---
description: Discover and compare Vulnerability Management Software Applications & Tools for Mac. Capterra is a free interactive tool that lets you quickly narrow down your software selection, contact multiple vendors, and compare platforms for your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Vulnerability Management Software for Mac - Price comparison & Reviews - Capterra Ireland 2026
---

Breadcrumb: [Home](/) > [Vulnerability Management Software for Mac](https://www.capterra.ie/directory/31062/vulnerability-management/software) > [Page 2](https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2)

# Vulnerability Management Software

Canonical: https://www.capterra.ie/directory/31062/vulnerability-management/software

Page: 2 / 4\
Prev: [Previous page](https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software)\
Next: [Next page](https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=3)

> Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [Snyk](https://www.capterra.ie/software/172252/snyk) — 4.6/5 (21 reviews) — Snyk's Developer Security Platform puts security expertise in the toolbox of every developer.
2. [Sigrid](https://www.capterra.ie/software/219140/sigrid) — 4.1/5 (16 reviews) — Sigrid delivers continuous, detailed insights into your software's security vulnerabilities, providing timely suggestions to improve.
3. [ESET PROTECT MDR](https://www.capterra.ie/software/1030199/eset-protect) — 4.8/5 (16 reviews) — ESET's MDR offers 24/7 managed detection and response to secure businesses +250 people by addressing vulnerabilities.
4. [6clicks](https://www.capterra.ie/software/209378/6clicks) — 4.8/5 (13 reviews) — Build resilient cyber, risk and compliance programs powered by AI.
5. [Hexiosec ASM](https://www.capterra.ie/software/1037409/hexiosec-asm) — 4.8/5 (13 reviews) — Hexiosec ASM scans the Internet to discover your online infrastructure, assets and shadow IT.
6. [Raynet One](https://www.capterra.ie/software/219744/rayventory) — 4.5/5 (12 reviews) — Raynet One turns IT asset data into actionable insights, enabling faster remediation and stronger protection against vulnerabilities.
7. [VulScan](https://www.capterra.ie/software/1032237/vulscan) — 4.0/5 (9 reviews) — VulScan - vulnerability scanning solution to discover, prioritize and manage internal and external threats for the networks you manage.
8. [Greenbone](https://www.capterra.ie/software/171380/openvas) — 4.1/5 (8 reviews) — Vulnerability management to identify security vulnerabilities in enterprise networks suitable for any application area.
9. [Mend](https://www.capterra.ie/software/146730/whitesource) — 4.4/5 (8 reviews) — Find \&amp; fix security and compliance issues in open source libraries in real-time
10. [Appgate SDP](https://www.capterra.ie/software/219259/appgate) — 5.0/5 (7 reviews) — Appgate SDP is a leading Zero Trust Network Access solution that simplifies and strengthens access controls for the hybrid enterprise.
11. [DriveLock](https://www.capterra.ie/software/219612/drivelock) — 4.6/5 (7 reviews) — DriveLock Vulnerability Management recognizes and control the risks associated with vulnerabilities.
12. [Enginsight](https://www.capterra.ie/software/183883/enginsight) — 5.0/5 (6 reviews) — Recognize vulnerabilities and how a hacker could crack your system.
13. [Jazz Platform](https://www.capterra.ie/software/189135/jazz-platform) — 5.0/5 (6 reviews) — Machine learning \&amp; policy engine provide threat detection \&amp; response. Also used for threat hunting \&amp; automated security training.
14. [Uptycs](https://www.capterra.ie/software/202557/uptycs) — 4.7/5 (6 reviews) — Uptycs unified CNAPP and XDR secures your enterprise from endpoint through cloud, eliminating tool, team, and infrastructure silos.
15. [JFrog Xray](https://www.capterra.ie/software/1018276/jfrog-xray) — 4.3/5 (6 reviews) — Software composition analysis solution that scans your OSS dependencies for security vulnerabilities and license compliance issues.
16. [Machine Learning on AWS](https://www.capterra.ie/software/1029661/machine-learning-on-aws) — 4.7/5 (6 reviews) — Machine learning and artificial intelligence solutions from AWS that help companies analyze data and streamline business processes.
17. [Holm Security VMP](https://www.capterra.ie/software/209427/holm-security-vmp) — 4.4/5 (5 reviews) — We help you identify vulnerabilities in your cyber security defenses, automatically. Cover technical and human assets in one platform.
18. [Sonatype Lifecycle](https://www.capterra.ie/software/171030/nexus-lifecycle) — 4.0/5 (4 reviews) — Get automatic and continuous monitoring that alerts you to open source vulnerabilities so you can find and fix faster.
19. [Quadrant XDR](https://www.capterra.ie/software/1049353/sagan) — 5.0/5 (4 reviews) — Quadrant combines the best security technology and talent in a single XDR solution.
20. [CAST Highlight](https://www.capterra.ie/software/177188/cast-highlight) — 5.0/5 (3 reviews) — CAST Highlight is a SaaS product that provides rapid insights across application portfolios.
21. [Versio.io](https://www.capterra.ie/software/198825/versio-io-cmdb) — 4.5/5 (2 reviews) — SaaS and on-premise enterprise software solution for smarter and easier DevSecOps \&amp; ITSM operations.
22. [Strobes RBVM](https://www.capterra.ie/software/200791/strobes) — 5.0/5 (2 reviews) — Strobes RBVM offers advanced reporting capabilities that empower organizations to gain deeper insights into their security posture.
23. [Debricked](https://www.capterra.ie/software/216435/debricked) — 4.5/5 (2 reviews) — Research based SaaS-service that helps companies of all sizes manage risks when using open source in commercial product development.
24. [Tenable Cloud Security](https://www.capterra.ie/software/220034/ermetic) — 5.0/5 (2 reviews) — Tenable Cloud Security's holistic platform reveals, prioritizes and immediately remediates security gaps in cloud infrastructure
25. [DeepSurface](https://www.capterra.ie/software/1025270/deepsurface) — 4.5/5 (2 reviews) — Automates vulnerability analysis and uses context-based prioritization to reduce cyber risk, time, and money spent.

