Best Vulnerability Scanners for VMware Cloud

Find and compare the best Vulnerability Scanners for VMware Cloud in 2026

Use the comparison tool below to compare the top Vulnerability Scanners for VMware Cloud on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Nexpose Reviews
    Vulnerability management tools are essential for responding effectively at the moment a threat arises. With new vulnerabilities emerging daily, it's crucial to have ongoing intelligence that enables you to identify, locate, and prioritize these risks for your organization while ensuring that your exposure is minimized. Nexpose, the on-premises solution from Rapid7, provides real-time monitoring of vulnerabilities and continuously updates its data to adapt to the latest threats, allowing for immediate action when necessary. For those seeking enhanced features like Remediation Workflow or the universal Insight Agent, InsightVM offers a robust platform for vulnerability management. How current is your information? Is it outdated by days or even weeks? With Nexpose, you can rest assured that you're working with data that is never more than a few seconds old, delivering a dynamic view of your ever-evolving network landscape. This immediacy not only enhances your response capabilities but also strengthens your overall security posture.
  • 2
    Scuba Database Vulnerability Scanner Reviews
    Introducing Scuba, a complimentary vulnerability scanner designed to reveal concealed security threats within enterprise databases. This tool allows users to conduct scans to identify vulnerabilities and misconfigurations, providing insight into potential risks to their databases. Furthermore, it offers actionable recommendations to address any issues detected. Scuba is compatible with various operating systems, including Windows, Mac, and both x32 and x64 versions of Linux, and boasts an extensive library of over 2,300 assessment tests tailored for prominent database systems such as Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2, and MySQL. With Scuba, users can efficiently identify and evaluate security vulnerabilities and configuration deficiencies, including patch levels. Running a Scuba scan is straightforward and can be initiated from any compatible client, with an average scan duration of just 2-3 minutes, depending on the complexity of the database, the number of users and groups, as well as the network connection. Best of all, no prior installation or additional dependencies are necessary to get started.
  • 3
    Eclypsium Reviews
    Eclypsium®, which protects enterprise devices at the hardware and fundamental firmware layers, ensures their health and integrity. This is something that traditional security cannot protect. Eclypsium adds a layer of security to protect the vital servers, networking gear, laptops, and computers at the heart of every company. Eclypsium provides security for the hardware and firmware, as opposed to traditional security that protects only the software layers of a device. Eclypsium detects and corrects low-level vulnerabilities and threats to traditional security, from the device's initial boot process to its most fundamental code. High-fidelity views of all enterprise devices, including servers, networking gear and laptops, are available. Automatically identify vulnerabilities and threats in every hardware and firmware component of each device. You can access devices on-premises and remotely, including remote work and BYOD.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB