---
description: Page 2 - See the top Vulnerability Management Software solutions in Ireland. Capterra offers software reviews, prices, and features helping you find the best software for your business needs.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 2 - Vulnerability Management Software - Prices & Reviews - Capterra Ireland
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](https://www.capterra.ie/directory/31062/vulnerability-management/software) > [Page 2](https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2)

# Vulnerability Management Software

Canonical: https://www.capterra.ie/directory/31062/vulnerability-management/software

Page: 2 / 10\
Prev: [Previous page](https://www.capterra.ie/directory/31062/vulnerability-management/software)\
Next: [Next page](https://www.capterra.ie/directory/31062/vulnerability-management/software?page=3)

> Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [Zscaler](https://www.capterra.ie/software/175516/zscaler-internet-access) — 4.3/5 (48 reviews) — Zscaler simplifies vulnerability management with real-time traffic inspection, threat intelligence, and proactive risk mitigation.
2. [CanIPhish](https://www.capterra.ie/software/1019867/caniphish) — 4.8/5 (46 reviews) — CanIPhish provides the world's first self-service phishing simulation platform. Sign-up for free and access our platform in minutes.
3. [AWS Config](https://www.capterra.ie/software/205398/aws-config) — 4.6/5 (45 reviews) — Config Tool from AWS is a cloud-based that helps businesses assess, audit, and evaluate multi-account AWS environments.
4. [CyLock EVA](https://www.capterra.ie/software/1030934/cylock-anti-hacker) — 4.9/5 (42 reviews) — The first Click\&amp;Play Cyber Security platform. CyLock finds out if your systems are hacker safe in one click\!
5. [Risk Hawk](https://www.capterra.ie/software/1035322/risk-hawc) — 4.7/5 (42 reviews) — Cloud-based (SaaS) integrated risk management tool that helps handle controls, incidents, internal audits, compliance, and more.
6. [runZero](https://www.capterra.ie/software/201787/runzero) — 4.9/5 (37 reviews) — runZero is an exposure management platform providing unrivaled visibility across your entire internal and external attack surface.
7. [Kiuwan](https://www.capterra.ie/software/160729/kiuwan-code-security) — 4.4/5 (35 reviews) — Kiuwan | Code Scanning That’s Built for Developers and Trusted by Security Teams
8. [Acunetix](https://www.capterra.ie/software/171379/acunetix) — 4.4/5 (35 reviews) — Acunetix is web app and API security software that automates testing, finds vulnerabilities, and integrates into development.
9. [Runecast](https://www.capterra.ie/software/175477/runecast-analyzer) — 4.9/5 (34 reviews) — Proactive Best Practice \&amp; Security Analysis for AWS, Azure, GCP, Kubernetes, VMware, Windows and Linux OS.
10. [ManageEngine Vulnerability Manager Plus](https://www.capterra.ie/software/185510/manageengine-vulnerability-manager-plus) — 4.6/5 (34 reviews) — A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching.
11. [Qualys Cloud Platform](https://www.capterra.ie/software/82971/qualysguard-enterprise) — 4.0/5 (33 reviews) — Qualys VMDR – All-in-One Vulnerability Management, Detection, and Response.
12. [Dark Web ID](https://www.capterra.ie/software/188259/dark-web-id) — 3.7/5 (30 reviews) — Dark Web ID monitors the dark web and instantly alerts you when compromised business or personal credentials are found.
13. [Saner CVEM](https://www.capterra.ie/software/152523/secpod) — 4.5/5 (29 reviews) — Accurately scan vulns in 5 mins. Assess, Prioritize and Immediately Patch them with the SanerNow Vulnerability Management Software.
14. [CyberArk Privileged Access Management Solutions](https://www.capterra.ie/software/119742/privileged-account-security-solution) — 4.3/5 (27 reviews) — Software to control access to administrative and privileged accounts, manage information leaks and overall risk by automating policies.
