Best Application Security Software for Cisco Vulnerability Management

Find and compare the best Application Security software for Cisco Vulnerability Management in 2025

Use the comparison tool below to compare the top Application Security software for Cisco Vulnerability Management on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 2
    Tenable One Reviews
    Tenable One unifies security visibility and insight across the attack surface. This allows modern organizations to isolate and eliminate priority cyber exposures, from IT infrastructure, cloud environments, critical infrastructure, and everywhere else. The only AI-powered exposure platform in the world. Tenable's leading vulnerability management sensors allow you to see every asset on your entire attack surface, from cloud environments to operational technology, infrastructure to containers and remote workers to web-apps. Tenable's machine learning-powered predictions, which include more than 20 trillion aspects related to threat, vulnerability and misconfiguration information, reduce remediation effort by allowing you to focus on the most important risks. By communicating objective measures of risks, you can drive improvements to reduce the likelihood of a business impacting cyber event occurring.
  • 3
    Seeker Reviews
    Seeker® is an interactive application security testing (IAST) solution that delivers deep visibility into the security posture of web applications. It identifies and analyzes vulnerabilities against industry standards such as OWASP Top 10, PCI DSS, GDPR, CAPEC, and CWE/SANS Top 25, ensuring compliance and robust protection. Seeker tracks sensitive data usage, verifying it is handled securely and not stored improperly in logs or databases without encryption. Seamlessly integrating into DevOps CI/CD workflows, it enables continuous security testing without disrupting development processes. Unlike traditional IAST solutions, Seeker not only identifies vulnerabilities but also verifies their exploitability, providing developers with a prioritized list of actionable issues. By leveraging patented methods, it processes large volumes of HTTP(S) requests with precision, reducing false positives to near zero. Additionally, Seeker enhances team collaboration with detailed reporting and remediation guidance, ensuring security is addressed effectively across the software development lifecycle.
  • 4
    Contrast Assess Reviews
    This new type of security is specifically designed to protect software. Integrate security into your toolchain to resolve security issues within minutes of installation. Developers can now find and fix vulnerabilities by using Contrast agents, which monitor code and report directly to security experts. Security teams can now focus on governance, instead of worrying about code monitoring. Contrast Assess deploys a smart agent that instruments the application using smart sensors. The code can be analyzed from within the application in real-time. Instrumentation reduces false positives that can slow down security teams and developers. Integrating security into your toolchain will help you resolve security issues quickly. Contrast Assess seamlessly integrates into the software lifecycle and into the tool sets that developers and operations teams already use, including native integration to ChatOps, ticketing system and CI/CD tools and a RESTful API.
  • 5
    Veracode Reviews
    Veracode provides a holistic and scalable solution to manage security risk across all your applications. Only one solution can provide visibility into the status of all types of testing, including manual penetration testing, SAST, DAST and SCA.
  • Previous
  • You're on page 1
  • Next