Best Vulnerability Management Software for Tenable One

Find and compare the best Vulnerability Management software for Tenable One in 2024

Use the comparison tool below to compare the top Vulnerability Management software for Tenable One on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Nucleus Reviews

    Nucleus

    Nucleus

    $10 per user per year
    1 Rating
    Nucleus is changing the definition of vulnerability management software. It is now the single source of all assets, vulnerabilities and associated data. By unifying people, processes, technology, and vulnerability management, Nucleus unlocks the value that you are not getting from existing tools. Nucleus gives you unrivalled visibility into your program, and a suite that offers functionality that cannot be duplicated in any other manner. Nucleus is the only tool that unifies security and development operations. It unlocks the value that you are not getting from your existing tools and sets you on the path of unifying people, processes, technology, and people involved in addressing vulnerabilities or code weaknesses. Nucleus offers unrivaled pipeline integration, tracking and triage capabilities, as well as a suite of functional tools.
  • 2
    Nessus Reviews
    Top Pick
    More than 30,000 organizations around the world trust Nessus as the most widely used security technology on the planet. It is also the gold standard in vulnerability assessment. Since the beginning, we have worked closely with the security community. Nessus is continuously optimized based on community feedback in order to provide the best vulnerability assessment solution available. Twenty years later, we are still focused on community collaboration and product innovations to provide the most complete and accurate vulnerability data. This will ensure that you don't miss critical issues that could expose your organization's vulnerabilities. Today, Nessus has been trusted by over 30,000 organizations around the world as the best vulnerability assessment tool and security technology.
  • 3
    Skybox Security Reviews
    Skybox's risk-based vulnerability management approach starts with new vulnerability data from your entire network, including physical IT, multicloud and operational technology (OT). Skybox assesses vulnerabilities without the need to scan. Skybox uses a variety of sources including asset and patch management systems as well as network devices. Skybox also collects, centralizes and merges data from multiple scanners to provide you with the most accurate vulnerability assessments. - Centralize and improve vulnerability management processes, from discovery to prioritization to remediation - Harness power vulnerability and asset data, network topology, and security controls - Use network simulation and attack simulation to identify exposed vulnerabilities - Augment vulnerability data by incorporating intelligence on the current threat environment - Learn your best remedy option, including patching and IPS signatures, as well as network-based changes
  • 4
    Cloudaware Reviews

    Cloudaware

    Cloudaware

    $0.008/CI/month
    Cloudaware is a SaaS-based cloud management platform designed for enterprises that deploy workloads across multiple cloud providers and on-premises. Cloudaware offers such modules as CMDB, Change Management, Cost Management, Compliance Engine, Vulnerability Scanning, Intrusion Detection, Patching, Log Management, and Backup. In addition, the platform integrates with ServiceNow, New Relic, JIRA, Chef, Puppet, Ansible, and 50+ other products. Customers deploy Cloudaware to streamline their cloud-agnostic IT management processes, spending, compliance and security.
  • 5
    Snyk Reviews
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 6
    RankedRight Reviews

    RankedRight

    RankedRight

    ÂŁ46 per month
    RankedRight changes the way vulnerability management programs work by putting users' risk appetites first. We give teams the information they need to quickly identify, manage, and take action on the most critical risks to their business. RankedRight gives security teams the power and clarity they need to manage their vulnerability management and make a tangible difference to their security posture.
  • 7
    NorthStar Navigator Reviews

    NorthStar Navigator

    NorthStar.io, Inc.

    $8 per device
    NorthStar allows organizations to easily incorporate threat intelligence and business context to enable a risk-based approach to their vulnerability management program. The Platform automates the collection, normalization, consolidation and correlation of threat intelligence, asset, software, and vulnerability data. Combined with a transparent scoring model, NorthStar automates the tedious and manual process of prioritizing vulnerability remediation.
  • 8
    CyCognito Reviews

    CyCognito

    CyCognito

    $11/asset/month
    Using nation-state-grade technology, uncover all security holes in your organization. CyCognito's Global Bot Network uses an attacker-like reconnaissance technique to scan, discover, and fingerprint billions digital assets around the globe. No configuration or input required. Discover the unknown. The Discovery Engine uses graph data modelling to map your entire attack surface. The Discovery Engine gives you a clear view on every asset an attacker could reach, their relationship to your business, and what they are. The CyCognito risk-detection algorithms allow the attack simulator to identify risks per asset and find potential attack vectors. It does not affect business operations and doesn't require configuration or whitelisting. CyCognito scores each threat based on its attractiveness to attackers, and the impact on the business. This dramatically reduces the number of attack vectors organizations may be exposed to to just a few.
  • 9
    Vulcan Cyber Reviews

