Best Vulnerability Management Software for GitLab

Find and compare the best Vulnerability Management software for GitLab in 2025

Use the comparison tool below to compare the top Vulnerability Management software for GitLab on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Aikido Security Reviews

    Aikido Security

    Aikido Security

    Free
    54 Ratings
    See Software
    Learn More
    Secure your stack with Aikido's code-to-cloud security platform. Find and fix vulnerabilities fast & automatically. Aikido's all-in-one approach combines multiple important scanning capabilities. SAST, DAST, SCA, CSPM, IaC, Container scanning and more - making it a true ASPM platform.
  • 2
    Astra Pentest Reviews

    Astra Pentest

    Astra Security

    $199 per month
    160 Ratings
    See Software
    Learn More
    Astra's Pentest is a comprehensive solution for penetration testing. It includes an intelligent vulnerability scanner and in-depth manual pentesting. The automated scanner performs 10000+ security checks, including security checks for all CVEs listed in the OWASP top 10 and SANS 25. It also conducts all required tests to comply with ISO 27001 and HIPAA. Astra provides an interactive pentest dashboard which allows users to visualize vulnerability analysis, assign vulnerabilities to team members, collaborate with security experts, and to collaborate with security experts. The integrations with CI/CD platforms and Jira are also available if users don't wish to return to the dashboard each time they want to use it or assign a vulnerability for a team member.
  • 3
    Snyk Reviews
    See Software
    Learn More
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 4
    Astra Security Reviews
    Astra Website Protection and Pentesting Suite is a go-to-security platform for securing your websites, web apps, mobile apps, cloud infrastructures (AWS/GCP/Azure), APIs and more. Astra offers Web Application Firewall, Malware Scanner, Vulnerability Management, Penetration Testing, Automated Vulnerability Scanning, with Pentest Compliance, CI/CD integrations and much more. With Astra Website Protection, you don't have to worry about any security incident and customer data breach - so that you can focus more on the business aspect of your company.
  • 5
    Debricked Reviews
    Debricked's tool allows for greater use of Open Source while minimizing the risks. This makes it possible to maintain a high development pace while remaining secure. The service uses state-of-the-art machine learning to ensure that data quality is excellent and can be instantly updated. Debricked is a unique Open Source Management tool that combines high precision (over 90% in supported language) with flawless UX and scalable automation. Debricked has just released Open Source Select, a brand new feature that allows open source projects to be compared, evaluated, and monitored to ensure quality and community health.
  • 6
    Mend.io Reviews

    Mend.io

    Mend.io

    $12,000 per year
    1 Rating
    Mend.io’s enterprise suite of app security tools, trusted by leading companies such as IBM, Google and Capital One, is designed to help build and manage an mature, proactive AppSec programme. Mend.io is aware of the AppSec needs of both developers and security teams. Mend.io, unlike other AppSec tools that force everyone to use a unified tool, helps them work together by giving them different, but complementary tools - enabling each team to stop chasing vulnerability and start proactively management application risk.
  • 7
    Nucleus Reviews

    Nucleus

    Nucleus

    $10 per user per year
    1 Rating
    Nucleus is changing the definition of vulnerability management software. It is now the single source of all assets, vulnerabilities and associated data. By unifying people, processes, technology, and vulnerability management, Nucleus unlocks the value that you are not getting from existing tools. Nucleus gives you unrivalled visibility into your program, and a suite that offers functionality that cannot be duplicated in any other manner. Nucleus is the only tool that unifies security and development operations. It unlocks the value that you are not getting from your existing tools and sets you on the path of unifying people, processes, technology, and people involved in addressing vulnerabilities or code weaknesses. Nucleus offers unrivaled pipeline integration, tracking and triage capabilities, as well as a suite of functional tools.
  • 8
    CloudDefense.AI Reviews
    CloudDefense.AI, an industry-leading multilayered Cloud Native Application Protection Platform, safeguards your cloud infrastructure with cloud-native applications. It does so with unmatched expertise, precision and confidence. Our CNAPP is the industry's leading CNAPP. It delivers unmatched security and ensures your business's confidentiality and data integrity. Our platform provides complete protection from advanced threat detection, real-time monitoring, and rapid incident response. This gives you the confidence to navigate the complex security challenges of today. Our revolutionary CNAPP seamlessly connects with your Kubernetes and cloud landscape to ensure lightning-fast scans of your infrastructure and delivers comprehensive vulnerability report in minutes. No maintenance or extra resources required. We've got you covered for everything from tackling vulnerabilities, to ensuring multicloud compliance, safeguarding workflows, and securing container.
  • 9
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 10
    Crashtest Security Reviews