-----

Page: 2 / 4\
Prev: [Previous page](https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software)\
Next: [Next page](https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=3)

## Related Categories

- [Cloud Security Software](https://www.capterra.ie/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.ie/directory/10005/computer-security/software)
- [IT Asset Management Software](https://www.capterra.ie/directory/30077/it-asset-management/software)
- [Endpoint Protection Software](https://www.capterra.ie/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.ie/directory/30003/network-security/software)

## Links

- [View on Capterra](https://www.capterra.ie/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"Capterra Ireland helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ie","url":"https://www.capterra.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.ie/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":"Capterra Ireland","url":"https://www.capterra.ie/","@id":"https://www.capterra.ie/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Discover and compare Vulnerability Management Software Applications & Tools for Mac. Capterra is a free interactive tool that lets you quickly narrow down your software selection, contact multiple vendors, and compare platforms for your business.","url":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2","about":{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2#breadcrumblist"},"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.ie/#website"},"inLanguage":"en-IE","mainEntity":{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2#itemlist"},"publisher":{"@id":"https://www.capterra.ie/#organization"}},{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software for Mac","position":2,"item":"https://www.capterra.ie/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Vulnerability Management Software for Mac - Price comparison &amp; Reviews - Capterra Ireland 2026","@context":"https://schema.org","@id":"https://www.capterra.ie/directory/31062/vulnerability-management/deployment-options/mac/software?page=2#itemlist","@type":"ItemList","itemListElement":[{"name":"Snyk","position":1,"description":"Snyk is the leader in developer security. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0b834ddb-8c1a-4529-9ac4-28e194ec2eaf.png","url":"https://www.capterra.ie/software/172252/snyk","@type":"ListItem"},{"name":"Sigrid","position":2,"description":"Sigrid is a comprehensive software assurance platform that focuses on vulnerability management through systematic scanning of your software assets. The platform identifies, classifies, and prioritizes vulnerabilities using advanced technologies, providing clear, actionable insights. \n\nThis continuous monitoring and detailed analysis support effective risk mitigation strategies and enhance your organization’s security framework, making it simpler for teams to address potential threats proactively.\n\nSigrid is tailored for IT managers, security specialists, and developers within medium to large organizations that require a robust solution to manage vulnerabilities across extensive software systems. It is particularly useful for those who need a reliable tool to integrate with their existing security protocols to maintain stringent compliance and security standards.\n\nSigrid supports more than 300 different technologies.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7fbb591b-986a-4cbd-812b-c8ee8870d591.png","url":"https://www.capterra.ie/software/219140/sigrid","@type":"ListItem"},{"name":"ESET PROTECT MDR","position":3,"description":"ESET PROTECT MDR provides comprehensive vulnerability management through managed detection and response services, tailored for businesses with 250+ employees. This solution combines continuous threat monitoring, real-time threat intelligence, and expert incident response to identify and mitigate vulnerabilities in your systems. ESET's cybersecurity experts work around the clock to detect, analyze, and address potential weaknesses, ensuring your infrastructure remains secure. With features like rapid incident response, detailed reporting, and proactive threat hunting, ESET PROTECT MDR enhances your organization's ability to manage and reduce vulnerabilities effectively. Trust ESET to deliver the expertise and technology needed to safeguard your digital assets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5a636085-1735-4764-b67d-d13b8edcfa00.png","url":"https://www.capterra.ie/software/1030199/eset-protect","@type":"ListItem"},{"name":"6clicks","position":4,"description":"6clicks is transforming cyber risk and compliance management with its AI-powered platform, offering a unique Hub & Spoke architecture and the first-ever AI engine, Hailey, for cyber GRC. This intelligent approach, including