Best Software for 2025 is now live!
|| products.size

Best Vulnerability Scanner Software with Configuration Monitoring Capabilities

Benefits of Vulnerability Scanner Software with Configuration Monitoring capabilities include: Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Below are the top-rated Vulnerability Scanner Software with Configuration Monitoring capabilities, as verified by G2’s Research team. Real users have identified Configuration Monitoring as an important function of Vulnerability Scanner Software. Compare different products that offer this feature so you can decide which is best for your business needs.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
12 Listings in Vulnerability Scanner Available
(284)4.5 out of 5
Optimized for quick response
9th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Tenable Nessus
Save to My Lists
Entry Level Price:$3,390.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

    Users
    • Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 39% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Nessus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    19
    Ease of Use
    15
    Vulnerability Detection
    15
    Automated Scanning
    13
    Features
    11
    Cons
    Slow Scanning
    9
    Limited Features
    5
    Time-Consuming
    5
    Update Delays
    4
    Lack of Automation
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Nessus features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    8.8
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Built for security practitioners, by security professionals, Nessus products by Tenable are the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to

Users
  • Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 39% Mid-Market
  • 32% Enterprise
Tenable Nessus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
19
Ease of Use
15
Vulnerability Detection
15
Automated Scanning
13
Features
11
Cons
Slow Scanning
9
Limited Features
5
Time-Consuming
5
Update Delays
4
Lack of Automation
3
Tenable Nessus features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
8.8
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
(110)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    15
    Automated Scanning
    11
    Ease of Use
    10
    Scanning Efficiency
    10
    Features
    7
    Cons
    Lack of Information
    7
    Insufficient Information
    5
    Complexity
    4
    Difficult Learning
    4
    Inadequate Reporting
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
15
Automated Scanning
11
Ease of Use
10
Scanning Efficiency
10
Features
7
Cons
Lack of Information
7
Insufficient Information
5
Complexity
4
Difficult Learning
4
Inadequate Reporting
4
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
By AT&T
(113)4.4 out of 5
8th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlienVault USM (from AT&T Cybersecurity) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    899,557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    175,899 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
899,557 Twitter followers
LinkedIn® Page
www.linkedin.com
175,899 employees on LinkedIn®
Ownership
NYSE: T
(59)4.6 out of 5
Optimized for quick response
10th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Invicti (formerly Netsparker)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invicti (formerly Netsparker) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Vulnerability Detection
    4
    Vulnerability Identification
    4
    Accuracy of Results
    3
    Cons
    API Issues
    1
    Inadequate Testing
    1
    Limited Testing Capabilities
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 25% Mid-Market
Invicti (formerly Netsparker) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Vulnerability Detection
4
Vulnerability Identification
4
Accuracy of Results
3
Cons
API Issues
1
Inadequate Testing
1
Limited Testing Capabilities
1
Scanning Issues
1
Slow Performance
1
Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®
(119)4.8 out of 5
View top Consulting Services for Burp Suite
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

    Users
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Burp Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    4
    Ease of Use
    3
    Integration Capabilities
    3
    Testing Services
    3
    Tool Efficiency
    3
    Cons
    Expensive
    2
    Lack of Information
    2
    Poor Interface Design
    2
    Bugs
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Burp Suite features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Knutsford, GB
    Twitter
    @Burp_Suite
    124,600 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

Users
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 31% Enterprise
Burp Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
4
Ease of Use
3
Integration Capabilities
3
Testing Services
3
Tool Efficiency
3
Cons
Expensive
2
Lack of Information
2
Poor Interface Design
2
Bugs
1
Learning Curve
1
Burp Suite features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2008
HQ Location
Knutsford, GB
Twitter
@Burp_Suite
124,600 Twitter followers
LinkedIn® Page
www.linkedin.com
224 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 39% Small-Business
    • 21% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Amazon Inspector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Software Updates
    1
    Vulnerability Identification
    1
    Cons
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Amazon Inspector features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,230,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

