Best Software for 2025 is now live!
|| products.size

Best Vulnerability Scanner Software with Automated Scans Capabilities

Benefits of Vulnerability Scanner Software with Automated Scans capabilities include: Runs pre-scripted vulnerability scans without requiring manual work.
Below are the top-rated Vulnerability Scanner Software with Automated Scans capabilities, as verified by G2’s Research team. Real users have identified Automated Scans as an important function of Vulnerability Scanner Software. Compare different products that offer this feature so you can decide which is best for your business needs.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
11 Listings in Vulnerability Scanner Available
(284)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    19
    Ease of Use
    15
    Vulnerability Detection
    15
    Automated Scanning
    13
    Features
    11
    Cons
    Slow Scanning
    9
    Limited Features
    5
    Time-Consuming
    5
    Update Delays
    4
    Lack of Automation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 32% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
19
Ease of Use
15
Vulnerability Detection
15
Automated Scanning
13
Features
11
Cons
Slow Scanning
9
Limited Features
5
Time-Consuming
5
Update Delays
4
Lack of Automation
3
Tenable Nessus features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(110)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    15
    Automated Scanning
    11
    Ease of Use
    10
    Scanning Efficiency
    10
    Features
    7
    Cons
    Lack of Information
    7
    Insufficient Information
    5
    Complexity
    4
    Difficult Learning
    4
    Inadequate Reporting
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
15
Automated Scanning
11
Ease of Use
10
Scanning Efficiency
10
Features
7
Cons
Lack of Information
7
Insufficient Information
5
Complexity
4
Difficult Learning
4
Inadequate Reporting
4
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
By AT&T
(113)4.4 out of 5
8th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlienVault USM (from AT&T Cybersecurity) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    899,557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    175,899 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
899,557 Twitter followers
LinkedIn® Page
www.linkedin.com
175,899 employees on LinkedIn®
Ownership
NYSE: T
(162)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Vulnerability Detection
    8
    Security
    7
    Easy Setup
    6
    Reporting
    6
    Cons
    App Instability
    2
    Expensive
    2
    High Licensing Costs
    2
    Inadequate Reporting
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    946 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Vulnerability Detection
8
Security
7
Easy Setup
6
Reporting
6
Cons
App Instability
2
Expensive
2
High Licensing Costs
2
Inadequate Reporting
2
Licensing Issues
2
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.5
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
946 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
(59)4.6 out of 5
Optimized for quick response
10th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Invicti (formerly Netsparker)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invicti (formerly Netsparker) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Vulnerability Detection
    4
    Vulnerability Identification
    4
    Accuracy of Results
    3
    Cons
    API Issues
    1
    Inadequate Testing
    1
    Limited Testing Capabilities
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 25% Mid-Market
Invicti (formerly Netsparker) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Vulnerability Detection
4
Vulnerability Identification
4
Accuracy of Results
3
Cons
API Issues
1
Inadequate Testing
1
Limited Testing Capabilities
1
Scanning Issues
1
Slow Performance
1
Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 39% Small-Business
    • 21% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Amazon Inspector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Software Updates
    1
    Vulnerability Identification
    1
    Cons
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Amazon Inspector features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,230,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