15. [Invicti](https://www.capterra.ie/software/171539/netsparker-web-application-security-scanner) — 4.7/5 (26 reviews) — Invicti, formerly Netsparker, is a DAST-first AppSec platform proving real risks, cutting noise, and securing everything at scale.
16. [AppTrana](https://www.capterra.ie/software/195294/apptrana) — 4.6/5 (24 reviews) — AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
17. [Netsurion](https://www.capterra.ie/software/80473/netsurion) — 3.6/5 (23 reviews) — Complete managed security service and platform to predict, prevent, detect, and respond to threats across your entire business.
18. [KACE](https://www.capterra.ie/software/177311/kace) — 4.0/5 (23 reviews) — KACE Unified Endpoint Manager unites traditional endpoint management with modern management in a shared intuitive interface.
19. [vRx](https://www.capterra.ie/software/201047/topia) — 4.9/5 (22 reviews) — Unified Vulnerability Management. Remotely \&amp; automatically mitigate cyber threats in your environment - with or without security patch.
20. [Red Sentry](https://www.capterra.ie/software/1019242/red-sentry) — 4.8/5 (22 reviews) — Vulnerability management support that helps teams validate exploitability and prioritize remediation based on real risk.
21. [Snyk](https://www.capterra.ie/software/172252/snyk) — 4.6/5 (21 reviews) — Snyk's Developer Security Platform puts security expertise in the toolbox of every developer.
22. [Hackrate](https://www.capterra.ie/software/1020647/hackrate) — 5.0/5 (21 reviews) — Hackrate is a bug bounty platform that helps companies reduce cybersecurity risks by using the power of the global hacker community.
23. [RoboShadow](https://www.capterra.ie/software/1031450/robo-shadow-cyber-platform) — 5.0/5 (21 reviews) — RoboShadow gives any organisations the ability to do an Internal \&amp; External Vulnerability Assessment completely for free.
24. [DataDome](https://www.capterra.ie/software/149769/datadome-bot-mitigation) — 4.5/5 (18 reviews) — DataDome stops cyberfraud and bots in real time, protecting websites, apps, ads, and APIs globally.
25. [InsightVM](https://www.capterra.ie/software/169723/insightvm) — 4.3/5 (18 reviews) — Vulnerability management tool that helps businesses asses risks through data collection, prioritization, remediation reporting \&amp; more.

-----

Page: 2 / 10\
Prev: [Previous page](https://www.capterra.ie/directory/31062/vulnerability-management/software)\
Next: [Next page](https://www.capterra.ie/directory/31062/vulnerability-management/software?page=3)

## Related Categories

- [Computer Security Software](https://www.capterra.ie/directory/10005/computer-security/software)
- [Cloud Security Software](https://www.capterra.ie/directory/31344/cloud-security/software)
- [Endpoint Protection Software](https://www.capterra.ie/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.ie/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.ie/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.ie/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.ie/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Ireland","address":{"@type":"PostalAddress","addressLocality":"Dublin","addressRegion":"D","postalCode":"D02 NP94","streetAddress":"2 Park Place, 3rd Floor, Hatch St Dublin, D02 NP94 Ireland"},"description":"Capterra Ireland helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ie","url":"https://www.capterra.ie/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.ie/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":"Capterra Ireland","url":"https://www.capterra.ie/","@type":"WebSite","@id":"https://www.capterra.ie/#website","publisher":{"@id":"https://www.capterra.ie/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ie/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Page 2 - See the top Vulnerability Management Software solutions in Ireland. Capterra offers software reviews, prices, and features helping you find the best software for your business needs.","url":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2","about":{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2#webpage","mainEntity":{"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2#itemlist"},"publisher":{"@id":"https://www.capterra.ie/#organization"},"inLanguage":"en-IE","isPartOf":{"@id":"https://www.capterra.ie/#website"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"https://www.capterra.ie/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 2","position":3,"item":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2","@type":"ListItem"}],"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 2 - Vulnerability Management Software - Prices &amp; Reviews - Capterra Ireland","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Zscaler","position":1,"description":"Zscaler redefines vulnerability management with its cloud-native Zero Trust platform, providing continuous visibility and protection against emerging threats. \n\nBy inspecting all traffic in real time, Zscaler identifies potential vulnerabilities across users, applications, and devices, ensuring your organization stays one step ahead of attackers. Its advanced threat intelligence, combined with automated policy enforcement, helps mitigate risks and remediate vulnerabilities before they can be exploited.