Users
No information available
Industries
  • Computer Software
Market Segment
  • 39% Small-Business
  • 21% Mid-Market
Amazon Inspector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Software Updates
1
Vulnerability Identification
1
Cons
Lack of Information
1
Amazon Inspector features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,230,610 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 9.0
    7.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,298 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 33% Mid-Market
Qualys VM features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 9.0
7.7
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,298 Twitter followers
LinkedIn® Page
www.linkedin.com
2,846 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiuwan Code Security & Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Customer Support
    2
    Flexibility
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Cons
    Inefficiency
    1
    Poor Customer Support
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 9.0
    6.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,448 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 37% Mid-Market
Kiuwan Code Security & Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Customer Support
2
Flexibility
2
Vulnerability Detection
2
Vulnerability Identification
2
Cons
Inefficiency
1
Poor Customer Support
1
Scanning Issues
1
Slow Performance
1
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 9.0
6.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,448 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 76% Small-Business
    • 22% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CYRISMA Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    13
    Vulnerability Identification
    11
    Customer Support
    10
    Security
    10
    Cons
    Poor Interface Design
    7
    Software Bugs
    7
    Bugs
    6
    Poor Interface
    5
    Poor UI Design
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CYRISMA features and usability ratings that predict user satisfaction
    9.1
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    CYRISMA
    Company Website
    Year Founded
    2018
    HQ Location
    Rochester, NY
    Twitter
    @CYRISMA_USA
    39 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    17 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

CYRISMA is an all-in-one, cloud-hosted cyber risk management platform created with the vision of reducing cybersecurity complexity and making high-quality security technology accessible to all busines

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 76% Small-Business
  • 22% Mid-Market
CYRISMA Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
13
Vulnerability Identification
11
Customer Support
10
Security
10
Cons
Poor Interface Design
7
Software Bugs
7
Bugs
6
Poor Interface
5
Poor UI Design
4
CYRISMA features and usability ratings that predict user satisfaction
9.1
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
CYRISMA
Company Website
Year Founded
2018
HQ Location
Rochester, NY
Twitter
@CYRISMA_USA
39 Twitter followers
LinkedIn® Page
www.linkedin.com
17 employees on LinkedIn®
(98)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Results
    2
    Automated Scanning
    2
    Automation
    2
    Automation Testing
    2
    Ease of Use
    2
    Cons
    Licensing Issues
    3
    Expensive
    2
    Poor Customer Support
    2
    Technical Issues
    2
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 9.0
    7.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 36% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Results
2
Automated Scanning
2
Automation
2
Automation Testing
2
Ease of Use
2
Cons
Licensing Issues
3
Expensive
2
Poor Customer Support
2
Technical Issues
2
Authentication Issues
1
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 9.0
7.7
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veracode Application Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Vulnerability Detection
    3
    Accuracy of Findings
    2
    Detailed Information
    2
    Accuracy
    1
    Cons
    Expensive
    2
    Lack of Information
    2
    Licensing Issues
    2
    Pricing Issues
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Application Security Platform features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,567 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 29% Mid-Market
Veracode Application Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Vulnerability Detection
3
Accuracy of Findings
2
Detailed Information
2
Accuracy
1
Cons
Expensive
2
Lack of Information
2
Licensing Issues
2
Pricing Issues
2
Complexity
1
Veracode Application Security Platform features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,567 Twitter followers
LinkedIn® Page
www.linkedin.com
638 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

    Users
    • DevOps Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 45% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SaltStack features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.3
    Detection Rate
    Average: 8.9
    7.7
    Automated Scans
    Average: 9.0
    9.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SaltStack
    Year Founded
    2011
    HQ Location
    Lehi, UT
    Twitter
    @SaltStack
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

Users
  • DevOps Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 45% Enterprise
  • 32% Mid-Market
SaltStack features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.3
Detection Rate
Average: 8.9
7.7
Automated Scans
Average: 9.0
9.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
SaltStack
Year Founded
2011
HQ Location
Lehi, UT
Twitter
@SaltStack
40 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®

Quick Facts: Vulnerability Scanner Software with Configuration Monitoring Capabilities

Content below is current as of June, 2024
Reviews Summary for Vulnerability Scanner Software with Configuration Monitoring Features

Reviews Summary: Vulnerability Scanner Software with Configuration Monitoring Features

Currently there are 12 Vulnerability Scanner software products with Configuration Monitoring features listed on G2, and together they have generated 807 total reviews. These reviews are generated using the qualitative and quantitative feedback from G2 members who have used these software products.

G2 users review Vulnerability Scanner software products based on criteria relating to user experience, setup, and support. Below you will find how users rated the 12 Vulnerability Scanner software products that have Configuration Monitoring features based on those criteria:

  • Ease of Use: 8.5/10 average user rating
  • Quality of Support: 8.4/10 average user rating
  • Ease of Setup: 8.4/10 average user rating

To help you compare and find the best Vulnerability Scanner software product with the right Configuration Monitoring functionality for your business, we have gathered some additional details and FAQs below.

What Vulnerability Scanner products with Configuration Monitoring features have the most reviews and are the highest-rated?

Based on quantity of reviews and average ratings, these are the most popular Vulnerability Scanner software products with Configuration Monitoring capabilities according to G2 users:

What Vulnerability Scanner software products with Configuration Monitoring capabilities are the most liked according to G2 users?

