Best IT Security Software for Acunetix

Find and compare the best IT Security software for Acunetix in 2025

Use the comparison tool below to compare the top IT Security software for Acunetix on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Nucleus Reviews

    Nucleus

    Nucleus

    $10 per user per year
    1 Rating
    Nucleus is changing the definition of vulnerability management software. It is now the single source of all assets, vulnerabilities and associated data. By unifying people, processes, technology, and vulnerability management, Nucleus unlocks the value that you are not getting from existing tools. Nucleus gives you unrivalled visibility into your program, and a suite that offers functionality that cannot be duplicated in any other manner. Nucleus is the only tool that unifies security and development operations. It unlocks the value that you are not getting from your existing tools and sets you on the path of unifying people, processes, technology, and people involved in addressing vulnerabilities or code weaknesses. Nucleus offers unrivaled pipeline integration, tracking and triage capabilities, as well as a suite of functional tools.
  • 2
    Axonius Reviews
    Axonius gives IT and security teams the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between them, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks.
  • 3
    Centraleyezer Reviews

    Centraleyezer

    Sandline

    $599 per month
    Integrates and correlates vulnerability scanner data and multiple exploit feeds with business and IT factors to prioritize cyber security risk. Red Teams, CISOs, and Vulnerability Assessment Teams can reduce time-to fix, prioritize, and report risks. This tool is used by Governments, Military and E-Commerce businesses.
  • 4
    ThreadFix Reviews

    ThreadFix

    Denim Group

    $2000 per month
    ThreadFix 3.0 gives you a complete view of your risk from applications as well as their supporting infrastructure. Forget spreadsheets and PDFs. ThreadFix is a powerful reporting tool for upper management, and it's great for Application Security Managers as well as CISOs. ThreadFix is the industry's best application vulnerability management platform. Discover the amazing benefits of ThreadFix. Using results from open-source and commercial application and network scanning tools, automatically consolidate, deduplicate, and correlate vulnerabilities in applications with infrastructure assets that support them. It is important to know which vulnerabilities exist, but it is only a beginning. ThreadFix will help you quickly identify vulnerabilities and make smart remediation decisions based upon data in a centralized view. It can be difficult to fix vulnerabilities once they are discovered.
  • 5
    Scuba Database Vulnerability Scanner Reviews
    Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client. A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.
  • 6
    SecurityHQ Reviews
    SecurityHQ is a Global Managed Security Service Provider (MSSP) that detects & responds to threats 24/7. Gain access to an army of analysts, 24/7, 365 days a year. Receive tailored advice and full visibility to ensure peace of mind, with our Global Security Operation Centres. Utilize our award-winning security solutions, knowledge, people, and process capabilities, to accelerate business and reduce risk and overall security costs.
  • 7
    Phoenix Security Reviews

    Phoenix Security

    Phoenix Security

    $3,782.98 per month
    Phoenix Security helps security, developers and businesses speak the same language. We help security professionals focus their efforts on the most critical vulnerabilities across cloud, infrastructure and application security. Laser focuses only on the 10% of security vulnerabilities that are important today and reduces risk quicker with contextualized vulnerabilities. Automatically integrating threat intelligence into the risk increases efficiency and enables fast reaction. Automatically integrating threat intelligence into the risk increases efficiency and enables fast reactions. Aggregate, correlate, and contextualize data from multiple security tools, giving your business unprecedented visibility. Break down the silos that exist between application security, operations security, and business.
  • 8
    Imperva WAF Reviews
    Web application attacks can prevent sensitive data being stolen and prevent transactions from being made. Imperva Web Application Firewall analyzes traffic to your application to stop these attacks and ensure uninterrupted operations. You must choose whether to block legitimate traffic or manually limit attacks that your WAF allows through. Imperva Research Labs guarantee accuracy for WAF customers when the threat landscape changes. Your security teams can use third-party code with no risk and speedy rule propagation to create policies. Imperva WAF is an integral part of a comprehensive Web Application Protection (WAAP), stack that protects from edge to databank. This ensures that you only receive the traffic you need. We offer the best website protection in industry - PCI compliant, automated security that integrates analysis to go beyond OWASP Top 10 coverage and reduces third-party code.
  • 9
    Imperva DDoS Protection Reviews
    Imperva DDoS Protection protects your assets at the edge to ensure uninterrupted operation. You can ensure business continuity with 100% uptime. DDoS mitigation is based on the following rule: "moments to go down and hours to recover". Every second counts when you defend against an attack. Imperva provides you with the assurance that attack traffic will automatically be blocked at the edge. This is without you having to increase your bandwidth. Imperva DDoS protection for websites is an all-in-one service that instantly mitigates any size or type of DDoS attack on web applications. Our DDoS protection for websites is complemented by the Imperva cloud-based web application firewall (WAF), which stops hacking attempts and attacks from malicious bots. Your DNS records can be modified to ensure that all HTTP/S traffic to your domain(s), is routed through the Imperva network. Imperva DDoS protection protects websites by acting as a secure proxy. It masks your origin server IP.
  • 10
    CyberArk Workforce Identity Reviews
    CyberArk Workforce Identity (formerly Idaptive) empowers your workforce by providing easy and secure access to business resources. Your users need quick access a variety business resources. You need to be able to trust that they are knocking, not an attacker. CyberArk Workforce Identity allows you to empower your workforce and keep threats out. Your team can set the stage for success and open up new opportunities. Strong AI-powered, password-free, risk-aware authentication can validate identities. Streamline the management of app access requests, account creation, and termination. Workers should be working, not logging out and in. AI-powered analytics can help you make intelligent access decisions. Access is possible from any device, at any time.
  • 11
    Enso Reviews