\n\nZscaler offers seamless integration with endpoint and workload security tools, empowering teams to proactively manage vulnerabilities across SaaS, cloud, and on-premise environments. With centralized reporting and global scalability, you gain a clear view of your security posture while protecting distributed workforces. Simplify vulnerability management and protect your organization against evolving risks with Zscaler’s industry-leading cloud security platform.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7a6796f9-1449-4617-8dd6-deb7827a0caa.png","url":"https://www.capterra.ie/software/175516/zscaler-internet-access","@type":"ListItem"},{"name":"CanIPhish","position":2,"description":"Train your users and reduce their phish click risk by up to 90% with an easy-to-use market-leading platform.\n\nOur platform does this by utilising real-world techniques and phishing material to phish and train employees. We track all interactions from emails viewed, to payloads clicked to credentials and endpoints compromised. We allow you to then identify which users are prone to phishing material and target them for future training.\n\nWe use a modern approach to combat a modern threat.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/294e2fd0-bfe4-47be-8c18-2e094c380971.png","url":"https://www.capterra.ie/software/1019867/caniphish","@type":"ListItem"},{"name":"AWS Config","position":3,"description":"Config Tool is an Amazon Web Services (AWS) product that helps users manage their AWS configurations. The tool allows users to select cookie preferences, customize cookies, and manage privacy settings on the AWS website. Config Tool gives users control over essential, performance, functional, and advertising cookies. It provides options to accept all cookies, continue without accepting, or customize cookie preferences. Config Tool aims to deliver a smooth user experience by enabling customized privacy and cookie consent on AWS.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4f9f087b-3a9a-43b0-a1ce-9ef2f59358d4.png","url":"https://www.capterra.ie/software/205398/aws-config","@type":"ListItem"},{"name":"CyLock EVA","position":4,"description":"CyLock is a software designed to defend your systems from hacker attacks, identifying weaknesses on your systems and websites, providing information to address vulnerabilities (those used by cyber criminal to access to your computers).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6ff7bbb7-cbee-4198-9323-e6feaa8d9dd4.png","url":"https://www.capterra.ie/software/1030934/cylock-anti-hacker","@type":"ListItem"},{"name":"Risk Hawk","position":5,"description":"Cloud-based integrated risk management tool that helps handle risks (ERM, IFC, ICFR, ORM), controls, incidents, policy management, Internal Audits, action plans, regulatory compliance, Third Party Risk Management, contract management, and more. Also available for on-premise installation. Supports single sign-on, bespoke workflow configurations & dashboards and guarantees high adoptability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/987b3dcc-b347-473c-9830-2046024a7496.png","url":"https://www.capterra.ie/software/1035322/risk-hawc","@type":"ListItem"},{"name":"runZero","position":6,"description":"Built on a foundation of deep, comprehensive visibility, runZero surfaces exposures that traditional vulnerability and attack surface tools simply miss. Our discovery methods and novel fingerprinting break through the limits of agent, authentication, and attribution-only approaches to reveal the risks others can’t, even in OT and IoT environments. With proprietary scanning designed and proven safe for even the most sensitive devices, runZero ensures that no matter the device or the risk, you see what others miss, detect what others can’t, and leave no threat unchecked.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e8911edc-294f-4cc5-aacd-639ecfdbdc99.png","url":"https://www.capterra.ie/software/201787/runzero","@type":"ListItem"},{"name":"Kiuwan","position":7,"description":"Fast, Flexible Code Security!