    Vulcan Cyber

    Vulcan Cyber

    $999 / month
    Vulcan Cyber is changing the way businesses reduce cyber risks through vulnerability remediation orchestration. We help IT security teams to go beyond remedial vulnerability management and help them drive vulnerability mitigation outcomes. Vulcan combines vulnerability and asset data with threat intelligence and customizable risk parameters, to provide risk-based vulnerability prioritization insight. We don't stop there. Vulcan remediation intelligence identifies the vulnerabilities that are important to your business and attaches the necessary fixes and remedies to mitigate them. Vulcan then orchestrates and measures the rest. This includes inputs into DevSecOps and patch management, configuration management and cloud security tools, teams, and functions. Vulcan Cyber has the unique ability to manage the entire vulnerability remediation process, from scan to fix.
  • 10
    Armis Reviews

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides a unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, IoMT, OT, ICS, and 5G. Armis provides passive cyber asset management, risk management, and automated enforcement. Armis is a privately held company and headquartered in California.
  • 11
    ThreadFix Reviews

    ThreadFix

    Denim Group

    $2000 per month
    ThreadFix 3.0 gives you a complete view of your risk from applications as well as their supporting infrastructure. Forget spreadsheets and PDFs. ThreadFix is a powerful reporting tool for upper management, and it's great for Application Security Managers as well as CISOs. ThreadFix is the industry's best application vulnerability management platform. Discover the amazing benefits of ThreadFix. Using results from open-source and commercial application and network scanning tools, automatically consolidate, deduplicate, and correlate vulnerabilities in applications with infrastructure assets that support them. It is important to know which vulnerabilities exist, but it is only a beginning. ThreadFix will help you quickly identify vulnerabilities and make smart remediation decisions based upon data in a centralized view. It can be difficult to fix vulnerabilities once they are discovered.
  • 12
    SQUAD1 Reviews

    SQUAD1

    Talakunchi Networks

    SQUAD1VM is a Risk-Based Virtuality Management and Orchestration Platform. The Vulnerability data is compiled from various technology solutions, vulnerability scanners and manual penetration testing assessments. Squad1 provides cyber risk quantification for all vulnerability feeds. These vulnerability insights with supporting risk scoring make it easier for security personnel to take quick actions. These insights are based on context information about the mitigation patterns of peer departments and past vulnerabilities identification trends, and supported by guided workflows to improve security posture. Modules: 1. Audit Management 2. On-Demand Scanning 3. Asset Management 4. User/ Vendor Management 5. Report Management 6. Ticketing System The benefits of SQUAD1 1. Automate Risk Identification 2. Prioritization allows for faster mitigation 3. Custom Enterprise Workflow 4. Visibility to Insightful Vulnerability Monitoring
  • 13
    Phoenix Security Reviews

    Phoenix Security

    Phoenix Security

    $3,782.98 per month
    Phoenix Security helps security, developers and businesses speak the same language. We help security professionals focus their efforts on the most critical vulnerabilities across cloud, infrastructure and application security. Laser focuses only on the 10% of security vulnerabilities that are important today and reduces risk quicker with contextualized vulnerabilities. Automatically integrating threat intelligence into the risk increases efficiency and enables fast reaction. Automatically integrating threat intelligence into the risk increases efficiency and enables fast reactions. Aggregate, correlate, and contextualize data from multiple security tools, giving your business unprecedented visibility. Break down the silos that exist between application security, operations security, and business.
  • 14
    Cisco Vulnerability Management Reviews
    You can't fix all the vulnerabilities. Use extensive threat intelligence and patented prioritization techniques to reduce costs, save time and keep your team focused on reducing your biggest risks. This is Modern Risk-Based Vulnerability management. We developed Risk-Based Vulnerability Management and are now defining the modern model. Show your IT and security teams which infrastructure vulnerabilities need to be remedied, and when. Our latest version shows that exploitability is measurable, and accurately calculating exploitability will help you minimize it. Cisco Vulnerability Management, formerly Kenna.VM, combines real-world exploit and threat intelligence with advanced data science in order to determine which vulnerabilities are the most risky and which can be deprioritized. Spoiler alert! Your mega-list will shrink faster than the woolen sweater-vest on a hot wash cycle.
  • 15
    Brinqa Reviews
    Brinqa Cyber risk graph presents a complete and accurate picture about your IT and security ecosystem. All your stakeholders will receive timely notifications, intelligent tickets, and actionable insights. Solutions that adapt to your business will protect every attack surface. A strong, stable, and dynamic cybersecurity foundation will support and enable true digital transformation. Brinqa Risk Platform is available for free. Get instant access to unparalleled risk visibility and a better security posture. The Cyber Risk Graph shows the organization's infrastructure and apps in real-time. It also delineates interconnects between business services and assets. It is also the knowledge source for organizational cybersecurity risk.
  • 16
    Cymulate Reviews
    Continuous Security Validation across the Full Kill Chain. Security teams can use Cymulate's breach- and attack simulation platform to quickly identify security gaps and then remediate them. Cymulate's full kill-chain attack vectors simulations analyze every area of your organization, including email, web apps, and endpoints to ensure that no threats slip by the cracks.
  • 17
    Kondukto Reviews