    Enso

    Enso Security

    Through Application Security Posture Management (ASPM), Enso's platform easily deploys into an organization’s environment to create an actionable, unified inventory of all application assets, their owners, security posture and associated risk. With Enso Security, AppSec teams gain the capacity to manage the tools, people and processes involved in application security, enabling them to build an agile AppSec without interfering with development. Enso is used daily AppSec teams small and large across the globe. Get in touch for more information!
  • 12
    ThreatAdvisor Reviews
    ThreatAdvisor is our single platform solution for continuous security monitoring, management and analysis. You can gain complete visibility into your network with centralized asset and vulnerability management. This allows you to be ready to respond to any abnormality. ThreatAdvisor is available as part of our managed detection and response programs, MDR Core & MDR Max. As part of our managed service partnership, you will now have network visibility through an easy-to use, central tool. ThreatAdvisor is based on the expertise of security consultants and penetration testers who have more than 50 years experience in information security. It gives you the information you need to protect your organization. ThreatAdvisor offers actionable information 24 hours a day to everyone involved in maintaining your organization's systems. Create and maintain an asset management program.
  • 13
    Hexway Pentest Suite Reviews
    Hexway Hive & Apiary allows you to efficiently collaborate with your team and generate detailed reports that can be used for action. It also helps you build better relationships with customers.
  • 14
    Kondukto Reviews

    Kondukto

    Kondukto

    $12,000 per annually
    Kondukto's flexible platform design allows you create custom workflows to respond to risks quickly and effectively. You can use more than 25 open-source tools to perform SAST, SCA and Container Image scans in minutes, without the need for updates, maintenance or installation. Protect your corporate memory against changes in employees, scanners or DevOps Tools. You can own all security data, statistics and activities. When you need to change AppSec tools, avoid vendor lockout or data loss. Verify fixes automatically for better collaboration and less distracting. Eliminate redundant conversations between AppSec teams and development teams to increase efficiency.
  • 15
    ArmorCode Reviews
    To get a 360o view on your application security posture, centralize all AppSec results (SAST, DAST and SCA) and correlate them with infrastructure and cloud security vulnerabilities. To improve risk mitigation efficiency, normalize, de-dupe and correlate findings and prioritize those that have an impact on the business, One source of truth for all findings and remediations across tools, teams, and applications. AppSecOps is a process for identifying, prioritizing and remediating Security breaches, vulnerabilities, and risks - fully integrated into existing DevSecOps tools, teams, and workflows. The AppSecOps platform allows security teams to increase their ability to identify, remediate, and prevent high-priority compliance, security, and vulnerability issues. It also helps to identify and eliminate coverage gaps.
  • 16
    Bizzy Reviews
    In order to increase our resilience against cyber-threats, it is essential that we detect potential vulnerabilities, aggregate, enrich, and prioritize them, as well as take rapid action. This capability should be continuous. Bizzy platform enhances cyber security resilience by prioritization, automation and machine learning capabilities. It also enables continuous, rapid and precise actions. We can now increase our resilience to cyber attacks by being informed quickly about vulnerabilities and bringing them all together. It is essential that we are able relate to the information and take swift action. carries. This capability should also include continuity. The Bizzy platform, with its prioritization, automation and Big Data analysis, is a continuous, fast and accurate actionable vulnerability-management feature. It contributes to increasing security resilience.
  • Previous
  • You're on page 1
  • Next