\n\nKiuwan is a robust, end-to-end application security platform that integrates seamlessly into your development process. \n\nOur toolset includes Static Application Security Testing (SAST), Software Composition Analysis (SCA), Software Governance and Code Quality, empowering your team to quickly identify and remediate vulnerabilities.\n\nTop features:\n✅ Extensive language support: Over 30 programming languages.\n✅ Detailed action plans: Prioritize remediation with tailored action plans.\n✅ Code Security: Seamless Static Application Security Testing (SAST) integration.\n✅ Insights: On-demand or continuous scanning Software Composition Analysis (SCA) to help reduce third-party threats.\n✅ One-click Software Bill of Materials (SBOM) generation.\n\n\nCode Smarter. Secure Faster. Ship Sooner","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a8dcb3c0-541d-479f-a555-bed59bc42274.png","url":"https://www.capterra.ie/software/160729/kiuwan-code-security","@type":"ListItem"},{"name":"Acunetix","position":8,"description":"Acunetix is web application and API security software designed to automate security testing and vulnerability management. It features a vulnerability scanner capable of detecting vulnerabilities, including zero-day threats, across web applications and APIs. A standout feature is its ability to discover and crawl an organization's entire web attack surface, scanning areas like single-page applications and script-heavy sites. Acunetix's Predictive Risk Scoring uses machine learning to assess risk levels, helping prioritize critical vulnerabilities. It integrates with tools such as issue trackers and CI/CD pipelines, promoting a shared security responsibility. Continuous security capabilities allow for regular scans, ensuring new vulnerabilities are swiftly addressed. Acunetix streamlines application security efforts, reducing risk and enhancing the security of web-based assets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/9a1f201e-3bde-45b3-a0e2-bfe0c3a29b9e.png","url":"https://www.capterra.ie/software/171379/acunetix","@type":"ListItem"},{"name":"Runecast","position":9,"description":"An AI-powered solution that allows businesses to keep their workloads secure and compliant anywhere.  Your teams can do more with a single platform that checks your cloud infrastructure, for increased visibility, security and time saving. \nRunecast helps reduce operational overheads, increase clarity and easily assess infrastructure vulnerabilities and manage regulatory compliance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d21b54d1-b23a-4a89-aeb2-015c03e1e5ed.png","url":"https://www.capterra.ie/software/175477/runecast-analyzer","@type":"ListItem"},{"name":"ManageEngine Vulnerability Manager Plus","position":10,"description":"Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/04c877b8-6ccf-4e5e-8dec-d82669a9ac11.png","url":"https://www.capterra.ie/software/185510/manageengine-vulnerability-manager-plus","@type":"ListItem"},{"name":"Qualys Cloud Platform","position":11,"description":"Qualys VMDR enables organizations to automatically discover every asset in their environment, including unmanaged assets appearing on the network, inventory all hardware and software, and classify and tag critical assets. \n\nVMDR continuously assesses these assets for the latest vulnerabilities and applies the latest threat intel analysis to prioritize actively exploitable vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/296fda38-71c2-40bb-91b2-b8813c1a7c14.png","url":"https://www.capterra.ie/software/82971/qualysguard-enterprise","@type":"ListItem"},{"name":"Dark Web ID","position":12,"description":"Dark Web ID helps MSPs and IT teams proactively protect their organizations and customers from cybersecurity incidents. It monitors the dark web 24/7/365 and issues alerts when credentials or PII are found up on the dark web, allowing you to take defensive measures before cybercriminals attack.