    Crashtest Security

    Crashtest Security

    €35 per month
    5 Ratings
    Crashtest Security, a SaaS-based security vulnerability scanner, allows agile development teams to ensure continuous security even before reaching Production. Our state-of the-art dynamic application security test (DAST), integrates seamlessly into your development environment and protects multipage and JavaScript applications, as well microservices and APIs. Crashtest Security Suite can be set up in minutes. You will also have advanced crawling options and the ability to automate your security. Crashtest Security can help you keep your code and customers safe by allowing you to see vulnerabilities in the OWASP Top 10.
  • 11
    Visual Expert Reviews

    Visual Expert

    Novalys

    $495 per year
    Visual Expert is a static code analyzer for Oracle PL/SQL, SQL Server T-SQL and PowerBuilder. It identifies code dependencies to let you modify the code without breaking your application. It also scans your code to detect security flaws, quality, performance and maintenability issues. Identify breaking changes with impact analysis. Scan the code to find security vulnerabilities, bugs and maintenance issues. Integrate continuous code inspection in a CI workflow. Understand the inner workings and document your code with call graphs, code diagrams, CRUD matrices, and object dependency matrices (ODMs). Automatically generate source code documentation in HTML format. Navigate your code with hyperlinks. Compare two pieces of code, databases or entire applications. Improve maintainability. Clean up code. Comply with development standards. Analyze and improve database code performance: Find slow objects and SQL queries, optimize a slow object, a call chain, a slow SQL query, display a query execution plan.
  • 12
    Carbide Reviews

    Carbide

    Carbide

    $7,500 annually
    A security and privacy program that doesn’t slow down your growth will help you get compliant, prevent breaches, save money, and be compliant. Although "checkbox" security and privacy may seem appealing, it creates security debt that multiplies with every new regulation and each new security questionnaire. Carbide, however, makes enterprise-class security available to all companies. This means that start-ups receive the support they need to design strong security and privacy programs. Established security teams can save valuable time and benefit from the platform's automation and efficiency. Even if you don't have a large security team, it is possible to adopt a privacy and security posture that goes beyond compliance. Carbide makes enterprise-class privacy and security requirements accessible to all companies and makes them achievable.
  • 13
    Reshift Reviews

    Reshift

    Reshift Security

    $99 per month
    This tool is the ultimate tool to help Node.js programmers secure their custom code. Developers are 4x more likely fix bugs before code is checked-in. Reshift makes it easy to shift security. It detects security bugs and corrects them at compile time. Reshift is a security tool that integrates with your developers without slowing them down. Reshift integrates seamlessly with the developers' IDE, so security issues can be detected in real time and corrected before code is merged. Are you new to security? Reshift makes it simple to add code security to your pipeline for the very first time. This tool is for software companies that are growing and want to increase their security. Are you not a security expert? Reshift is designed for small businesses, so it's easy to set-up without any security expertise. Reshift offers rich content and best practices to help developers improve their code security.
  • 14
    Wallarm WAF Reviews