    Kondukto

    Kondukto

    $12,000 per annually
    Kondukto's flexible platform design allows you create custom workflows to respond to risks quickly and effectively. You can use more than 25 open-source tools to perform SAST, SCA and Container Image scans in minutes, without the need for updates, maintenance or installation. Protect your corporate memory against changes in employees, scanners or DevOps Tools. You can own all security data, statistics and activities. When you need to change AppSec tools, avoid vendor lockout or data loss. Verify fixes automatically for better collaboration and less distracting. Eliminate redundant conversations between AppSec teams and development teams to increase efficiency.
  • 18
    GAT Reviews

    GAT

    GAT InfoSec

    Information security solutions that manage threats to technology, people, and processes. Manage your Security Program to reduce the risk of ransomware, attacks, data leaks, and other third-party risks. Integrated solutions to help you create and maintain an SGSI, Information Security Management System. Prioritization and focus on business context. Automated identification of vulnerabilities in cloud environments to reduce the risk for ransomware, data breaches, and cyber attacks. Mapping the exhibition surface and that of third parties. Risk score and vision of potential leaks, vulnerabilities, and risks in applications, networks, and infrastructure. Reports, dashboards, and collaborative processes that provide data with clarity and facilitate the sharing of information between all parts of the company.
  • 19
    Rezilion Reviews
    Rezilion's Dynamic SOMOM automatically detects, prioritizes and addresses software vulnerabilities. Rezilion's Dynamic SBOM allows you to focus on what is important, eliminate risk quickly, and allow you to build. In a world that is short on time, why compromise security for speed when you could have both? Rezilion is a software security platform that automatically protects software you deliver to customers. This allows teams to focus on building, instead of worrying about security. Rezilion is different than other security tools that require more remediation. Rezilion reduces vulnerability backlogs. It works across your stack and helps you identify vulnerable software in your environment. This allows you to focus on the important things and take action. You can instantly create a list of all the software components in your environment. Runtime analysis will help you determine which software vulnerabilities are exploitable and which are not.
  • 20
    Avalor Reviews
    Avalor’s data fabric allows security teams to make more accurate and faster decisions. Our data fabric architecture integrates disparate sources of data from legacy systems, data lake, data warehouses and sql databases to provide a holistic view on business performance. The data fabric powers the platform and provides automation, 2-way synchronization, alerts, analytics, and alerts. All security functions can benefit from the accurate, fast, and reliable analysis of enterprise data, including asset coverage, ROSI analysis and vulnerability management. The average security team uses many different tools and products. Each has its own purpose, taxonomy and output. It's difficult to prioritize your efforts with so much disparate information. Use data from your entire organization to quickly and accurately answer questions from the business.
  • 21
    Bizzy Reviews
    In order to increase our resilience against cyber-threats, it is essential that we detect potential vulnerabilities, aggregate, enrich, and prioritize them, as well as take rapid action. This capability should be continuous. Bizzy platform enhances cyber security resilience by prioritization, automation and machine learning capabilities. It also enables continuous, rapid and precise actions. We can now increase our resilience to cyber attacks by being informed quickly about vulnerabilities and bringing them all together. It is essential that we are able relate to the information and take swift action. carries. This capability should also include continuity. The Bizzy platform, with its prioritization, automation and Big Data analysis, is a continuous, fast and accurate actionable vulnerability-management feature. It contributes to increasing security resilience.
  • Previous
  • You're on page 1
  • Next