Top 8 Vulnerability Management

Tenable NessusTenable.scQualys VMDROrca Vulnerability ManagementMorphisec Breach Prevention PlatformRapid7 InsightVMSkybox Security Suite
  1. leader badge
    Quick assessments, compliance scores, and results are provided without having to do agents. The most valuable feature is the installation of Tenable which is incredibly easy.
  2. leader badge
    It is a very good and user-friendly product. I like's analytics and reporting. You can also configure your on-prem network monitors to talk to your control panel.
  3. Buyer's Guide
    Vulnerability Management
    March 2023
    Find out what your peers are saying about Tenable Network Security, Qualys, Orca Security and others in Vulnerability Management. Updated: March 2023.
    688,618 professionals have used our research since 2012.
  4. leader badge
    The most valuable feature of the solution is the external channel.The solution shows us classic categories, including high, medium, and low risks. It also shows critical items, and that gives us the advantage of prioritizing things.
  5. leader badge
    The most valuable feature of Orca Security is the automated scanning tool, user-friendliness, and ease of use.Orca gives you great visibility into your assets. It shows you the issues and the things that you need to attend to first, by prioritizing things. You can see a lot of information that is not always visible, even to DevOps, to help you know about the machines and their status. It's very easy to see everything in a single dashboard. That makes it a very useful tool.
  6. leader badge
    The initial setup is pretty straightforward. The dashboard is pretty intuitive, and it lets you do a drill-down analysis of each vulnerability. That is something that brings a lot of value to the organization.
  7. leader badge
    Morphisec's in-memory protection is probably the most valuable feature because it stops malicious activity from occurring. If something tries to install or act as a sleeper agent, Morphisec will detect and stop it.
  8. report
    Use our free recommendation engine to learn which Vulnerability Management solutions are best for your needs.
    688,618 professionals have used our research since 2012.
  9. leader badge
    The pricing is reasonable. I rate InsightVM eight out of 10 for ease of setup. It takes two or three engineers to deploy. The solution requires some maintenance. It's mainly cleaning up data.
  10. Robust modules can be used for different parts of network security.The performance could be good because we chose it at the time, but it is too complex for us to appreciate its performance because we lack the necessary skills.

Advice From The Community

Read answers to top Vulnerability Management questions. 688,618 professionals have gotten help from our community of experts.
Ludwing Caviedes - PeerSpot reviewer
Ludwing Caviedes
VP Innovation and Development at Coinsa SAS


I'm a VP of Innovation and Development at a small tech. services company. 

Is it possible that a single vulnerability analysis software does not detect the entire spectrum of threats?

Avraham Sonenthal - PeerSpot reviewer
Avraham SonenthalNo single product will detect all vulnerabilities. That is why in security we… more »
8 Answers
reviewer2000289 - PeerSpot reviewer
Senior Engineer at Lincoln Financial Group
Jan 08 2023
Hello community,  I am a Senior Engineer at a large financial services firm. I am currently researching vulnerability management tools. Which tool would you recommend for vulnerability management in your infrastructure? We are particularly concerned post the Apache log4j vulnerability that was...
Read More »
Antonio Scola - PeerSpot reviewer
Antonio ScolaHello I recommend you take a look at TANIUM.COM. It's a fantastic solution… more »
3 Answers
Rony_Sklar - PeerSpot reviewer
Community Manager at a tech services company with 51-200 employees

In the past vulnerability assessment has been the primary approach used to detect cyber threats. 

Risk-based vulnerability management has become increasingly popular. 

How do each of these approaches work, and which do you think is more effective?

Nikos Christakis - PeerSpot reviewer
Nikos ChristakisVulnerabiity Assement is a useful process but it's still a snap-shot of your… more »
5 Answers
Rony_Sklar - PeerSpot reviewer
Community Manager at a tech services company with 51-200 employees

Is continuous vulnerability scanning essential? 

Are there other approaches to vulnerability management that do not involve continuous scanning?

