---
description: Page 5 - Compare the best Vulnerability Management Software in Canada. Capterra offers software reviews from verified users, pricing, and features. Find the top rated software for your business.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 5 - Vulnerability Management Software - Prices & Reviews - Capterra Canada 2026
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](https://www.capterra.ca/directory/31062/vulnerability-management/software) > [Page 5](https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5)

# Vulnerability Management Software

Canonical: https://www.capterra.ca/directory/31062/vulnerability-management/software

Page: 5 / 10\
Prev: [Previous page](https://www.capterra.ca/directory/31062/vulnerability-management/software?page=4)\
Next: [Next page](https://www.capterra.ca/directory/31062/vulnerability-management/software?page=6)

> Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [Unified VRM](https://www.capterra.ca/software/130575/unified-vrm) — 4.3/5 (4 reviews) — Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and more.
2. [UpGuard](https://www.capterra.ca/software/159010/upguard) — 4.5/5 (4 reviews) — UpGuard is a cloud-based risk management solution that helps businesses secure data, monitor risks, track threats, and more.
3. [Sonatype Lifecycle](https://www.capterra.ca/software/171030/nexus-lifecycle) — 4.0/5 (4 reviews) — Get automatic and continuous monitoring that alerts you to open source vulnerabilities so you can find and fix faster.
4. [Exodus Intelligence Vault](https://www.capterra.ca/software/1019073/exodus-intelligence) — 4.8/5 (4 reviews) — Exodus Intelligence is designed to help businesses detect and prevent online threats as well as software vulnerabilities.
5. [CloudWize](https://www.capterra.ca/software/1030687/cloudwize) — 4.5/5 (4 reviews) — CloudWize is an innovative agentless cloud solution for maximum cloud security and compliance from architecture design to runtime.
6. [Quadrant XDR](https://www.capterra.ca/software/1049353/sagan) — 5.0/5 (4 reviews) — Quadrant combines the best security technology and talent in a single XDR solution.
7. [BIMA](https://www.capterra.ca/software/1063789/bima) — 5.0/5 (4 reviews) — BIMA by Perisai merges EDR, NDR, XDR, and SIEM features for a holistic cybersecurity approach. For specifics, consult Perisai directly.
8. [Techowlshield](https://www.capterra.ca/software/1065992/techowlshield) — 4.5/5 (4 reviews) — Cloud-based vulnerability scanner that helps businesses identify threats, analyze historical trends, access heatmaps, and more.
9. [CAST Highlight](https://www.capterra.ca/software/177188/cast-highlight) — 5.0/5 (3 reviews) — CAST Highlight is a SaaS product that provides rapid insights across application portfolios.
10. [Crashtest Security](https://www.capterra.ca/software/199325/crashtest-security) — 4.7/5 (3 reviews) — Crashtest Security is a DAST vulnerability scanner helping you automate your security scanning and achieve protection at DevOps speed.
11. [Lightspin](https://www.capterra.ca/software/215630/lightspin) — 4.7/5 (3 reviews) — Attack-path-based cloud security platform that enables detection, prioritization, and remediation of risks to your cloud stack.
12. [Bugcrowd](https://www.capterra.ca/software/218813/bugcrowd) — 5.0/5 (3 reviews) — Bugcrowd is a crowdsourced cybersecurity platform that helps organizations proactively identify and remediate security vulnerabilities.
13. [AWS Shield](https://www.capterra.ca/software/1017251/aws-shield) — 4.3/5 (3 reviews) — DDoS protection solution that helps manage, block and respond to incidents.
14. [Apiiro](https://www.capterra.ca/software/1020206/apiiro) — 4.3/5 (3 reviews) — Apiiro helps organizations secure their Software Development Lifecycle (SDLC).
15. [CODA Footprint](https://www.capterra.ca/software/1021315/coda-footprint) — 5.0/5 (3 reviews) — Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
16. [Enzoic for Active Directory Lite](https://www.capterra.ca/software/1030841/active-directory-lite) — 4.7/5 (3 reviews) — Free Password Auditing Tool Detects breached, weak, and reused passwords in Active Directory and provides fast, actionable insights.
17. [ISS](https://www.capterra.ca/software/1036001/iss) — 4.3/5 (3 reviews) — Compliance management solution that helps conduct audits, track regulatory data, and more.
18. [Threatspy](https://www.capterra.ca/software/1037300/threatspy) — 4.7/5 (3 reviews) — Developer-first Application \&amp; API Security Management Platform
19. [OX Security](https://www.capterra.ca/software/1043847/ox-security) — 4.7/5 (3 reviews) — OX Security provides full visibility and end-to-end traceability over your entire software supply chain from code to cloud.
