Risk-Based Vulnerability Management Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    As cybersecurity threats and cyber attacks become more prevalent and severe, leverage the power of data to deliver the cyber education and protection organizations need with Cyber OverVue.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyber OverVue features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Zywave
    Year Founded
    1995
    HQ Location
    Milwaukee, WI
    LinkedIn® Page
    www.linkedin.com
    790 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

As cybersecurity threats and cyber attacks become more prevalent and severe, leverage the power of data to deliver the cyber education and protection organizations need with Cyber OverVue.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cyber OverVue features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Zywave
Year Founded
1995
HQ Location
Milwaukee, WI
LinkedIn® Page
www.linkedin.com
790 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigat

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Derive features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Derive
    Year Founded
    2021
    HQ Location
    Richmond, US
    LinkedIn® Page
    linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

For Cybersecurity Managers (e.g., CISOs, IT Directors, and Risk Managers) who are tasked with assessing a company’s cyber risk exposure and required to allocate limited resources to adequately mitigat

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Derive features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Derive
Year Founded
2021
HQ Location
Richmond, US
LinkedIn® Page
linkedin.com
2 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Vulnerability assessment software with network scanning, vulnerabilities evaluation, risk assessment, reporting and remediation.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DragonSoft DVM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    Twitter
    @dragonsoft_tw
    23 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Vulnerability assessment software with network scanning, vulnerabilities evaluation, risk assessment, reporting and remediation.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DragonSoft DVM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2002
Twitter
@dragonsoft_tw
23 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Eracent has 25 years' experience providing the highest quality foundational data, analysis, and reporting for IT Asset Management (ITAM), Software Asset Management (SAM), IT Service Management (ITSM),

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Eracent SBOM Manager features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Eracent
    Year Founded
    2000
    HQ Location
    Riegelsville, Pennsylvania
    Twitter
    @eracent
    141 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    79 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Eracent has 25 years' experience providing the highest quality foundational data, analysis, and reporting for IT Asset Management (ITAM), Software Asset Management (SAM), IT Service Management (ITSM),

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Eracent SBOM Manager features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Eracent
Year Founded
2000
HQ Location
Riegelsville, Pennsylvania
Twitter
@eracent
141 Twitter followers
LinkedIn® Page
www.linkedin.com
79 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    An insight into next generations security orchestra platform - Enterprise Security in One Framework

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESOF - Enterprise Security in One Framework features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

An insight into next generations security orchestra platform - Enterprise Security in One Framework

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ESOF - Enterprise Security in One Framework features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ethiack helps keep companies safe from cybercrime by combining Machine and Human Ethical Hacking for both in-depth and in-breadth security testing.

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ethiack features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ethiack
Product Description
How are these determined?Information
This description is provided by the seller.

Ethiack helps keep companies safe from cybercrime by combining Machine and Human Ethical Hacking for both in-depth and in-breadth security testing.

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Ethiack features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ethiack
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Don’t base your vulnerability prioritization on assumptions. Use predictive threat intelligence to make smarter and faster decisions on what to remediate, and when. Powered by Cyr3con threat intellig

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Farsight features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Outpost24
Product Description
How are these determined?Information
This description is provided by the seller.

Don’t base your vulnerability prioritization on assumptions. Use predictive threat intelligence to make smarter and faster decisions on what to remediate, and when. Powered by Cyr3con threat intellig

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Farsight features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Outpost24
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Industrial digitalization has accelerated the convergence of IT, IoT and OT assets and networks, increasing the complexity and vulnerability of previously isolated OT and ICS networks. With industria

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout OT Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,666 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Industrial digitalization has accelerated the convergence of IT, IoT and OT assets and networks, increasing the complexity and vulnerability of previously isolated OT and ICS networks. With industria

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Forescout OT Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,666 Twitter followers
LinkedIn® Page
www.linkedin.com
1,132 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Forescout Risk and Exposure Management solution helps organizations move beyond visibility to understanding by enabling them to: ▶ Reduce operational overhead for cybersecurity asset management ▶

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forescout Risk & Exposure Management features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2000
    HQ Location
    San Jose, CA
    Twitter
    @ForeScout
    23,666 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Forescout Risk and Exposure Management solution helps organizations move beyond visibility to understanding by enabling them to: ▶ Reduce operational overhead for cybersecurity asset management ▶

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Forescout Risk & Exposure Management features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2000
HQ Location
San Jose, CA
Twitter
@ForeScout
23,666 Twitter followers
LinkedIn® Page
www.linkedin.com
1,132 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HACK-X NODE is a Risk and Vulnerability Management PTaaS product delivering on-demand, continuous and scalable Security Assessments with a unique blend of automated scanning and in-depth manual penetr

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HACK-X NODE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

HACK-X NODE is a Risk and Vulnerability Management PTaaS product delivering on-demand, continuous and scalable Security Assessments with a unique blend of automated scanning and in-depth manual penetr

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
HACK-X NODE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software. Our mission is to keep these critical technologies running smoothly, securely, and in complia

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HeroDevs features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    HeroDevs
    Twitter
    @herodevs
    2,560 Twitter followers
Product Description
How are these determined?Information
This description is provided by the seller.

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software. Our mission is to keep these critical technologies running smoothly, securely, and in complia

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
HeroDevs features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
HeroDevs
Twitter
@herodevs
2,560 Twitter followers
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Humanize Salience is the N1 quantified cyber risk management solution translated for C-level executives. Our solution helps organizations to proactively assess the hidden risks of cyber vulnerabi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Humanize Salience features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Humanize
Product Description
How are these determined?Information
This description is provided by the seller.

Humanize Salience is the N1 quantified cyber risk management solution translated for C-level executives. Our solution helps organizations to proactively assess the hidden risks of cyber vulnerabi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Humanize Salience features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Humanize
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Inspectiv is an all-in-one AppSec testing platform that simplifies the process of discovering, validating, and remediating vulnerabilities. By offering penetration testing, bug bounty programs, dynami

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Inspectiv features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Inspectiv
Product Description
How are these determined?Information
This description is provided by the seller.

Inspectiv is an all-in-one AppSec testing platform that simplifies the process of discovering, validating, and remediating vulnerabilities. By offering penetration testing, bug bounty programs, dynami

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Inspectiv features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Inspectiv
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Assessment is a Windows-based program for in-depth analysis of the full scope of the iSeries server (System i or AS/400) security strengths and weaknesses, pinpointing the security risks whi

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Assessment features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    502 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    20 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Assessment is a Windows-based program for in-depth analysis of the full scope of the iSeries server (System i or AS/400) security strengths and weaknesses, pinpointing the security risks whi

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
iSecurity Assessment features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
502 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ivanti Neurons for App Security Orchestration & Correlation (ASOC) delivers full-stack visibility of application risk exposure from development to production. It works by unifying all application

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Ivanti Neurons for ASOC features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ivanti
    Year Founded
    1985
    HQ Location
    South Jordan, UT
    Twitter
    @GoIvanti
    6,770 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,974 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Ivanti Neurons for App Security Orchestration & Correlation (ASOC) delivers full-stack visibility of application risk exposure from development to production. It works by unifying all application

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Ivanti Neurons for ASOC features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ivanti
Year Founded
1985
HQ Location
South Jordan, UT
Twitter
@GoIvanti
6,770 Twitter followers
LinkedIn® Page
www.linkedin.com
2,974 employees on LinkedIn®