Users
No information available
Industries
  • Computer Software
Market Segment
  • 39% Small-Business
  • 21% Mid-Market
Amazon Inspector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Software Updates
1
Vulnerability Identification
1
Cons
Lack of Information
1
Amazon Inspector features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,230,610 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 9.0
    7.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,298 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 33% Mid-Market
Qualys VM features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 9.0
7.7
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,298 Twitter followers
LinkedIn® Page
www.linkedin.com
2,846 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiuwan Code Security & Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Customer Support
    2
    Flexibility
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Cons
    Inefficiency
    1
    Poor Customer Support
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 9.0
    6.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,448 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 37% Mid-Market
Kiuwan Code Security & Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Customer Support
2
Flexibility
2
Vulnerability Detection
2
Vulnerability Identification
2
Cons
Inefficiency
1
Poor Customer Support
1
Scanning Issues
1
Slow Performance
1
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 9.0
6.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,448 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(98)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Results
    2
    Automated Scanning
    2
    Automation
    2
    Automation Testing
    2
    Ease of Use
    2
    Cons
    Licensing Issues
    3
    Expensive
    2
    Poor Customer Support
    2
    Technical Issues
    2
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 9.0
    7.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 36% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Results
2
Automated Scanning
2
Automation
2
Automation Testing
2
Ease of Use
2
Cons
Licensing Issues
3
Expensive
2
Poor Customer Support
2
Technical Issues
2
Authentication Issues
1
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 9.0
7.7
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veracode Application Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Vulnerability Detection
    3
    Accuracy of Findings
    2
    Detailed Information
    2
    Accuracy
    1
    Cons
    Expensive
    2
    Lack of Information
    2
    Licensing Issues
    2
    Pricing Issues
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Application Security Platform features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,567 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 29% Mid-Market
Veracode Application Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Vulnerability Detection
3
Accuracy of Findings
2
Detailed Information
2
Accuracy
1
Cons
Expensive
2
Lack of Information
2
Licensing Issues
2
Pricing Issues
2
Complexity
1
Veracode Application Security Platform features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,567 Twitter followers
LinkedIn® Page
www.linkedin.com
638 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

    Users
    • DevOps Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 45% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SaltStack features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.3
    Detection Rate
    Average: 8.9
    7.7
    Automated Scans
    Average: 9.0
    9.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SaltStack
    Year Founded
    2011
    HQ Location
    Lehi, UT
    Twitter
    @SaltStack
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

Users
  • DevOps Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 45% Enterprise
  • 32% Mid-Market
SaltStack features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.3
Detection Rate
Average: 8.9
7.7
Automated Scans
Average: 9.0
9.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
SaltStack
Year Founded
2011
HQ Location
Lehi, UT
Twitter
@SaltStack
40 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®

Quick Facts: Vulnerability Scanner Software with Automated Scans Capabilities

Content below is current as of June, 2024
Reviews Summary for Vulnerability Scanner Software with Automated Scans Features

Reviews Summary: Vulnerability Scanner Software with Automated Scans Features

Currently there are 11 Vulnerability Scanner software products with Automated Scans features listed on G2, and together they have generated 808 total reviews. These reviews are generated using the qualitative and quantitative feedback from G2 members who have used these software products.

G2 users review Vulnerability Scanner software products based on criteria relating to user experience, setup, and support. Below you will find how users rated the 11 Vulnerability Scanner software products that have Automated Scans features based on those criteria:

  • Ease of Use: 8.6/10 average user rating
  • Quality of Support: 8.5/10 average user rating
  • Ease of Setup: 8.4/10 average user rating

To help you compare and find the best Vulnerability Scanner software product with the right Automated Scans functionality for your business, we have gathered some additional details and FAQs below.

What Vulnerability Scanner products with Automated Scans features have the most reviews and are the highest-rated?

Based on quantity of reviews and average ratings, these are the most popular Vulnerability Scanner software products with Automated Scans capabilities according to G2 users:

What Vulnerability Scanner software products with Automated Scans capabilities are the most liked according to G2 users?

Based on the G2 ratings scale and regardless of review count, these are the highest-rated Vulnerability Scanner software products with Automated Scans capabilities:

Which software products with Automated Scans features are the highest rated on G2?

These are the Vulnerability Scanner software products offering Automated Scans capabilities and have the highest ratings:

Review Snippets for Vulnerability Scanner Software with Automated Scans Features

Below are questions we ask of all Vulnerability Scanner software users on G2. The answers are specific to the most popular software products that offer Automated Scans capabilities. These user responses provide more insight into the most-reviewed Vulnerability Scanner software and their Automated Scans features listed on G2.
Questions Responses
Here is what users liked best about Vulnerability Scanner software with Automated Scans features.
Tenable Nessus: "Available pre configured and customizable VM, Amazon EC2, etc"
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Intruder: "Intruder is so simple to use, but does such an important job, protecting our customer data against new vulnerabilities that get discovered on a daily basis. I like the reporting it does, and the feeling of "set it and forget it"."
- Tony H., Mid-Market (51-1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "Easy-to-use and beautiful!"
- Lucas S., IT Security Analyst at HomeServices Lending, LLC, Mid-Market (51-1000 emp.)
Here is what users liked least about Vulnerability Scanner software with Automated Scans features.
Tenable Vulnerability Management: "We have had to delay upgrading to Madrid 2 months after GA because Tenable is not compatible. They are holding the entire platform back from upgrading."
- Ben C., Enterprise (> 1000 emp.)
Acunetix by Invicti: "Some flaws like not capturing based on customization"
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Tenable Nessus: "Does not conform to Mac application uninstall standards. You must piecemeal remove Nessus in subdirectories and becomes a hassle to remove safely."
- Grace C., Founder/CEO, Principal Software Engineer at Kintsugi, Small-Business (50 or fewer emp.)
These are what users recommend to others considering popular Vulnerability Scanner software products with Automated Scans capabilities.
Tenable Nessus: "I suggest that you should get in touch with a sales member on their team to help you go in the right direction with their products"
- Jessica L., Managing Director of JD Evolution , Small-Business (50 or fewer emp.)
AlienVault USM (from AT&T Cybersecurity): "Check out the Gartner Magic Quadrant for SIEM and MSSP solutions first."
- Brian W. C., Strategic Business Manager / Chief Security Officer at ETC Computerland - BIT | MIS, Small-Business (50 or fewer emp.)
Acunetix by Invicti: "Be sure to install the ancillary Acunetix features such as AcuSensor and AcuMontior. We discovered them after having used the product for quite a while and our experience has been significantly enhanced."
- David S., Account Manager at WinMill Software, Mid-Market (51-1000 emp.)
These are the problems users said the software was solving and how it is benefitting them.
Tenable Nessus: "Security optimization"
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Intruder: "We hold customer data and frequently have to prove our security for customers, our investors, and Board."
- Tony H., Mid-Market (51-1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "We are utilizing AlienVault USM Anywhere to help us meet our ISO 27001 certification initiative and to help manage our security all in one spot."
- Lucas S., IT Security Analyst at HomeServices Lending, LLC, Mid-Market (51-1000 emp.)
Reviews by Industry

Reviews by Industry: Vulnerability Scanner Marketing Software with Automated Scans Features

Automated Scans features are an important factor when choosing a Vulnerability Scanner software product. How the software and this feature are used differs from industry to industry, making it a challenge to find the best Vulnerability Scanner software with the right features for your company. To help professionals with their Vulnerability Scanner software research, G2 has gathered data sourced from 366 reviews. These reviews come from G2 users working in industries that use Vulnerability Scanner products on a regular basis and who have the most experience with their Automated Scans functionality.

Industry-Related FAQs About Vulnerability Scanner Software with Automated Scans Features

What industries have generated the most reviews of Vulnerability Scanner products with Automated Scans capabilities?

Users from the following industries have written the most Automated Scans feature reviews about Vulnerability Scanner software:

  • Information Technology and Services
  • Computer & Network Security
  • Computer Software
Which Vulnerability Scanner software with Automated Scans features do Information Technology and Services professionals think is best?

Information Technology and Services professionals rate Tenable Nessus (4.5 stars and 275 reviews), Intruder (4.8 stars and 151 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

What do Computer & Network Security professionals think is the best Vulnerability Scanner software with Automated Scans features?

Computer & Network Security professionals rate Tenable Nessus (4.5 stars and 275 reviews), Intruder (4.8 stars and 151 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

What do Computer Software professionals think is the best Vulnerability Scanner software with Automated Scans features?

Computer Software professionals rate Tenable Nessus (4.5 stars and 275 reviews), Intruder (4.8 stars and 151 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

Industry Review Snippets: Vulnerability Scanner Automated Scans Software

There are 366 reviews from users in the Information Technology and Services, Computer & Network Security, and Computer Software industries. Below are snippets of what some of these reviews said about those with the highest G2 score ratings and the most reviews.

