Best Software for 2025 is now live!
|| products.size

Best Vulnerability Scanner Software with Issue Tracking Capabilities

Benefits of Vulnerability Scanner Software with Issue Tracking capabilities include: Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Below are the top-rated Vulnerability Scanner Software with Issue Tracking capabilities, as verified by G2’s Research team. Real users have identified Issue Tracking as an important function of Vulnerability Scanner Software. Compare different products that offer this feature so you can decide which is best for your business needs.

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

1 filter applied
Clear All
11 Listings in Vulnerability Scanner Available
(110)4.5 out of 5
Optimized for quick response
15th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 53% Enterprise
    • 35% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Tenable Vulnerability Management Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Vulnerability Identification
    15
    Automated Scanning
    11
    Ease of Use
    10
    Scanning Efficiency
    10
    Features
    7
    Cons
    Lack of Information
    7
    Insufficient Information
    5
    Complexity
    4
    Difficult Learning
    4
    Inadequate Reporting
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tenable Vulnerability Management features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    8.8
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tenable
    Company Website
    HQ Location
    Columbia, MD
    Twitter
    @TenableSecurity
    87,017 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,154 employees on LinkedIn®
    Ownership
    NASDAQ: TENB
Product Description
How are these determined?Information
This description is provided by the seller.

Tenable Vulnerability Management is the industry's most comprehensive risk-based vulnerability management (RBVM) platform, enabling you to: • See all assets and vulnerabilities across your entire

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 53% Enterprise
  • 35% Mid-Market
Tenable Vulnerability Management Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Vulnerability Identification
15
Automated Scanning
11
Ease of Use
10
Scanning Efficiency
10
Features
7
Cons
Lack of Information
7
Insufficient Information
5
Complexity
4
Difficult Learning
4
Inadequate Reporting
4
Tenable Vulnerability Management features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
8.8
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Tenable
Company Website
HQ Location
Columbia, MD
Twitter
@TenableSecurity
87,017 Twitter followers
LinkedIn® Page
www.linkedin.com
2,154 employees on LinkedIn®
Ownership
NASDAQ: TENB
By AT&T
(113)4.4 out of 5
8th Easiest To Use in Vulnerability Scanner software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • AlienVault USM (from AT&T Cybersecurity) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Asset Management
    1
    Automation
    1
    Dashboard Usability
    1
    Integration Capabilities
    1
    Integrations
    1
    Cons
    Expensive
    1
    Licensing Cost
    1
    Licensing Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
    8.6
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    AT&T
    Year Founded
    1876
    HQ Location
    Dallas, TX
    Twitter
    @ATT
    899,557 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    175,899 employees on LinkedIn®
    Ownership
    NYSE: T
Product Description
How are these determined?Information
This description is provided by the seller.

AlienVault USM Anywhere is a cloud-based security management solution that accelerates and centralizes threat detection, incident response, and compliance management for your cloud, hybrid cloud, and

Users
No information available
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
AlienVault USM (from AT&T Cybersecurity) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Asset Management
1
Automation
1
Dashboard Usability
1
Integration Capabilities
1
Integrations
1
Cons
Expensive
1
Licensing Cost
1
Licensing Issues
1
AlienVault USM (from AT&T Cybersecurity) features and usability ratings that predict user satisfaction
8.6
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Seller
AT&T
Year Founded
1876
HQ Location
Dallas, TX
Twitter
@ATT
899,557 Twitter followers
LinkedIn® Page
www.linkedin.com
175,899 employees on LinkedIn®
Ownership
NYSE: T

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(162)4.8 out of 5
Optimized for quick response
5th Easiest To Use in Vulnerability Scanner software
Save to My Lists
Entry Level Price:Starting at $99.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

    Users
    • CTO
    • Director
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 59% Small-Business
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Intruder Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Vulnerability Detection
    8
    Security
    7
    Easy Setup
    6
    Reporting
    6
    Cons
    App Instability
    2
    Expensive
    2
    High Licensing Costs
    2
    Inadequate Reporting
    2
    Licensing Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Intruder features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.5
    Detection Rate
    Average: 8.9
    9.5
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Intruder
    Company Website
    Year Founded
    2015
    HQ Location
    London
    Twitter
    @intruder_io
    946 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    68 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Intruder is an attack surface management platform that empowers organizations to discover, detect, and fix weaknesses on any vulnerable assets across their network. It provides actionable remediation