20. [SAINT Security Suite](https://www.capterra.ca/software/130576/saint-security-suite) — 4.5/5 (2 reviews) — Integrated Vulnerability Management, Penetration Testing, Compliance, and Configuration Audit software, with consulting services.
21. [Intruder](https://www.capterra.ca/software/161379/intruder) — 5.0/5 (2 reviews) — Intruder is a proactive vulnerability scanner that finds weaknesses in your exposed systems and helps with their remediation.
22. [MetricStream CyberGRC](https://www.capterra.ca/software/166091/metricstream-it-grc-solution) — 3.5/5 (2 reviews) — Actively manage cyber risk by automating \&amp; enhancing your cyber \&amp; IT governance, risk \&amp; compliance processes with MetricStream CyberGRC
23. [DefectDojo](https://www.capterra.ca/software/178929/defectdojo) — 4.0/5 (2 reviews) — DefectDojo is an open source application security testing software that enables teams to identify and manage vulnerabilities.
24. [Pentera](https://www.capterra.ca/software/178964/pcysys) — 5.0/5 (2 reviews) — Know your true, current, exploitable attack surface by emulating real-life attacks on all cybersecurity layers at all times.
25. [Application Security Platform](https://www.capterra.ca/software/180356/stealth-security) — 5.0/5 (2 reviews) — Cequence Security offers an extensive security software platform to protect attacks on enterprise web, mobile, and API applications.

-----

Page: 5 / 10\
Prev: [Previous page](https://www.capterra.ca/directory/31062/vulnerability-management/software?page=4)\
Next: [Next page](https://www.capterra.ca/directory/31062/vulnerability-management/software?page=6)

## Related Categories

- [Cloud Security Software](https://www.capterra.ca/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.ca/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.ca/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.ca/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.ca/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.ca/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.ca/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"Capterra Canada","address":{"@type":"PostalAddress","addressLocality":"Toronto","addressRegion":"ON","postalCode":"M2N 7E9","streetAddress":"5000 Yonge Street 14th Floor, Suite 1402 Toronto ON M2N 7E9"},"description":"Capterra Canada helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.ca","url":"https://www.capterra.ca/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@type":"Organization","@id":"https://www.capterra.ca/#organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/Capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra/","https://www.instagram.com/capterra/","https://www.youtube.com/channel/UCyUw9-HIkKiYcTqcFDUcxPA"]},{"name":"Capterra Canada","url":"https://www.capterra.ca/","@type":"WebSite","@id":"https://www.capterra.ca/#website","publisher":{"@id":"https://www.capterra.ca/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.ca/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Page 5 - Compare the best Vulnerability Management Software in Canada. Capterra offers software reviews from verified users, pricing, and features. Find the top rated software for your business.","url":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5","about":{"@id":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5#breadcrumblist"},"@type":["WebPage","CollectionPage"],"@id":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5#webpage","mainEntity":{"@id":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5#itemlist"},"isPartOf":{"@id":"https://www.capterra.ca/#website"},"inLanguage":"en-CA","publisher":{"@id":"https://www.capterra.ca/#organization"}},{"@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"https://www.capterra.ca/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5","@type":"ListItem"}],"@id":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5#breadcrumblist"}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Vulnerability Management Software - Prices &amp; Reviews - Capterra Canada 2026","@context":"https://schema.org","@type":"ItemList","itemListElement":[{"name":"Unified VRM","position":1,"description":"NopSec Unified Vulnerability Risk Management (VRM) helps you prioritize your risks after scanning (we are scanner-agnostic) and subsequently helps you remediate the threats that matter the most. \nUnified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence  including malware, exploit, patching and social media feeds to predict the true probability of attacks.