Based on the G2 ratings scale and regardless of review count, these are the highest-rated Vulnerability Scanner software products with Configuration Monitoring capabilities:

Which software products with Configuration Monitoring features are the highest rated on G2?

These are the Vulnerability Scanner software products offering Configuration Monitoring capabilities and have the highest ratings:

Review Snippets for Vulnerability Scanner Software with Configuration Monitoring Features

Below are questions we ask of all Vulnerability Scanner software users on G2. The answers are specific to the most popular software products that offer Configuration Monitoring capabilities. These user responses provide more insight into the most-reviewed Vulnerability Scanner software and their Configuration Monitoring features listed on G2.
Questions Responses
Here is what users liked best about Vulnerability Scanner software with Configuration Monitoring features.
Tenable Nessus: "Available pre configured and customizable VM, Amazon EC2, etc"
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Burp Suite: "Burp Suite Professional is a great tool that finds many of the vulnerabilities in a web application. It can be used to scan and replay attacks and also generates good reports."
- Glenn J., A Software Developer Who Really Knows Security. Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "Easy-to-use and beautiful!"
- Lucas S., IT Security Analyst at HomeServices Lending, LLC, Mid-Market (51-1000 emp.)
Here is what users liked least about Vulnerability Scanner software with Configuration Monitoring features.
Tenable Vulnerability Management: "We have had to delay upgrading to Madrid 2 months after GA because Tenable is not compatible. They are holding the entire platform back from upgrading."
- Ben C., Enterprise (> 1000 emp.)
Acunetix by Invicti: "Some flaws like not capturing based on customization"
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Tenable Nessus: "Does not conform to Mac application uninstall standards. You must piecemeal remove Nessus in subdirectories and becomes a hassle to remove safely."
- Grace C., Founder/CEO, Principal Software Engineer at Kintsugi, Small-Business (50 or fewer emp.)
These are what users recommend to others considering popular Vulnerability Scanner software products with Configuration Monitoring capabilities.
Tenable Nessus: "I suggest that you should get in touch with a sales member on their team to help you go in the right direction with their products"
- Jessica L., Managing Director of JD Evolution , Small-Business (50 or fewer emp.)
Burp Suite: "Give it a try with the Free version and if you like it get a license. the cost is not very high."
- Glenn J., A Software Developer Who Really Knows Security. Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "Check out the Gartner Magic Quadrant for SIEM and MSSP solutions first."
- Brian W. C., Strategic Business Manager / Chief Security Officer at ETC Computerland - BIT | MIS, Small-Business (50 or fewer emp.)
These are the problems users said the software was solving and how it is benefitting them.
Tenable Nessus: "Security optimization"
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Burp Suite: "I use Burp Suite Professional to perform vulnerability scans on all of our corporate websites before they are released to the production servers. This is part of our Security Review Process ."
- Glenn J., A Software Developer Who Really Knows Security. Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "We are utilizing AlienVault USM Anywhere to help us meet our ISO 27001 certification initiative and to help manage our security all in one spot."
- Lucas S., IT Security Analyst at HomeServices Lending, LLC, Mid-Market (51-1000 emp.)
Reviews by Industry

Reviews by Industry: Vulnerability Scanner Marketing Software with Configuration Monitoring Features

Configuration Monitoring features are an important factor when choosing a Vulnerability Scanner software product. How the software and this feature are used differs from industry to industry, making it a challenge to find the best Vulnerability Scanner software with the right features for your company. To help professionals with their Vulnerability Scanner software research, G2 has gathered data sourced from 396 reviews. These reviews come from G2 users working in industries that use Vulnerability Scanner products on a regular basis and who have the most experience with their Configuration Monitoring functionality.

Industry-Related FAQs About Vulnerability Scanner Software with Configuration Monitoring Features

What industries have generated the most reviews of Vulnerability Scanner products with Configuration Monitoring capabilities?

Users from the following industries have written the most Configuration Monitoring feature reviews about Vulnerability Scanner software:

  • Information Technology and Services
  • Computer & Network Security
  • Computer Software
Which Vulnerability Scanner software with Configuration Monitoring features do Information Technology and Services professionals think is best?

Information Technology and Services professionals rate Tenable Nessus (4.5 stars and 275 reviews), Burp Suite (4.8 stars and 114 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

What do Computer & Network Security professionals think is the best Vulnerability Scanner software with Configuration Monitoring features?

Computer & Network Security professionals rate Tenable Nessus (4.5 stars and 275 reviews), Burp Suite (4.8 stars and 114 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

What do Computer Software professionals think is the best Vulnerability Scanner software with Configuration Monitoring features?

Computer Software professionals rate Tenable Nessus (4.5 stars and 275 reviews), Burp Suite (4.8 stars and 114 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

Industry Review Snippets: Vulnerability Scanner Configuration Monitoring Software

There are 396 reviews from users in the Information Technology and Services, Computer & Network Security, and Computer Software industries. Below are snippets of what some of these reviews said about those with the highest G2 score ratings and the most reviews.

Industry What Users From Each Industry Liked What Users From Each Industry Disliked
Information Technology and Services
Tenable Nessus: Available pre configured and customizable VM, Amazon EC2, etc
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities, Enterprise (> 1000 emp.)
Tenable Vulnerability Management: The reporting capability is really poor and the new interface they released is incredibly lacking functionality that makes you continue going back to the classic interface.
- Ben C., Mid-Market (51-1000 emp.)
Computer & Network Security
Tenable Nessus: One of the best tool used to it infrastructure scan tool,Which scans all it infrastructure assets and provide the Vulnerability .
- Shahbaz Ahmed B., Enterprise (> 1000 emp.)
Acunetix by Invicti: Lack of response details in reports. An analyst has no possibility to double check the reason for a specific finding without reexecuting the attack.
- Marco G., Security Senior Manager - Managed Security Services delivery lead presso Accenture, Enterprise (> 1000 emp.)

Reviews by Market Segment

Reviews by Market Segment: Vulnerability Scanner Software with Configuration Monitoring Features

G2 Vulnerability Scanner software reviewers come from companies of various sizes. On G2 we break these different market segments into three distinct groups:

These reviews are especially helpful when comparing the Configuration Monitoring features of different Vulnerability Scanner software products because each business market segment has its own unique experiences and requirements when it comes to specific software features. The segments that make up these Vulnerability Scanner Configuration Monitoring software reviews are:

  • 30.6% of reviewers are from small businesses.
  • 36.7% of reviewers are from mid-market companies.
  • 32.7% of reviewers work at enterprise companies.

Below you will find FAQs and actual review snippets for Vulnerability Scanner software products that have Configuration Monitoring features. These reviews are written by real G2 users working in the three market segments above.

Market Segment-Related Vulnerability Scanner Software with Configuration Monitoring Capabilities FAQs

What are the best Vulnerability Scanner software products with Configuration Monitoring features according to users from enterprise businesses?

The Vulnerability Scanner software products enterprise-level professionals rate the highest are Tenable Nessus (4.5 stars), Burp Suite (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

Which Vulnerability Scanner software products with Configuration Monitoring features are the best according to mid-market business users?

The Vulnerability Scanner software products mid-market business users rate the highest are Tenable Nessus (4.5 stars), Burp Suite (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

What do users in small businesses say are the top Vulnerability Scanner software products with Configuration Monitoring capabilities?

The Vulnerability Scanner software products users in small businesses rate the highest are Tenable Nessus (4.5 stars), Burp Suite (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

Market Segment Review Snippets: Vulnerability Scanner Software with Configuration Monitoring Features

Business professionals share important information about Vulnerability Scanner Configuration Monitoring software usability, features, pricing, and more. Read what these users have to say about the top-rated Vulnerability Scanner software with Configuration Monitoring features.

Market Segment What Users From Each Market Segment Liked What Users From Each Market Segment Disliked
Enterprise (> 1000 emp.)
Tenable Nessus: Available pre configured and customizable VM, Amazon EC2, etc
- Harshad P., Aspiring Data Analyst | Looking for Full-Time Opportunities,
Acunetix by Invicti: Some flaws like not capturing based on customization
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Mid-Market (51-1000 emp.)
Tenable Nessus: Nessus has a very complete free platform, the paid version is great but you can start with free for vulnerabilities detection
- Victor Alfonso L., Sales Engineer - NOLA en FireEye, Inc.,
SaltStack: The bugs that go unaddressed or get worse with each release. When setting grains it sucks to have to manually restart a minion to get a grain to set.
- Cameron H., Senior Site Reliability Engineer at Fanatics, Inc., Mid-Market (51-1000 emp.)
Small-Business (50 or fewer emp.)
Tenable Nessus: How it identified the vulnerabilities in my system allowing me to create more secure protocols
- Jessica L., Managing Director of JD Evolution ,
Tenable Nessus: Does not conform to Mac application uninstall standards. You must piecemeal remove Nessus in subdirectories and becomes a hassle to remove safely.
- Grace C., Founder/CEO, Principal Software Engineer at Kintsugi, Small-Business (50 or fewer emp.)