    Wallarm WAF

    Wallarm

    $50,000 per year
    Wallarm Advanced WAF protects websites and APIs from OWASP Top 10 bots and application abuse. There is no need to configure rules and there are very few false positives. Protect against all types of threats. XSS, XXE and SQL Injections. RCE and other OWASP Top 10 Threats. Brute-force attacks, Dirbusting, and Account Takeover (ATO) are all possible. Application abuse, logic bombs, and bots. 88% of customers use Wallarm Advanced Cloud Native WAF in blocking mode. Automatically created rules that are not signed and tailored for each application. High-quality, reliable, and highly available filtering nodes. You can deploy in any cloud. Modern tech stack support: Docker, Kubernetes, websockets. DevOps toolchain manages and scales it.
  • 15
    Boman.ai Reviews
    Boman.ai is easy to integrate into your CI/CD pipeline. It only requires a few commands and minimal configuration. No planning or expertise required. Boman.ai combines SAST, DAST and SCA scans into one integration. It can support multiple development languages. Boman.ai reduces your application security costs by using open-source scanners. You don't have to purchase expensive application security tools. Boman.ai uses AI/ML to remove false positives, correlate results and help you prioritize and fix. The SaaS platform provides a dashboard that displays all scan results at one time. Correlate results and gain insights to improve application security. Manage vulnerabilities reported by scanner. The platform helps prioritize, triage and remediate vulnerabilities.
  • 16
    Faraday Reviews

    Faraday

    Faraday

    $640 per month
    In today's dynamic environment, security is not about fortifying rigid buildings. It's all about being on guard and securing changes. Evaluate your attack surface continuously using the techniques and methodologies of real attackers. Keep track of your dynamic surface to ensure constant coverage. Using multiple scanners is necessary to ensure full coverage. Let us help you find the most important data in a sea of results. Our Technology allows you define and execute your actions from different sources on your own schedule, and automatically import outputs to your repository. Our platform offers a unique alternative for creating your own automated and cooperative ecosystem. It has +85 plugins, a Faraday-Cli that is easy to use, a RESTful api, and a flexible scheme for developing your own agents.
  • 17
    Revenera SCA Reviews
    Take control of your open-source software management. Your organization can manage open source software (OSS), and third-party components. FlexNet Code Insight assists development, legal, and security teams to reduce open-source security risk and ensure license compliance using an end-to-end solution. FlexNet Code Insight provides a single integrated solution to open source license compliance. Identify vulnerabilities and mitigate them while you are developing your products and throughout their lifecycle. You can manage open source license compliance, automate your processes, and create an OSS strategy that balances risk management and business benefits. Integrate with CI/CD, SCM tools, and build tools. Or create your own integrations with the FlexNet CodeInsight REST API framework. This will make code scanning simple and efficient.
  • 18
    ProjectDiscovery Reviews
    Use automation, integrations and continuous scanning to protect your modern tech stack. Build your regression database using alerts and CI/CD to prevent vulnerabilities from re-appearing. Retest vulnerabilities with ease. Save time and resources to allow your team to ship quicker. Not all assets and vulnerabilities are worth triaging. With context-enriched data, focus on the assets and vulnerabilities that are important to your workflows. Our AI-based template integration reads vulnerability reports to tailor templates to your needs. This saves you time and effort in automating. Automation is made possible with APIs and webhooks. Receive real-time updates about vulnerabilities, assets and templates. Share templates, assets and vulnerabilities with other teams. Our enterprise platform is built on a solid foundation. Learn why we believe that security should be easy, accessible, and community driven.
  • 19
    Kondukto Reviews