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/bb9a32f2-5602-4831-9bd5-bb589a1c9ee7.png","url":"https://www.capterra.ca/software/130575/unified-vrm","@type":"ListItem"},{"name":"UpGuard","position":2,"description":"UpGuard is a third-party risk and attack surface management platform that helps organizations secure sensitive data and monitor potential threats. The platform features AI-powered capabilities that analyze vendor evidence, map controls, identify risks, and generate assessment reports. UpGuard includes daily scanning and vendor monitoring functionality to detect risks early and streamline assessment processes. The system offers comprehensive risk assessments through automated scanning and security questionnaire analysis, providing organizations with a complete view of vendor risks. For attack surface management, UpGuard delivers continuous monitoring, scanning, and alert notifications. It also includes credential and data leak detection through dark web scanning and proprietary sources. UpGuard combines these features to give organizations clear visibility into their cyber risk landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2b043470-0d95-4c09-949e-89e5efbbe5cc.png","url":"https://www.capterra.ca/software/159010/upguard","@type":"ListItem"},{"name":"Sonatype Lifecycle","position":3,"description":"Sonatype's Nexus Platform scales open source security monitoring across the software supply chain and reclaims time spent fighting risks in the software development life cycle.\n\nSoftware developers, application security professionals, and DevSecOps experts are empowered with the highest quality Nexus vulnerability intelligence to drive faster releases, decrease false positives, and deliver in-depth, developer remediation guidance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/235422da-fc87-4523-bcc0-32eaad933197.jpeg","url":"https://www.capterra.ca/software/171030/nexus-lifecycle","@type":"ListItem"},{"name":"Exodus Intelligence Vault","position":4,"description":"Exodus Intelligence is designed to help businesses detect and prevent online threats as well as software vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fa0020d2-e2f7-45ab-92dd-a09e5f1b3669.jpeg","url":"https://www.capterra.ca/software/1019073/exodus-intelligence","@type":"ListItem"},{"name":"CloudWize","position":5,"description":"CloudWize enables maximum cloud security and compliance from architecture design to runtime. \nGet 360° protection for your cloud in minutes from onboarding. \n\nThis agentless, drag-and-drop, no-code solution saves you resources by detecting and fixing cloud issues in minutes. \nYou can now investigate your cloud like a pro. \nSee how security and compliance impact business cost, performance, and operations. \nAnd you get many more security features.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5385aae5-ca36-4d48-86e5-aa3e17e6a56b.jpeg","url":"https://www.capterra.ca/software/1030687/cloudwize","@type":"ListItem"},{"name":"Quadrant XDR","position":6,"description":"Operating at the intersection of People and Product, Quadrant combines the best security technology and talent in a single XDR solution. \n\nWe leverage our own proprietary technology (Quadrant XDR), operated by seasoned security analysts around the clock. We differentiate by being best at the “R” in XDR - response is where we excel. Significantly improve mean time to remediate by eliminating internal escalation and hand-off, achieved via Sagan, powered by a flat analyst org in our SOC.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/281ab9ae-b252-48d3-9818-a91024919b38.jpeg","url":"https://www.capterra.ca/software/1049353/sagan","@type":"ListItem"},{"name":"BIMA","position":7,"description":"BIMA by Peris.ai is redefining cybersecurity with its integrated EDR, NDR, XDR, and SIEM framework, enhanced by the power of generative AI and advanced machine learning. \n\nThese innovations not only bolster defense mechanisms but also bring predictive analytics and adaptive responses to the forefront, making BIMA a powerhouse in proactive cybersecurity.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7367a3f6-d166-4e8b-90a3-ebc9cf001fd1.png","url":"https://www.capterra.ca/software/1063789/bima","@type":"ListItem"},{"name":"Techowlshield","position":8,"description":"We are committed to shielding you from the ever-evolving landscape of cyber threats. With years of experience and expertise, we stand as your \"Digital Defender,\" ready to safeguard your business, personal data, and online presence.\n\nAt TechOwl Shield, we harness cutting-edge Cyber Intelligence, strategic Brand Monitoring, in-depth Attack Surface Analysis, robust Infrastructure Surveillance, and thorough Supply Chain Risk Management to optimize and fortify our clients' digital security posture.\n\nWhether you're in healthcare, finance, retail, or any other sector, TechOwl Shield offers a suite of specialized services such as Anti-Phishing, Anti-Rogue activities, Dark web Monitoring, Brand Monitoring, Attack Surface Monitoring, and Mail Health Monitoring-that are tailored to meet the unique cybersecurity needs of every industry","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7d081281-d4ac-4479-90e6-d57d991b51da.png","url":"https://www.capterra.ca/software/1065992/techowlshield","@type":"ListItem"},{"name":"CAST Highlight","position":9,"description":"CAST Highlight is a SaaS product that provides rapid insights across a portfolio of applications. It acts as an application ‘control tower’ by automatically understanding the source code of hundreds of applications in hours and delivering actionable insights on Software Health (resiliency, agility, technical debt), Cloud Readiness, Software Composition Analysis (open source risks), and Green Impact. Built-in surveys capture organizational context for more informed decision-making.