Users
  • CTO
  • Director
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 59% Small-Business
  • 36% Mid-Market
Intruder Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Vulnerability Detection
8
Security
7
Easy Setup
6
Reporting
6
Cons
App Instability
2
Expensive
2
High Licensing Costs
2
Inadequate Reporting
2
Licensing Issues
2
Intruder features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.5
Detection Rate
Average: 8.9
9.5
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Intruder
Company Website
Year Founded
2015
HQ Location
London
Twitter
@intruder_io
946 Twitter followers
LinkedIn® Page
www.linkedin.com
68 employees on LinkedIn®
(59)4.6 out of 5
Optimized for quick response
10th Easiest To Use in Vulnerability Scanner software
View top Consulting Services for Invicti (formerly Netsparker)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

    Users
    No information available
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 49% Enterprise
    • 25% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Invicti (formerly Netsparker) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    4
    Ease of Use
    4
    Vulnerability Detection
    4
    Vulnerability Identification
    4
    Accuracy of Results
    3
    Cons
    API Issues
    1
    Inadequate Testing
    1
    Limited Testing Capabilities
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    9.0
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Invicti is an automated application and API security testing solution that allows enterprise organizations to secure thousands of websites, web apps, and APIs and dramatically reduce the risk of attac

Users
No information available
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 49% Enterprise
  • 25% Mid-Market
Invicti (formerly Netsparker) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
4
Ease of Use
4
Vulnerability Detection
4
Vulnerability Identification
4
Accuracy of Results
3
Cons
API Issues
1
Inadequate Testing
1
Limited Testing Capabilities
1
Scanning Issues
1
Slow Performance
1
Invicti (formerly Netsparker) features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
9.0
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®
(119)4.8 out of 5
View top Consulting Services for Burp Suite
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

    Users
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 41% Mid-Market
    • 31% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Burp Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    4
    Ease of Use
    3
    Integration Capabilities
    3
    Testing Services
    3
    Tool Efficiency
    3
    Cons
    Expensive
    2
    Lack of Information
    2
    Poor Interface Design
    2
    Bugs
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Burp Suite features and usability ratings that predict user satisfaction
    9.7
    Has the product been a good partner in doing business?
    Average: 9.2
    8.7
    Detection Rate
    Average: 8.9
    8.7
    Automated Scans
    Average: 9.0
    8.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2008
    HQ Location
    Knutsford, GB
    Twitter
    @Burp_Suite
    124,600 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    224 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PortSwigger Web Security is a global leader in the creation of software tools for the security testing of web applications. The software (Burp Suite) is well established as the de facto standard tool

Users
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 41% Mid-Market
  • 31% Enterprise
Burp Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
4
Ease of Use
3
Integration Capabilities
3
Testing Services
3
Tool Efficiency
3
Cons
Expensive
2
Lack of Information
2
Poor Interface Design
2
Bugs
1
Learning Curve
1
Burp Suite features and usability ratings that predict user satisfaction
9.7
Has the product been a good partner in doing business?
Average: 9.2
8.7
Detection Rate
Average: 8.9
8.7
Automated Scans
Average: 9.0
8.0
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2008
HQ Location
Knutsford, GB
Twitter
@Burp_Suite
124,600 Twitter followers
LinkedIn® Page
www.linkedin.com
224 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 39% Small-Business
    • 21% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Amazon Inspector Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Software Updates
    1
    Vulnerability Identification
    1
    Cons
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Amazon Inspector features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 9.2
    9.2
    Detection Rate
    Average: 8.9
    10.0
    Automated Scans
    Average: 9.0
    8.3
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2006
    HQ Location
    Seattle, WA
    Twitter
    @awscloud
    2,230,610 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    136,383 employees on LinkedIn®
    Ownership
    NASDAQ: AMZN
Product Description
How are these determined?Information
This description is provided by the seller.

Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities

Users
No information available
Industries
  • Computer Software
Market Segment
  • 39% Small-Business
  • 21% Mid-Market
Amazon Inspector Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Software Updates
1
Vulnerability Identification
1
Cons
Lack of Information
1
Amazon Inspector features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 9.2
9.2
Detection Rate
Average: 8.9
10.0
Automated Scans
Average: 9.0
8.3
Configuration Monitoring
Average: 8.4
Seller Details
Year Founded
2006
HQ Location
Seattle, WA
Twitter
@awscloud
2,230,610 Twitter followers
LinkedIn® Page
www.linkedin.com
136,383 employees on LinkedIn®
Ownership
NASDAQ: AMZN
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 48% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qualys VM features and usability ratings that predict user satisfaction
    8.5
    Has the product been a good partner in doing business?
    Average: 9.2
    9.0
    Detection Rate
    Average: 8.9
    8.3
    Automated Scans
    Average: 9.0
    7.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qualys
    Year Founded
    1999
    HQ Location
    Foster City, CA
    Twitter
    @qualys
    34,298 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,846 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 10,300 customers in more than 130 countries, including a majority of each of th

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 48% Enterprise
  • 33% Mid-Market
Qualys VM features and usability ratings that predict user satisfaction
8.5
Has the product been a good partner in doing business?
Average: 9.2
9.0
Detection Rate
Average: 8.9
8.3
Automated Scans
Average: 9.0
7.7
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Qualys
Year Founded
1999
HQ Location
Foster City, CA
Twitter
@qualys
34,298 Twitter followers
LinkedIn® Page
www.linkedin.com
2,846 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 37% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiuwan Code Security & Insights Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Customer Support
    2
    Flexibility
    2
    Vulnerability Detection
    2
    Vulnerability Identification
    2
    Cons
    Inefficiency
    1
    Poor Customer Support
    1
    Scanning Issues
    1
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.5
    Automated Scans
    Average: 9.0
    6.5
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiuwan
    Year Founded
    2012
    HQ Location
    Houston, TX
    Twitter
    @Kiuwan
    3,448 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. Our toolset includes Static Application Security Testing (SAST), Software Composi

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 37% Mid-Market
Kiuwan Code Security & Insights Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Customer Support
2
Flexibility
2
Vulnerability Detection
2
Vulnerability Identification
2
Cons
Inefficiency
1
Poor Customer Support
1
Scanning Issues
1
Slow Performance
1
Kiuwan Code Security & Insights features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.5
Automated Scans
Average: 9.0
6.5
Configuration Monitoring
Average: 8.4
Seller Details
Seller
Kiuwan
Year Founded
2012
HQ Location
Houston, TX
Twitter
@Kiuwan
3,448 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(98)4.1 out of 5
Optimized for quick response
View top Consulting Services for Acunetix by Invicti
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 40% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acunetix by Invicti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accuracy of Results
    2
    Automated Scanning
    2
    Automation
    2
    Automation Testing
    2
    Ease of Use
    2
    Cons
    Licensing Issues
    3
    Expensive
    2
    Poor Customer Support
    2
    Technical Issues
    2
    Authentication Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acunetix by Invicti features and usability ratings that predict user satisfaction
    8.2
    Has the product been a good partner in doing business?
    Average: 9.2
    8.5
    Detection Rate
    Average: 8.9
    8.6
    Automated Scans
    Average: 9.0
    7.7
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    2018
    HQ Location
    Austin, Texas
    Twitter
    @InvictiSecurity
    2,568 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    312 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 40% Enterprise
  • 36% Mid-Market
Acunetix by Invicti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accuracy of Results
2
Automated Scanning
2
Automation
2
Automation Testing
2
Ease of Use
2
Cons
Licensing Issues
3
Expensive
2
Poor Customer Support
2
Technical Issues
2
Authentication Issues
1
Acunetix by Invicti features and usability ratings that predict user satisfaction
8.2
Has the product been a good partner in doing business?
Average: 9.2
8.5
Detection Rate
Average: 8.9
8.6
Automated Scans
Average: 9.0
7.7
Configuration Monitoring
Average: 8.4
Seller Details
Company Website
Year Founded
2018
HQ Location
Austin, Texas
Twitter
@InvictiSecurity
2,568 Twitter followers
LinkedIn® Page
www.linkedin.com
312 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 75% Enterprise
    • 29% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veracode Application Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Vulnerability Detection
    3
    Accuracy of Findings
    2
    Detailed Information
    2
    Accuracy
    1
    Cons
    Expensive
    2
    Lack of Information
    2
    Licensing Issues
    2
    Pricing Issues
    2
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veracode Application Security Platform features and usability ratings that predict user satisfaction
    7.9
    Has the product been a good partner in doing business?
    Average: 9.2
    8.3
    Detection Rate
    Average: 8.9
    9.2
    Automated Scans
    Average: 9.0
    9.4
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VERACODE
    Year Founded
    2006
    HQ Location
    Burlington, MA
    Twitter
    @Veracode
    22,567 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    638 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Veracode helps companies that innovate through software deliver secure code on time. Unlike on-premise solutions that are hard to scale and focused on finding rather than fixing, Veracode comprises a