    Kondukto

    Kondukto

    $12,000 per annually
    Kondukto's flexible platform design allows you create custom workflows to respond to risks quickly and effectively. You can use more than 25 open-source tools to perform SAST, SCA and Container Image scans in minutes, without the need for updates, maintenance or installation. Protect your corporate memory against changes in employees, scanners or DevOps Tools. You can own all security data, statistics and activities. When you need to change AppSec tools, avoid vendor lockout or data loss. Verify fixes automatically for better collaboration and less distracting. Eliminate redundant conversations between AppSec teams and development teams to increase efficiency.
  • 20
    HackerOne Reviews
    HackerOne empowers the entire world to create a safer internet. HackerOne is the most trusted hacker-powered security platform in the world. It gives organizations access to the largest hackers community on the planet. HackerOne is equipped with the most comprehensive database of vulnerabilities trends and industry benchmarks. This community helps organizations mitigate cyber risk by finding, reporting, and safely reporting real-world security flaws for all industries and attack surfaces. U.S. Department of Defense customers include Dropbox, General Motors and GitHub. HackerOne was fifth on the Fast Company World's Top 100 Most Innovative Companies List for 2020. HackerOne is headquartered in San Francisco and has offices in London, New York City, France, Singapore, France, and more than 70 other locations around the world.
  • 21
    Rezilion Reviews
    Rezilion's Dynamic SOMOM automatically detects, prioritizes and addresses software vulnerabilities. Rezilion's Dynamic SBOM allows you to focus on what is important, eliminate risk quickly, and allow you to build. In a world that is short on time, why compromise security for speed when you could have both? Rezilion is a software security platform that automatically protects software you deliver to customers. This allows teams to focus on building, instead of worrying about security. Rezilion is different than other security tools that require more remediation. Rezilion reduces vulnerability backlogs. It works across your stack and helps you identify vulnerable software in your environment. This allows you to focus on the important things and take action. You can instantly create a list of all the software components in your environment. Runtime analysis will help you determine which software vulnerabilities are exploitable and which are not.
  • 22
    Cybellum Reviews
    Cybellum sets a new standard in product security at scale. It eliminates cyber risk and facilitates compliance from the early stages of development through integration and production and while on the road. The Cybellum Cyber Digital Twins™, platform provides the infrastructure and means to create and maintain secure products on a large scale. Smart vulnerability management, compliance validation and continuous monitoring are key to minimizing risk for your customers and organization. You can quickly identify vulnerabilities and secure your vehicles through the lifetime of their software components by creating a detailed blueprint.
  • 23
    ArmorCode Reviews
    To get a 360o view on your application security posture, centralize all AppSec results (SAST, DAST and SCA) and correlate them with infrastructure and cloud security vulnerabilities. To improve risk mitigation efficiency, normalize, de-dupe and correlate findings and prioritize those that have an impact on the business, One source of truth for all findings and remediations across tools, teams, and applications. AppSecOps is a process for identifying, prioritizing and remediating Security breaches, vulnerabilities, and risks - fully integrated into existing DevSecOps tools, teams, and workflows. The AppSecOps platform allows security teams to increase their ability to identify, remediate, and prevent high-priority compliance, security, and vulnerability issues. It also helps to identify and eliminate coverage gaps.
  • 24
    Maverix Reviews
    Maverix integrates seamlessly into the existing DevOps processes, brings all the required integrations to software engineering and application-security tools, and manages application security testing from beginning to end. AI-based automation of security issues management, including detection, grouping and prioritization of issues, synchronization of fixes, control over fixes, and support for mitigation rules. DevSecOps Data Warehouse: The best-in-class DevSecOps warehouse provides full visibility of application security improvements and team efficiency over time. Security issues can be tracked, prioritized, and triaged from a single interface for the security team. Integrations with third-party products are also available. Get full visibility on application security and production readiness improvements over time.
  • 25
    Opus Security Reviews
    Prioritize based on context analysis, risk, and event deduplication. Automate the entire remediation lifecycle to eliminate manual effort and manage the remediation process. Drive cross-organizational projects with ease. Consolidate your issues using posture management and vulnerability tools. Reduce the number of issues dramatically by identifying root causes and getting clear visibility and detailed reporting. Collaboration with distributed teams is easier when they use their own tools. Deliver a personalized and relevant experience to every engineer. Offer actionable remediation advice and practical code suggestions. Easily adapt your organization structure. A centralized platform that can be used to remediate any attack surface using any tool or stakeholder. Opus integrates easily with existing vulnerability and posture management tools.
  • Previous
  • You're on page 1
  • Next