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/cce5449e-e558-43ea-8401-00dfa2ee4d7b.jpeg","url":"https://www.capterra.ca/software/177188/cast-highlight","@type":"ListItem"},{"name":"Crashtest Security","position":10,"description":"Crashtest Security provides the most simple blackbox vulnerability scanning experience with advanced scan targets & deep automation.\n\nWe offer the most advanced crawling options.\n\nOur software is able to directly detect attack vectors in all web applications:\n\nRevolutionary Single-Page application scanning\nPainless Multi-Page application setup\nDocumentation-based API scanning\n\nOur software is user-friendly yet powerful and provides detailed and accurate vulnerability reports.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d8be4a0a-b3a6-47a3-8926-b98697e4caab.png","url":"https://www.capterra.ca/software/199325/crashtest-security","@type":"ListItem"},{"name":"Lightspin","position":11,"description":"Why Lightspin?\n\nLightspin’s attack-path-based cloud security platform enables detection, prioritization, and remediation of risks to your cloud stack, from build to runtime, and empowers Security and DevOps teams to eliminate risks and maximize productivity while minimizing friction between them. The platform reduces the noise generated by legacy cloud security providers, allowing your team to focus?on the risks that matter most. Lightspin supports AWS, Azure, GCP, and any Kubernetes.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/ae22aae1-ed1f-47f4-9ad4-4f88c12c1d5a.png","url":"https://www.capterra.ca/software/215630/lightspin","@type":"ListItem"},{"name":"Bugcrowd","position":12,"description":"Bugcrowd is a crowdsourced cybersecurity platform that offers continuous security testing to help organizations identify and remediate vulnerabilities. The Bugcrowd platform provides multiple security solutions including penetration testing, bug bounty programs, vulnerability disclosure, and attack surface management powered by a community of trusted security researchers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4364b39f-deed-4f72-9915-ae551eb3b6fc.jpeg","url":"https://www.capterra.ca/software/218813/bugcrowd","@type":"ListItem"},{"name":"AWS Shield","position":13,"description":"DDoS protection solution that helps manage, block and respond to incidents.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e98fc689-14cc-460e-afb5-dee743df030a.jpeg","url":"https://www.capterra.ca/software/1017251/aws-shield","@type":"ListItem"},{"name":"Apiiro","position":14,"description":"Apiiro performs deep code risk assessment across all source control systems and CI/CD pipelines and uses context across multiple data sources to remediate critical risks such as design flaws, misconfigurations, vulnerabilities, drifts & supply chain attacks before production.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/5d1b5a5a-c21c-4234-b7e5-7fa790f52638.png","url":"https://www.capterra.ca/software/1020206/apiiro","@type":"ListItem"},{"name":"CODA Footprint","position":15,"description":"CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.? It is operating under the NIST Cybersecurity Framework.\n\nCODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e6f7da51-d70e-4a67-86ed-95658f9b49ee.jpeg","url":"https://www.capterra.ca/software/1021315/coda-footprint","@type":"ListItem"},{"name":"Enzoic for Active Directory Lite","position":16,"description":"Quickly evaluate your Active Directory security with Enzoic’s Free Password Auditing Tool. In minutes, uncover critical password vulnerabilities and take action to protect your organization.\n\nKey Features:\n\n- Detect Breached Passwords: Find passwords exposed in known breaches.\n- Flag Weak Passwords: Identify common, weak, and guessable passwords.\n- Spot Password Reuse: Detect instances of repeated passwords across accounts.\n\nBacked by Enzoic’s advanced threat intelligence, the tool provides a detailed, downloadable report with actionable insights to strengthen password security.\n\nAssess your password risks today—fast, free, and effective.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/90512de1-b34d-4f8f-9b43-7badb16cfaa0.png","url":"https://www.capterra.ca/software/1030841/active-directory-lite","@type":"ListItem"},{"name":"ISS","position":17,"description":"INSSIDE Security Suite is a leading platform in regulatory compliance solutions that allows companies to manage risks, facilitating the creation of reports, analysis and monitoring of compliance processes. In addition, ISS is a highly customizable platform and can be adapted to the specific needs of each company, which guarantees a unique and effective solution for each case.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7f29459a-66d2-4eef-806d-ba859aa849e7.jpeg","url":"https://www.capterra.ca/software/1036001/iss","@type":"ListItem"},{"name":"Threatspy","position":18,"description":"Threatspy is a Developer-first AI-powered AppSec Management platform (DAST) that enables developers and Security Teams to proactively identify and mitigate known and unknown vulnerabilities in their applications & API through automating detection, prioritization, and remediation processes.