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6de1646f-1b5d-40f7-ada6-4494ba1c0a0c.png","url":"https://www.capterra.ie/software/188259/dark-web-id","@type":"ListItem"},{"name":"Saner CVEM","position":13,"description":"In > 5 MIN, SanerNow automatically and accurately scans your entire network. Post that it assesses and prioritizes vulnerabilities based on their severity i.e. CVSS score. \n\nSanerNow comes with the world's largest SCAP repository and with 190,000+ continuous checks. These features ensure that your organization remains secure from ever-evolving cyber attacks. \n\nWith SanerNow, you can also patch vulnerabilities instantly. It supports all OSs and 550+ Third-Party Apps (Most in industry).","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/71d1e410-0802-43c3-a7b3-dfabe7e032c0.png","url":"https://www.capterra.ie/software/152523/secpod","@type":"ListItem"},{"name":"CyberArk Privileged Access Management Solutions","position":14,"description":"CyberArk Privileged Access Management Solutions secure privileged credentials across on-premises, cloud, and hybrid environments. It offers capabilities such as continuous account management, session isolation, and activity remediation. \n\nThe Privileged Access Manager centralizes control over privileged accounts, while the Endpoint Privilege Manager enforces least privilege on desktops and servers. The Vendor Privileged Access Manager enables secure, passwordless vendor access, and the Cloud Entitlements Manager oversees cloud permissions. The solution protects against breaches by securing identities and credentials, facilitating compliance, and enabling digital business.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e64cd799-8ecc-42d4-ad8c-c52ef4914cdd.png","url":"https://www.capterra.ie/software/119742/privileged-account-security-solution","@type":"ListItem"},{"name":"Invicti","position":15,"description":"Invicti Security, formerly Netsparker, delivers application security with zero noise through a DAST-first approach that focuses on real, exploitable vulnerabilities in your running applications. The platform combines enterprise-grade dynamic application security testing (DAST), API security, web asset and API discovery, IAST, and dynamic SCA with static application security testing (SAST), static software composition analysis (SCA), and container security—all within a single, scalable solution. With proof-based scanning, Invicti automatically confirms exploitable vulnerabilities, to reduce false positives and speed remediation. Teams can prioritize real risk, reduce alert fatigue, and confidently secure their entire attack surface. Invicti integrates into modern development pipelines for continuous scanning and actionable insights across the SDLC. Trusted by leading enterprises, Invicti empowers security and DevOps teams to fix what matters most—quickly, accurately, and at scale.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d386ac3d-34c6-4fa7-a326-728dc8167276.png","url":"https://www.capterra.ie/software/171539/netsparker-web-application-security-scanner","@type":"ListItem"},{"name":"AppTrana","position":16,"description":"Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees.\n\nIndusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/47a09778-f8a2-42f1-be8d-484d32b38c5d.png","url":"https://www.capterra.ie/software/195294/apptrana","@type":"ListItem"},{"name":"Netsurion","position":17,"description":"Netsurion® delivers complete cybersecurity confidence through wider attack surface coverage, deeper threat detection, and faster incident response. Netsurion’s Managed XDR solution combines our 24x7 SOC and our Open XDR platform in a co-managed service that gives you the ultimate flexibility to adapt and grow while maintaining a secure environment. Headquartered in Ft. Lauderdale, FL with a global team of security analysts and engineers, Netsurion is a leader in Managed Extended Detection & Resp","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7425e21c-45d3-4792-a80a-eaf5f6229329.png","url":"https://www.capterra.ie/software/80473/netsurion","@type":"ListItem"},{"name":"KACE","position":18,"description":"KACE® by Quest supports your unified endpoint management (UEM) strategy by helping you discover and track every device in your environment, automate administrative tasks, keep compliance requirements up-to-date and secure your network from a range of cyberthreats. Discover, manage and secure all your endpoints from one console as you co-manage your traditional and modern endpoints, including Windows, Mac, Linux, ChromeOS, and iOS and Android devices.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30ec5e4a-8d78-42f3-ae66-3a8b2687d3b9.png","url":"https://www.capterra.ie/software/177311/kace","@type":"ListItem"},{"name":"vRx","position":19,"description":"Remotely & automatically mitigate threats in your digital environment. vRx is a consolidated cloud-based vulnerability management platform that efficiently reduce your organizational cyber risk.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/09d8c5f2-5265-4242-9659-1dc572b6fd35.png","url":"https://www.capterra.ie/software/201047/topia","@type":"ListItem"},{"name":"Red Sentry","position":20,"description":"Red Sentry supports vulnerability management programs by helping organizations identify, validate, and prioritize security vulnerabilities based on real-world risk. The service complements automated scanning by determining which findings are exploitable and require remediation.