Industry What Users From Each Industry Liked What Users From Each Industry Disliked
Information Technology and Services
Tenable Nessus: Available pre configured and customizable VM, Amazon EC2, etc
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Kiuwan Code Security & Insights: * In languages like Angular it doesn't detect vulnerabilities. * Provides little help to the programmer for remediation.
- Félix E., CTO, Mid-Market (51-1000 emp.)
Computer & Network Security
Tenable Nessus: One of the best tool used to it infrastructure scan tool,Which scans all it infrastructure assets and provide the Vulnerability .
- Shahbaz Ahmed B., Enterprise (> 1000 emp.)
Acunetix by Invicti: Lack of response details in reports. An analyst has no possibility to double check the reason for a specific finding without reexecuting the attack.
- Marco G., Security Senior Manager - Managed Security Services delivery lead presso Accenture, Enterprise (> 1000 emp.)

Reviews by Market Segment

Reviews by Market Segment: Vulnerability Scanner Software with Automated Scans Features

G2 Vulnerability Scanner software reviewers come from companies of various sizes. On G2 we break these different market segments into three distinct groups:

These reviews are especially helpful when comparing the Automated Scans features of different Vulnerability Scanner software products because each business market segment has its own unique experiences and requirements when it comes to specific software features. The segments that make up these Vulnerability Scanner Automated Scans software reviews are:

  • 34.2% of reviewers are from small businesses.
  • 36.7% of reviewers are from mid-market companies.
  • 29.1% of reviewers work at enterprise companies.

Below you will find FAQs and actual review snippets for Vulnerability Scanner software products that have Automated Scans features. These reviews are written by real G2 users working in the three market segments above.

Market Segment-Related Vulnerability Scanner Software with Automated Scans Capabilities FAQs

What are the best Vulnerability Scanner software products with Automated Scans features according to users from enterprise businesses?

The Vulnerability Scanner software products enterprise-level professionals rate the highest are Tenable Nessus (4.5 stars), Intruder (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

Which Vulnerability Scanner software products with Automated Scans features are the best according to mid-market business users?

The Vulnerability Scanner software products mid-market business users rate the highest are Tenable Nessus (4.5 stars), Intruder (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

What do users in small businesses say are the top Vulnerability Scanner software products with Automated Scans capabilities?

The Vulnerability Scanner software products users in small businesses rate the highest are Tenable Nessus (4.5 stars), Intruder (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

Market Segment Review Snippets: Vulnerability Scanner Software with Automated Scans Features

Business professionals share important information about Vulnerability Scanner Automated Scans software usability, features, pricing, and more. Read what these users have to say about the top-rated Vulnerability Scanner software with Automated Scans features.

Market Segment What Users From Each Market Segment Liked What Users From Each Market Segment Disliked
Enterprise (> 1000 emp.)
Tenable Nessus: Available pre configured and customizable VM, Amazon EC2, etc
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities,
Acunetix by Invicti: Some flaws like not capturing based on customization
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Mid-Market (51-1000 emp.)
Tenable Nessus: Nessus has a very complete free platform, the paid version is great but you can start with free for vulnerabilities detection
- Victor Alfonso L., Sales Engineer - NOLA en FireEye, Inc.,
SaltStack: The bugs that go unaddressed or get worse with each release. When setting grains it sucks to have to manually restart a minion to get a grain to set.
- Cameron H., Senior Site Reliability Engineer at Fanatics, Inc., Mid-Market (51-1000 emp.)
Small-Business (50 or fewer emp.)
Intruder: We are a small team and we cannot spend time looking into security issues every day. Intruder's proactive scans mean that we get notified as soon as there is a problem, because Intruder is always watching over us.
- Colleen W.,
Tenable Nessus: Does not conform to Mac application uninstall standards. You must piecemeal remove Nessus in subdirectories and becomes a hassle to remove safely.
- Grace C., Founder/CEO, Principal Software Engineer at Kintsugi, Small-Business (50 or fewer emp.)