a transparent licensing model with unlimited access to frameworks and functionality, empowers cyber leaders to build resilient and trusted programs. \n\nUse 6clicks for security compliance, IT risk management, vendor management, and incident response, covering the most in-demand frameworks like ISO 27001, NIST CSF, SOC 2, Cyber Essentials and DORA to transform your organization's approach to cyber risk and compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a29effa3-97c2-411e-8c5a-1208e2516901.png","url":"https://www.capterra.ie/software/209378/6clicks","@type":"ListItem"},{"name":"Hexiosec ASM","position":5,"description":"Hexiosec ASM scans the Internet to discover your online infrastructure, assets and shadow IT.\n\nIt checks for misconfigurations, security vulnerabilities, and exposed data to create a prioritised set of risks with built-in remediation advice. \n\nQuickly find & evaluate your own or 3rd parties online attack surface and continuously monitor it for changes. \n\nHexiosec ASM uses non-aggressive, non-intrusive, passive scanning techniques -  enabling you to perform due diligence on any business!","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/75c26ea0-cf22-4867-99ac-212f6e958aba.jpeg","url":"https://www.capterra.ie/software/1037409/hexiosec-asm","@type":"ListItem"},{"name":"Raynet One","position":6,"description":"Vulnerability Management is essential to maintaining a secure IT environment by identifying, assessing, and mitigating risks before they can be exploited. Unsupported software no longer receives security updates, leaving your infrastructure open to user error, unmanaged vulnerabilities, and critical security gaps. Comprehensive IT Visibility is the only way to for various stakeholder to ensure they have a complete overview of their assets, including vulnerability information.\n\nRaynet One delivers this transparency by automatically enriching your asset information with essential market data from our Technology Catalog. The Catalog is enriched daily with vulnerability information from the NIST database, giving you with accurate, reliable, and up to date vulnerability management insights in meaningful dashboards.\n\nThe intelligent scoring function enables you to take immediate action to eliminate vulnerabilities, so you can protect your environment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/45782202-fb7a-4b48-af7b-c44d72f163a4.png","url":"https://www.capterra.ie/software/219744/rayventory","@type":"ListItem"},{"name":"VulScan","position":7,"description":"VulScan an affordable cloud-based vulnerability management platform, ideal for the multi-functional IT Professional. The built-in automation and false-positive management tools reduces the labor enough to perform regularly scheduled basic vulnerability scans with existing staff. It has all the features you need for both internal and external vulnerability management.​","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a6ceb397-1905-4c60-95a9-8189d824b0cf.png","url":"https://www.capterra.ie/software/1032237/vulscan","@type":"ListItem"},{"name":"Greenbone","position":8,"description":"Greenbone solutions are based on open source software. They analyze IT networks for vulnerabilities and provide security reports and remediation advice before attackers can exploit the security holes. Part of the solutions is a daily, automatic security update. Our vulnerability management is available as a physical, virtual and cloud-based solution and is a key security component in over 50,000 professional installations.Greenbone Enterprise Appliances","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/99158263-6b83-4853-900c-a147a8526319.png","url":"https://www.capterra.ie/software/171380/openvas","@type":"ListItem"},{"name":"Mend","position":9,"description":"The leading solution for agile open source security and license compliance management, WhiteSource integrates with the  DevOps pipeline to detect vulnerable open source libraries in real-time. \n\nIt provides remediation paths and policy automation to speed up time-to-fix. It also prioritizes vulnerability alerts based on usage analysis.\nWe support over 200 programming languages and offer the widest vulnerability database aggregating information from dozens of peer-reviewed, respected sources.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8add25a5-2da9-4600-a375-633bf1fb727d.png","url":"https://www.capterra.ie/software/146730/whitesource","@type":"ListItem"},{"name":"Appgate SDP","position":10,"description":"Appgate SDP, the industry’s most comprehensive universal ZTNA solution, is purpose-built on a direct-routed software-defined perimeter model. It can secure all user-to-resource and resource-to-resource connections across every enterprise use case including remote, on-premises, multi-cloud, cloud native, legacy applications and infrastructure, IoT and OT.