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 75% Enterprise
  • 29% Mid-Market
Veracode Application Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Vulnerability Detection
3
Accuracy of Findings
2
Detailed Information
2
Accuracy
1
Cons
Expensive
2
Lack of Information
2
Licensing Issues
2
Pricing Issues
2
Complexity
1
Veracode Application Security Platform features and usability ratings that predict user satisfaction
7.9
Has the product been a good partner in doing business?
Average: 9.2
8.3
Detection Rate
Average: 8.9
9.2
Automated Scans
Average: 9.0
9.4
Configuration Monitoring
Average: 8.4
Seller Details
Seller
VERACODE
Year Founded
2006
HQ Location
Burlington, MA
Twitter
@Veracode
22,567 Twitter followers
LinkedIn® Page
www.linkedin.com
638 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

    Users
    • DevOps Engineer
    Industries
    • Financial Services
    • Information Technology and Services
    Market Segment
    • 45% Enterprise
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SaltStack features and usability ratings that predict user satisfaction
    8.8
    Has the product been a good partner in doing business?
    Average: 9.2
    7.3
    Detection Rate
    Average: 8.9
    7.7
    Automated Scans
    Average: 9.0
    9.0
    Configuration Monitoring
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SaltStack
    Year Founded
    2011
    HQ Location
    Lehi, UT
    Twitter
    @SaltStack
    40 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SaltStack event-driven automation software helps IT organizations manage and secure cloud infrastructure at massive scale while automating efficient orchestration of enterprise DevOps workflows.

Users
  • DevOps Engineer
Industries
  • Financial Services
  • Information Technology and Services
Market Segment
  • 45% Enterprise
  • 32% Mid-Market
SaltStack features and usability ratings that predict user satisfaction
8.8
Has the product been a good partner in doing business?
Average: 9.2
7.3
Detection Rate
Average: 8.9
7.7
Automated Scans
Average: 9.0
9.0
Configuration Monitoring
Average: 8.4
Seller Details
Seller
SaltStack
Year Founded
2011
HQ Location
Lehi, UT
Twitter
@SaltStack
40 Twitter followers
LinkedIn® Page
www.linkedin.com
7 employees on LinkedIn®

Quick Facts: Vulnerability Scanner Software with Issue Tracking Capabilities

Content below is current as of June, 2024
Reviews Summary for Vulnerability Scanner Software with Issue Tracking Features

Reviews Summary: Vulnerability Scanner Software with Issue Tracking Features

Currently there are 11 Vulnerability Scanner software products with Issue Tracking features listed on G2, and together they have generated 647 total reviews. These reviews are generated using the qualitative and quantitative feedback from G2 members who have used these software products.

G2 users review Vulnerability Scanner software products based on criteria relating to user experience, setup, and support. Below you will find how users rated the 11 Vulnerability Scanner software products that have Issue Tracking features based on those criteria:

  • Ease of Use: 8.6/10 average user rating
  • Quality of Support: 8.5/10 average user rating
  • Ease of Setup: 8.5/10 average user rating

To help you compare and find the best Vulnerability Scanner software product with the right Issue Tracking functionality for your business, we have gathered some additional details and FAQs below.

What Vulnerability Scanner software products with Issue Tracking capabilities are the most liked according to G2 users?

Based on the G2 ratings scale and regardless of review count, these are the highest-rated Vulnerability Scanner software products with Issue Tracking capabilities:

Which software products with Issue Tracking features are the highest rated on G2?

These are the Vulnerability Scanner software products offering Issue Tracking capabilities and have the highest ratings:

Review Snippets for Vulnerability Scanner Software with Issue Tracking Features

Below are questions we ask of all Vulnerability Scanner software users on G2. The answers are specific to the most popular software products that offer Issue Tracking capabilities. These user responses provide more insight into the most-reviewed Vulnerability Scanner software and their Issue Tracking features listed on G2.
Questions Responses
Here is what users liked best about Vulnerability Scanner software with Issue Tracking features.
Intruder: "Intruder is so simple to use, but does such an important job, protecting our customer data against new vulnerabilities that get discovered on a daily basis. I like the reporting it does, and the feeling of "set it and forget it"."
- Tony H., Mid-Market (51-1000 emp.)
Burp Suite: "Burp Suite Professional is a great tool that finds many of the vulnerabilities in a web application. It can be used to scan and replay attacks and also generates good reports."
- Glenn J., A Software Developer Who Really Knows Security. Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "Easy-to-use and beautiful!"
- Lucas S., IT Security Analyst at HomeServices Lending, LLC, Mid-Market (51-1000 emp.)
Here is what users liked least about Vulnerability Scanner software with Issue Tracking features.
Tenable Vulnerability Management: "We have had to delay upgrading to Madrid 2 months after GA because Tenable is not compatible. They are holding the entire platform back from upgrading."
- Ben C., Enterprise (> 1000 emp.)
Acunetix by Invicti: "Some flaws like not capturing based on customization"
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Veracode Application Security Platform: "Unfortunately, Veracode hasn't actually found the formula for success yet. The interface is clunky and disjointed, the documentation is confusing, and customer support takes literally weeks or months to respond to requests."
- Alex G., Designer, Musician, & Product Manager, Small-Business (50 or fewer emp.)
These are what users recommend to others considering popular Vulnerability Scanner software products with Issue Tracking capabilities.
Burp Suite: "Give it a try with the Free version and if you like it get a license. the cost is not very high."
- Glenn J., A Software Developer Who Really Knows Security. Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "Check out the Gartner Magic Quadrant for SIEM and MSSP solutions first."
- Brian W. C., Strategic Business Manager / Chief Security Officer at ETC Computerland - BIT | MIS, Small-Business (50 or fewer emp.)
Acunetix by Invicti: "Be sure to install the ancillary Acunetix features such as AcuSensor and AcuMontior. We discovered them after having used the product for quite a while and our experience has been significantly enhanced."
- David S., Account Manager at WinMill Software, Mid-Market (51-1000 emp.)
These are the problems users said the software was solving and how it is benefitting them.
Intruder: "We hold customer data and frequently have to prove our security for customers, our investors, and Board."
- Tony H., Mid-Market (51-1000 emp.)
Burp Suite: "I use Burp Suite Professional to perform vulnerability scans on all of our corporate websites before they are released to the production servers. This is part of our Security Review Process ."
- Glenn J., A Software Developer Who Really Knows Security. Application Security Specialist, Enterprise (> 1000 emp.)
AlienVault USM (from AT&T Cybersecurity): "We are utilizing AlienVault USM Anywhere to help us meet our ISO 27001 certification initiative and to help manage our security all in one spot."
- Lucas S., IT Security Analyst at HomeServices Lending, LLC, Mid-Market (51-1000 emp.)
Reviews by Industry

Reviews by Industry: Vulnerability Scanner Marketing Software with Issue Tracking Features

Issue Tracking features are an important factor when choosing a Vulnerability Scanner software product. How the software and this feature are used differs from industry to industry, making it a challenge to find the best Vulnerability Scanner software with the right features for your company. To help professionals with their Vulnerability Scanner software research, G2 has gathered data sourced from 324 reviews. These reviews come from G2 users working in industries that use Vulnerability Scanner products on a regular basis and who have the most experience with their Issue Tracking functionality.

Industry-Related FAQs About Vulnerability Scanner Software with Issue Tracking Features

What industries have generated the most reviews of Vulnerability Scanner products with Issue Tracking capabilities?

Users from the following industries have written the most Issue Tracking feature reviews about Vulnerability Scanner software:

  • Information Technology and Services
  • Computer Software
  • Computer & Network Security
Which Vulnerability Scanner software with Issue Tracking features do Information Technology and Services professionals think is best?

Information Technology and Services professionals rate Intruder (4.8 stars and 151 reviews), Burp Suite (4.8 stars and 114 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

What do Computer Software professionals think is the best Vulnerability Scanner software with Issue Tracking features?

Computer Software professionals rate Intruder (4.8 stars and 151 reviews), Burp Suite (4.8 stars and 114 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

What do Computer & Network Security professionals think is the best Vulnerability Scanner software with Issue Tracking features?

Computer & Network Security professionals rate Intruder (4.8 stars and 151 reviews), Burp Suite (4.8 stars and 114 reviews), and Tenable Vulnerability Management (4.5 stars and 87 reviews) the highest.

Industry Review Snippets: Vulnerability Scanner Issue Tracking Software

There are 324 reviews from users in the Information Technology and Services, Computer Software, and Computer & Network Security industries. Below are snippets of what some of these reviews said about those with the highest G2 score ratings and the most reviews.