\n\nSecurity experts perform targeted testing to assess vulnerabilities across applications, APIs, cloud environments, and networks. This approach helps teams focus remediation efforts on issues with demonstrated impact rather than theoretical or low-risk findings.\n\nResults are delivered in structured reports that include severity ratings, evidence of exploitation, and remediation guidance. These outputs help security and IT teams manage risk more effectively, improve remediation workflows, and support internal security reviews and compliance initiatives.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/394d0ea1-a32b-4c88-b6f6-14d618fdffab.png","url":"https://www.capterra.ie/software/1019242/red-sentry","@type":"ListItem"},{"name":"Snyk","position":21,"description":"Snyk is the leader in developer security. Snyk is used by 1,200 customers worldwide today, including industry leaders such as Asurion, Google, Intuit, MongoDB, New Relic, Revolut and Salesforce. Snyk is recognized on the Forbes Cloud 100 2021, the 2021 CNBC Disruptor 50 and was named a Visionary in the 2021 Gartner Magic Quadrant for AST.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0b834ddb-8c1a-4529-9ac4-28e194ec2eaf.png","url":"https://www.capterra.ie/software/172252/snyk","@type":"ListItem"},{"name":"Hackrate","position":22,"description":"Hackrate Bug Bounty platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.\n\nA bug bounty is about using the power of crowdsourced security to secure your business. During a bug bounty program, a company offers rewards to ethical hackers for reporting vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ed22b2cf-56b6-4703-bfd3-8678cf718471.png","url":"https://www.capterra.ie/software/1020647/hackrate","@type":"ListItem"},{"name":"RoboShadow","position":23,"description":"RoboShadow is a platform that is built to ensure any organisation. anywhere on the planet, gets an Internal / External Vulnerability Assessment (70% of a $10,000 - $20,000 penetration test) completely free of charge.  Additional functionality is available, such as Cyber Heal which not only detects your vulnerabilities, but allows you to remediate them from a single platform.  Features inc.  External Vulnerability Scanner,  Zero Trust Device management, Azure AD / 365 integration and much more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f3b016f-7efe-45a5-a414-faedfffe13a6.png","url":"https://www.capterra.ie/software/1031450/robo-shadow-cyber-platform","@type":"ListItem"},{"name":"DataDome","position":24,"description":"DataDome protects businesses from cyberfraud and bot attacks in real time, securing digital experiences across websites, mobile apps, ads, and APIs. Named a Leader in the Forrester Wave for Bot Management, DataDome is powered by AI that analyzes 5 trillion signals daily, delivering unmatched protection without compromising performance. Its Cyberfraud Protection Platform seamlessly integrates into any tech stack, offering record-fast time to value. Fully automated, it detects and blocks every malicious click, signup, and account login. Backed by a global team of advanced threat researchers and 24/7 SOC support, DataDome stops over 350 billion attacks annually.\n\nDataDome offers transparent insights, easy deployment, and 50+ integrations. The solution adds no latency to protected end-points, responding to each request in under 2 milliseconds thanks to 30+ regional PoPs and autoscaling technology.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2f0b2a8a-6e89-40cb-8b01-a1dff45c1e11.jpeg","url":"https://www.capterra.ie/software/149769/datadome-bot-mitigation","@type":"ListItem"},{"name":"InsightVM","position":25,"description":"InsightVM uses the power of Rapid7s Insight platform & heritage of their award-winning Nexpose product. InsightVM provides a fully available, scalable, & efficient way to collect vulnerability data, turn it into answers, & minimize risk. This industry leader in vulnerability management, InsightVM leverages the latest analytics & endpoint technology to discover vulnerabilities real-time, pinpoint their location, prioritize using threat risk & business context, and confirm exposure reduction.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/16496079-f948-4896-b23c-94efc1a5bae6.png","url":"https://www.capterra.ie/software/169723/insightvm","@type":"ListItem"}],"@id":"https://www.capterra.ie/directory/31062/vulnerability-management/software?page=2#itemlist","numberOfItems":25}
</script>