\n\nAppgate helps organizations and government agencies worldwide start and accelerate their Zero Trust journey while planning for the future.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/1fa2bf14-befc-42fe-969e-d95499f99853.png","url":"https://www.capterra.ie/software/219259/appgate","@type":"ListItem"},{"name":"DriveLock","position":11,"description":"DriveLock Vulnerability Management\nidentifies vulnerabilities on end devices, makes them visible and prevents potential malware attacks. It provides a comprehensive overview of your infrastructure, reveals your attack surface and enables you to manage and measure your cyber risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/92086413-9e57-4df9-91d3-639683a13f85.jpeg","url":"https://www.capterra.ie/software/219612/drivelock","@type":"ListItem"},{"name":"Enginsight","position":12,"description":"24/7 AUTOMATIC VULNERABILITY SCAN\nDetect and close vulnerabilities\nWhat specific vulnerabilities (CVEs) are there in my IT infrastructure? With Enginsight's vulnerability scanner, you can see the affected assets and patch them immediately. The severity rating helps with prioritization. This means you always have an overview of the security status of your IT.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8f4c9feb-2874-42ea-8d73-f275223c7f0c.png","url":"https://www.capterra.ie/software/183883/enginsight","@type":"ListItem"},{"name":"Jazz Platform","position":13,"description":"Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/17843bcd-67c1-4f4c-a83c-ce0c5d84b94c.png","url":"https://www.capterra.ie/software/189135/jazz-platform","@type":"ListItem"},{"name":"Uptycs","position":14,"description":"The Uptycs unified CNAPP and XDR platform helps businesses looking to enhance their cybersecurity across cloud and on-prem environments. One solution provides you with asset inventory, audit, compliance, vulnerability scanning, and threat detection and response. Eliminate tool, team, and infrastructure silos to reduce response times to breaches and attacks. Uptycs helps you make better risk decisions about vulnerabilities and threats. Shift your cybersecurity up with Uptycs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/233d3187-84ec-4451-a902-6d711accffa8.png","url":"https://www.capterra.ie/software/202557/uptycs","@type":"ListItem"},{"name":"JFrog Xray","position":15,"description":"JFrogs Xray DevSecOps tool is a software composition analysis solution that scans your OSS dependencies for security vulnerabilities and license compliance violations. It uses deep recursive scanning techniques to scan repositories, build packages, and container images. Easily integrates across your software development pipeline and automates protection of your code and prevents unwanted security and license compliance risks entering your production software.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6d37a633-6ef6-4581-b3b0-16a522ce1526.png","url":"https://www.capterra.ie/software/1018276/jfrog-xray","@type":"ListItem"},{"name":"Machine Learning on AWS","position":16,"description":"With AWS machine learning (ML), you can make accurate predictions, gain deeper insights from your data, reduce operational overhead, and improve the customer experience. \n\nAWS helps you at every stage of your ML adoption journey with the most comprehensive set of artificial intelligence (AI) and ML services, infrastructure, and implementation resources. \n\nDownload our free eBook to see how other businesses like yours use AWS Machine Learning services.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae5bee60-2857-4188-b257-d2a0e1406f05.jpeg","url":"https://www.capterra.ie/software/1029661/machine-learning-on-aws","@type":"ListItem"},{"name":"Holm Security VMP","position":17,"description":"Holm Security's Next-Gen Vulnerability Management Platform helps our customers to identify and remediate vulnerabilities in their IT environment. The platform provides complete coverage, and comprehensive insight in order to automatically detect vulnerabilities, assess risk and prioritize remediation for every asset in your organization, including humans.\n\nSecure your cyber security posture through complete asset coverage and unified vulnerability management, all in one platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a83f49aa-46d4-42b8-88ee-e5cb317604a6.png","url":"https://www.capterra.ie/software/209427/holm-security-vmp","@type":"ListItem"},{"name":"Sonatype Lifecycle","position":18,"description":"Sonatype's Nexus Platform scales open source security monitoring across the software supply chain and reclaims time spent fighting risks in the software development life cycle.