\n\nIt uses a heuristic approach to identify vulnerabilities, prioritizing them based on a custom-built Reachability Framework that provides a Security Posture score based on contextual analysis. The platform streamlines remediation by providing a Remediation Playbook and Mitigation Campaign, which automates actions and provides curated steps for efficient remediation. The platform also calculates ROI by evaluating the number of manual hours saved using the platform.\n\nEndorsed by industry leaders and holding a stellar 4.7 rating on Gartner Peer Insight, Capterra, G2, and Product Hunt.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/49d03218-d5c4-48bd-9a60-0a48cac286d0.png","url":"https://www.capterra.ca/software/1037300/threatspy","@type":"ListItem"},{"name":"OX Security","position":19,"description":"OX Security provides full visibility and end-to-end OX Security's Active ASPM platform unifies application security practices and prevents risks across the software supply chain, empowering organizations to take the first step toward eliminating manual practices while confidently enabling scalable and secure development.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/6172ed09-fe03-4356-abe9-c7d7e95bf53a.png","url":"https://www.capterra.ca/software/1043847/ox-security","@type":"ListItem"},{"name":"SAINT Security Suite","position":20,"description":"From software development to business analytics to program management, Carson & SAINT provides an independent view of the critical issues that affect daily operations. Our consultants are dedicated to providing quality products and a high level of customer satisfaction. We partner with you to identify strengths and weaknesses in your culture and business  with minimum impact to your daily operations. We build long-term relationships with our customers.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d2a7750e-f290-46d2-939a-7bcfb3e7444f.png","url":"https://www.capterra.ca/software/130576/saint-security-suite","@type":"ListItem"},{"name":"Intruder","position":21,"description":"Intruder is a proactive vulnerability scanner that finds weaknesses in your online digital estate, explains the risks, & helps with remediation before a breach can occur.\n\nCloud Connectors for AWS, Google Cloud and Azure help you synchronise your systems, so no stone gets left unturned.\n\nDeveloper integrations with Slack and Jira make keeping up to date a breeze.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c619ce63-b45d-4ff9-ad81-bf492b7f301b.png","url":"https://www.capterra.ca/software/161379/intruder","@type":"ListItem"},{"name":"MetricStream CyberGRC","position":22,"description":"MetricStream CyberGRC helps organizations actively manage cyber risk through an IT and Cyber Risk and Compliance Framework that aligns with established security standards so you can pass IT audits more efficiently and get buy-in from top management. Gain comprehensive visibility into the overall IT risk posture and cybersecurity investment priorities. Get your IT and Cyber Compliance program up and running quickly with pre-packaged content and industry frameworks such as ISO 27001, NIST CSF, and NIST SP800-53, and map policies to IT controls and policy exceptions. Leverage best practices, insightful reporting, and risk quantification.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b73f2754-a57f-40af-9d87-02bae7ea4990.png","url":"https://www.capterra.ca/software/166091/metricstream-it-grc-solution","@type":"ListItem"},{"name":"DefectDojo","position":23,"description":"DefectDojo is an open-source application vulnerability management tool designed for both DevSecOps and traditional application security. DefectDojo integrates with 150 security tools, has bi-directional integration with JIRA, and algorithms that learn overtime to automatically reduce noise and distill results. The tool provides reporting at every level including tests, engagements, and products, and offers a variety of metrics to gain visibility into vulnerability trends and insights.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/22fb511c-b726-41b4-964d-2b980133b007.png","url":"https://www.capterra.ca/software/178929/defectdojo","@type":"ListItem"},{"name":"Pentera","position":24,"description":"Pentera is the category leader for Automated Security Validation, allowing organizations to test with ease the integrity of all cybersecurity layers - including ransomware readiness - unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. In 2020, Pentera was chosen by Gartner as a Cool Vendor in Security Operations","url":"https://www.capterra.ca/software/178964/pcysys","@type":"ListItem"},{"name":"Application Security Platform","position":25,"description":"Cequence ASP is an application security platform powered by the CQAI analytics engine, which provides Discover, Detect, Defend capabilities against attacks on web, mobile, and API applications.  The extensible software platform can be deployed on premises or in the cloud.  It supports multiple service modules that deliver various application security capabilities by leveraging the underlying platform and CQAI engine.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fbc946ce-6f61-4577-b5c7-78993de9aec2.png","url":"https://www.capterra.ca/software/180356/stealth-security","@type":"ListItem"}],"@id":"https://www.capterra.ca/directory/31062/vulnerability-management/software?page=5#itemlist","numberOfItems":25}
</script>