George Fyffe - PeerSpot reviewer
George FyffeAs data increasingly moves from on-prem to Public Cloud, we need a complete… more »
6 Answers

Vulnerability Management Articles

Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Dear professionals, Welcome back to PeerSpot's Community Spotlight! Below you can find the latest hot topics posted by your fellow PeerSpot Community members. Read articles, answer questions, and contribute to discussions that are relevant to you and your expertise. Or ask your peers for insight...
Read More »
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky@Chris Childerhose, @PraveenKambhampati, @Deena Nouril, @Shibu Babuchandran and… more »
1 Comment
Evgeny Belenky - PeerSpot reviewer
Evgeny Belenky
PeerSpot (formerly IT Central Station)
Hi peers, We're happy to share our new bi-weekly Community Spotlight with you. Here you'll find recent contributions by PeerSpot community members: questions, articles and trending discussions. Trending See what your peers are discussing at the moment! What to choose: an endpoint antiviru...
Read More »
Netanya Carmi - PeerSpot reviewer
Netanya Carmi
Content Manager at PeerSpot (formerly IT Central Station)
PeerSpot’s crowdsourced user review platform helps technology decision-makers around the world to better connect with peers and other independent experts who provide advice without vendor bias. Our users have ranked these solutions according to their valuable features, and discuss which features...
Read More »

Vulnerability Management Topics

Why do we need vulnerability management?

Vulnerability management is essential to protecting your organization and the systems, applications, and software utilized to keep your company safe and fully functioning at all times. Your organization has a fiduciary responsibility to your employees, stakeholders, and business partners to ensure that every effort is being made to keep your systems safe from cyber attacks and will continue running unencumbered. Any cyber attack, breach, or identified vulnerability could represent a loss of confidence and profitability to any and all of your business partners.

What are the main elements of a vulnerability management process?

The main basic elements of a vulnerability management process can be easily remembered as “the 4 Rs mantra” : Recognize, Realize, Repair and Record.

  • Recognize: A thorough risk assessment analysis will identify vulnerabilities that could potentially affect your software, applications, and operational systems. One quick and effective process to recognize these issues would be to create a complete workflow of your operational system processes, thereby facilitating a clearer, linear perspective of all the areas where you may be potentially at risk.
  • Realize: Next you will realize the seriousness of each potential threat to your operational systems. It is essential that you identify and prioritize the potency each possible threat and vulnerability represents to your operational systems. Once prioritized, you can create a step-by-step plan to eradicate those threats and vulnerabilities.
  • Repair: Now you are ready to develop a “best course of action” plan to ensure these potential threats are never realized. For every threat and vulnerability, a fix, patch, or repair will need to be completed. At this time, it is a good idea to closely monitor those areas determined to be at risk and decrease the amount of access available to those areas. After all the recognized vulnerabilities have been addressed, you will need to go back to the beginning to retest every vulnerability, ensuring that all fixes, patches, etc. have been successful in stopping the perceived threats.
  • Record: It is important to keep a record of all vulnerabilities discovered, the location of those vulnerabilities, efforts (fixes, patches, etc.) made to address them, and the effectiveness of those efforts. This will help your future efforts in identifying vulnerabilities and threats. Additionally, it will support significant responsibility and awareness for general security, ensuring important compliance standards are being met throughout your organization.
How do you implement vulnerability management?

Communication is key in successfully implementing a vulnerability management plan.

All affected team players need to be identified and brought into the loop. This involves individuals at different levels of your organization, from security to IT, QA, and analysts, just to name a few. The individuals who use the systems and software and everyone who will be responsible for the repair and fix of the vulnerabilities will need to be made aware of each individual’s roles and responsibilities, in addition to the overall goals and objectives of the plan, to ensure the complete success of your vulnerability management plan.

Is vulnerability management part of SOC?

Generally, vulnerability management is part and parcel of a successful SOC (security operations center). Vulnerability management’s main objective is to highlight areas of potential technical deficiencies throughout your systems, applications, and software. Most organizations with a credible SOC have integrated these processes into the framework of their organization. It is important to note that vulnerabilities could also be a result of manpower and the lack of consistent training processes resulting in the proper knowledge of how to effectively utilize your operational systems.

Benefits of Vulnerability Management Tools

Vulnerability management tools have several benefits, including:

  • Proactive identification of vulnerabilities.
  • Process can be run repeatedly, which provides continuous protection.
  • ​​Ability to create an inventory of all devices on the network, including vulnerabilities associated with the devices.
  • Facilitates incremental improvements.
  • Contributes to the meeting of data protection requirements and the facilitation of security.
Features of Vulnerability Management Tools

When deciding on a vulnerability management solution, here are some key features you should look for:

  • Continuous scanning and monitoring for vulnerabilities.
  • Monitoring rule system determined by your IT department.
  • Ability to set rules for notifications.
  • Visualization of attack surface.
  • Monitoring and analytics of attack vectors.
  • Risk-scoring.
  • Automated updates and patching.
  • Patch management.
  • Customizable reporting/compliance reports.
  • Automatic remediation.

Buyer's Guide
Vulnerability Management
March 2023
Find out what your peers are saying about Tenable Network Security, Qualys, Orca Security and others in Vulnerability Management. Updated: March 2023.
688,618 professionals have used our research since 2012.