Industry What Users From Each Industry Liked What Users From Each Industry Disliked
Information Technology and Services
Burp Suite: We can use burp Suite for scanning the server. Easy use.
- Ahetesham A., Small-Business (50 or fewer emp.)
Tenable Vulnerability Management: The reporting capability is really poor and the new interface they released is incredibly lacking functionality that makes you continue going back to the classic interface.
- Ben C., Mid-Market (51-1000 emp.)
Computer & Network Security
Burp Suite: I love this tool, as a penetration tester, this is the most used testing tool in my arsenal of hacking tools. I have been using it ever since I have been working in the field of Application Security.
- Dewank P., Head Graduate Teaching Assistant- Web Security | Software Engineer (Voice Based Assistants) at Johns Hopkins University, Mid-Market (51-1000 emp.)
Acunetix by Invicti: Lack of response details in reports. An analyst has no possibility to double check the reason for a specific finding without reexecuting the attack.
- Marco G., Security Senior Manager - Managed Security Services delivery lead presso Accenture, Enterprise (> 1000 emp.)

Reviews by Market Segment

Reviews by Market Segment: Vulnerability Scanner Software with Issue Tracking Features

G2 Vulnerability Scanner software reviewers come from companies of various sizes. On G2 we break these different market segments into three distinct groups:

These reviews are especially helpful when comparing the Issue Tracking features of different Vulnerability Scanner software products because each business market segment has its own unique experiences and requirements when it comes to specific software features. The segments that make up these Vulnerability Scanner Issue Tracking software reviews are:

  • 34.1% of reviewers are from small businesses.
  • 36.9% of reviewers are from mid-market companies.
  • 29.1% of reviewers work at enterprise companies.

Below you will find FAQs and actual review snippets for Vulnerability Scanner software products that have Issue Tracking features. These reviews are written by real G2 users working in the three market segments above.

Market Segment-Related Vulnerability Scanner Software with Issue Tracking Capabilities FAQs

What are the best Vulnerability Scanner software products with Issue Tracking features according to users from enterprise businesses?

The Vulnerability Scanner software products enterprise-level professionals rate the highest are Intruder (4.8 stars), Burp Suite (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

Which Vulnerability Scanner software products with Issue Tracking features are the best according to mid-market business users?

The Vulnerability Scanner software products mid-market business users rate the highest are Intruder (4.8 stars), Burp Suite (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

What do users in small businesses say are the top Vulnerability Scanner software products with Issue Tracking capabilities?

The Vulnerability Scanner software products users in small businesses rate the highest are Intruder (4.8 stars), Burp Suite (4.8 stars), and Tenable Vulnerability Management (4.5 stars).

Market Segment Review Snippets: Vulnerability Scanner Software with Issue Tracking Features

Business professionals share important information about Vulnerability Scanner Issue Tracking software usability, features, pricing, and more. Read what these users have to say about the top-rated Vulnerability Scanner software with Issue Tracking features.

Market Segment What Users From Each Market Segment Liked What Users From Each Market Segment Disliked
Enterprise (> 1000 emp.)
Tenable Vulnerability Management: This works well on a big picture and granular level. Look at vulnerabilities by severity, by type, by name, by device, etc. This lets you do targeted pushes to minimize threat surface.
- Erik W.,
Acunetix by Invicti: Some flaws like not capturing based on customization
- Parthik P., at NRUCFC, Enterprise (> 1000 emp.)
Mid-Market (51-1000 emp.)
Intruder: Intruder is so simple to use, but does such an important job, protecting our customer data against new vulnerabilities that get discovered on a daily basis. I like the reporting it does, and the feeling of "set it and forget it".
- Tony H.,
SaltStack: The bugs that go unaddressed or get worse with each release. When setting grains it sucks to have to manually restart a minion to get a grain to set.
- Cameron H., Senior Site Reliability Engineer at Fanatics, Inc., Mid-Market (51-1000 emp.)
Small-Business (50 or fewer emp.)
Intruder: We are a small team and we cannot spend time looking into security issues every day. Intruder's proactive scans mean that we get notified as soon as there is a problem, because Intruder is always watching over us.
- Colleen W.,
Veracode Application Security Platform: Unfortunately, Veracode hasn't actually found the formula for success yet. The interface is clunky and disjointed, the documentation is confusing, and customer support takes literally weeks or months to respond to requests.
- Alex G., Designer, Musician, & Product Manager, Small-Business (50 or fewer emp.)