\n\nSoftware developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/235422da-fc87-4523-bcc0-32eaad933197.jpeg","url":"https://www.capterra.ie/software/171030/nexus-lifecycle","@type":"ListItem"},{"name":"Quadrant XDR","position":19,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWe leverage our own proprietary technology (Quadrant XDR), operated by seasoned security analysts around the clock. We differentiate by being best at the “R” in XDR - response is where we excel. Significantly improve mean time to remediate by eliminating internal escalation and hand-off, achieved via Sagan, powered by a flat analyst org in our SOC.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.capterra.ie/software/1049353/sagan","@type":"ListItem"},{"name":"CAST Highlight","position":20,"description":"CAST Highlight is a SaaS product that provides rapid insights across a portfolio of applications. It acts as an application ‘control tower’ by automatically understanding the source code of hundreds of applications in hours and delivering actionable insights on Software Health (resiliency, agility, technical debt), Cloud Readiness, Software Composition Analysis (open source risks), and Green Impact. Built-in surveys capture organizational context for more informed decision-making.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cce5449e-e558-43ea-8401-00dfa2ee4d7b.jpeg","url":"https://www.capterra.ie/software/177188/cast-highlight","@type":"ListItem"},{"name":"Versio.io","position":21,"description":"Versio.io is a SaaS and on-premise enterprise software platform for smarter and easier DevSecOps & ITSM operations.\n\nThe following solutions are provided by Versio.io:\n\n- Asset and Configuration Inventory (CMDB)\n- Change Management\n- Product release and patch management\n- IT vulnerabilities detection\n- IT governance\n- Enterprise architecture analysis & management\n\nVersio.io is used in data centers, (multi-) cloud environments and for SaaS applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/12bb47c7-cafc-4c74-88cc-c29dfff3ccbf.png","url":"https://www.capterra.ie/software/198825/versio-io-cmdb","@type":"ListItem"},{"name":"Strobes RBVM","position":22,"description":"Strobes RBVM simplifies vulnerability management with its all-in-one platform, streamlining the process of identifying, prioritizing, and mitigating vulnerability risks across various attack vectors. Through seamless automation, integration, and comprehensive reporting, organizations can proactively enhance their cybersecurity posture.\n\nStrobes Vulnerability Management software goes beyond the capabilities of a standalone vulnerability scanner.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/07331f99-2c76-4084-9b8c-7f28a3427920.png","url":"https://www.capterra.ie/software/200791/strobes","@type":"ListItem"},{"name":"Debricked","position":23,"description":"Debricked's tool enables for increased use of Open Source while keeping the risks at bay, making it possible to keep a high development speed while still staying secure. The service runs on state of the art machine learning, allowing the data quality to be outstanding as well as instantly updated. \n\nHigh precision (over 90% in supported languages) in combination with flawless UX and scalable automation features makes Debricked one of a kind and the way to go for Open Source Management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0bf8ce7f-605c-41ca-b9eb-f43c1c76eaa1.png","url":"https://www.capterra.ie/software/216435/debricked","@type":"ListItem"},{"name":"Tenable Cloud Security","position":24,"description":"Tenable's holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate immediately. From full asset discovery and deep risk analysis to runtime threat detection and compliance, Tenable automates complex cloud security operations through meaningful visualization and step-by-step guidance. Using an identity-first approach, Tenable dramatically reduces your cloud attack surface and enforces least privilege at scale.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e562991-296b-443d-90fb-c55505ff8d97.jpeg","url":"https://www.capterra.ie/software/220034/ermetic","@type":"ListItem"},{"name":"DeepSurface","position":25,"description":"DeepSurface is a software platform that gives CISOs, security analysts, and IT teams unparalleled visibility and insights in order to reduce the risk of a cyber attack. By automatically collecting key contextual data about a customer’s unique network and system topology, DeepSurface computes and shows which vulnerabilities pose the greatest risk. By utilizing DeepSurface’s proprietary threat model, customers prioritize the long list of vulnerabilities based on actual risk, not a CVSS score.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c3120285-8e70-4508-8718-da24e7ce7329.jpeg","url":"https://www.capterra.ie/software/1025270/deepsurface","@type":"ListItem"}],"numberOfItems":25}
</script>
