Cisco Vulnerability Management (formerly Kenna.VM) Alternatives (September 2025)

Cisco Vulnerability Management (formerly Kenna Security) delivers risk-based prioritization that predicts exploits, drives down risk, and optimizes resources.

4.3/5

220+ reviews

Reviewed on:

G2
Trustradius
1.
InsightVM Vulnerability Management Tool - Rapid7
https://www.rapid
.com/products/insightvm/

With Rapid7's vulnerability management tool you will be able to understand and prioritize risk with clarity. Learn more about InsightVM and start a free trial today.

2.
Vulnerability Management Tool - VMDR | Qualys
https://www.qualy
.com/apps/vulnerability-management-detection-response/

Discover Qualys VMDR, the powerful, cloud-based, vulnerability management software redefining cyber risk management. Try it today!

3.
Phoenix Security - FIX Vulnerability with context from appsec to cloud security
https://phoeni
.security/

Phoenix Security Cloud Platform (former Phoenix Security) removes the friction between executives, security and developers using SMART Risk-Based exposure and vulnerability management for software, infrastructure and cloud vulnerabilities. Run your DevSecOps vulnerability management and AppSec program using the Phoenix Cybersecurity framework methodology. Risk-based and metric-based vulnerability management.

4.
Application Vulnerability Management - ASOC | Ivanti
https://www.ivant
.com/products/ivanti-neurons-for-asoc/

Take a risk-based approach to application vulnerability management with Ivanti Neurons for Application Security Orchestration and Correlation (ASOC).

5.
Fortra Vulnerability Management | Digital Defense
https://www.digitaldefens
.com/products/fortra-vulnerability-management/

Fortra Vulnerabilty Management (formerly Frontline VM™) lets companies leverage a full suite of vulnerability assessment applications with our SaaS platform. ✔Get a quote today!

6.
Tenable Vulnerability Management | Tenable®
https://www.tenabl
.com/products/vulnerability-management/

Upgrade your VM strategy with Tenable Vulnerability Management. Try it for free here to find out why Tenable is different from other tools in the market!

7.
Tenable One - The Trusted Exposure Management Platform | Tenable®
https://www.tenabl
.com/products/tenable-one/

Optimize business performance by gaining visibility and preventing likely attacks with Tenable One. Click here to protect your attack surface with Tenable One.

8.
PCI Compliance Solution | Qualys, Inc.
https://www.qualy
.com/solutions/pci-compliance/

Discover our complete, efficient, integrated PCI compliance solution that delivers one holistic view of your IT assets and PCI compliance posture.

9.
Tenable Security Center | Tenable®
https://www.tenabl
.com/products/security-center/

Understand your risk and know which vulnerabilities and assets to prioritize first with Tenable Security Center. Prioritize and investigate vulnerabilities with Tenable Security Center.

10.
Syxsense - Automated Endpoint & Vulnerability Management
https://www.syxsens
.com/

Revolutionize your endpoint and vulnerability management with Syxsense. Get real-time visibility & control over all your endpoints.

12.
Cisco Next-Generation Intrusion Prevention System (NGIPS) - Cisco
https://www.cisc
.com/c/en_ca/products/security/ngips/index.html/

Cisco Secure IPS (NGIPS) provides contextual awareness, security intelligence, and advanced threat protection against attacks and malware.

13.
Qualys CSPM: A TotalCloud™ 2.0 Cloud Security Tool | Qualys
https://www.qualy
.com/apps/cloud-security-posture-management/

Discover how the Qualys Cloud Security Posture Management (CSPM) tool enables you to continuously discover, monitor, and analyze your cloud assets.

14.
Outpacing Threats | CrowdStrike Falcon® Exposure Management
https://www.crowdstrik
.com/platform/falcon-exposure-management/

Gain full attack surface visibility, assess and prioritize exposures, and automate responses to outpace adversaries with CrowdStrike Falcon® Exposure Management.

15.
Centraleyezer - Enterprise Risk Management
https://centraleyeze
.io/

Centraleyezer - Vulnerability Management Platform, Report, Prioritize, and follow-up on Vulnerabilities

16.
Brinqa | Cybersecurity Risk Management and Remediation | Trusted by Industry Experts
https://www.brinq
.com/

Easily manage assets and their vulnerabilities across your security tools, programs and attack surface with the Brinqa platform.

17.
Intruder | Vulnerability Management Made Easy
https://intrude
.io/

Secure your attack surface with automated vulnerability scanning, continuous network monitoring, and proactive threat response in one platform. Try for free.

18.
Microsoft Defender Vulnerability Management | Microsoft Security
https://www.microsof
.com/en-us/security/business/threat-protection/microsoft-defender-vulnerability-management/

Microsoft Defender Vulnerability Management delivers asset visibility, risk-based prioritization, and remediation tools to help your teams address critical vulnerabilities.

19.
Security Operations (SecOps) - Enterprise Security - ServiceNow
https://www.serviceno
.com/products/security-operations.html/

ServiceNow Security Operations (SecOps) connects your existing security tools to prioritize and respond to vulnerabilities and security incidents faster.

20.
Cisco Secure Workload, Formerly Tetration - Cisco
https://www.cisc
.com/c/en_sg/products/security/tetration/index.html/

Secure your workload anywhere with Cisco Secure Workload (Tetration). Automate micro-segmentation, simplify security for SDN and migration to cloud.

21.
Cisco Defense Orchestrator - Cisco
https://www.cisc
.com/site/us/en/products/security/defense-orchestrator/index.html/

Cisco Defense Orchestrator is a cloud-based security policy manager that simplifies and unifies policy across your Cisco firewalls and IOS devices.

22.
Cisco Security Manager - Cisco
https://www.cisc
.com/c/en/us/products/security/security-manager/index.html/

Cisco Security Manager is an enterprise solution that helps organizations scale efficiently and manage a wide range of Cisco security devices.

23.
Cisco Secure Network Analytics - Cisco
https://www.cisc
.com/site/us/en/products/security/security-analytics/secure-network-analytics/index.html/

Cisco Secure Network Analytics provides pervasive network visibility and security analytics for advanced protection across the extended network and cloud.

24.
Nessus Vulnerability Scanner: Network Security Solution | Tenable®
https://www.tenabl
.com/products/nessus/

Find out more about Nessus - the trusted gold standard for vulnerability assessment, designed for modern attack surfaces - used by thousands of organizations.

25.
Continuous Exposure Management | XM Cyber
https://xmcybe
.com/

Illuminate and disrupt the attack paths leading to your critical assets, in the cloud or on-premises.

26.
ExtraHop: Cloud-Native Network Detection and Response
https://www.extraho
.com/

ExtraHop provides cloud-native cybersecurity solutions to help enterprises detect and respond to advanced threats—before they compromise your business.

28.
Xygeni Security | Secure your Software Development and Delivery
https://xygen
.io/

Xygeni, Secure your Software Development and Delivery. Enhance your ASPM through comprehensive risk assessment, strategic prioritization...

29.
Third-Party Risk and Attack Surface Management Software | UpGuard
https://www.upguar
.com/

Third-party risk and attack surface management software. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

30.
Cisco Security Products and Solutions - Cisco
https://www.cisc
.com/site/us/en/products/security/index.html/

Security solutions for networking, data center, cloud, and collaboration, powered by a unified platform with easy integration for third-party apps and solutions.

31.
Cisco Identity Services Engine (ISE) - Cisco
https://www.cisc
.com/c/en_sg/products/security/identity-services-engine/index.html/

ISE gives you a next-generation NAC solution that offers guest access, profiling, and BYOD. They are enforced by role-based software-defined segmentation.

32.
Automated Web Apps & API Security Platform for Agile Teams
https://www.secureblin
.com/

Secure Blink ThreatSpy: AI-powered platform for web app & API security. Detect, prioritize, & remediate vulnerabilities with developer-first approach. Build secure applications with our developer-first approach.

34.
Cloud Security | Tenable® | Tenable®
https://www.tenabl
.com/cloud-security/

Cloud security at Tenable starts with a unified CNAPP powerful enough to manage posture, secure workloads, govern identity & access management, and much more.

35.
Endpoint Detection & Response Tools | Qualys
https://www.qualy
.com/apps/endpoint-detection-response/

Get the Qualys EDR tool - our dynamic endpoint detection and response software powered by the Enterprise TruRisk Platform. Try it today!

37.
Cisco FindIT Network Management - Cisco
https://www.cisc
.com/c/en/us/products/cloud-systems-management/findit-network-management/index.html/

Cisco FindIT Network Manager is a network management tool for deploying and maintaining Cisco 100 to 500 Series switches, routers, and wireless access points.

38.
Secure and Compliant Workloads Anywhere
https://www.runecas
.com/

Identify, manage, and remediate vulnerabilities and misconfigurations on-prem, in your cloud or containerized infrastructure in a unified view

39.
Attack Surface Management | Censys
https://censy
.com/attack-surface-management/

Attack Surface Management solutions from Censys. Attack Surface Management is the monitoring of sensitive external assets.

40.
Sophos Cloud Optix: Cloud Security Posture Management
https://www.sopho
.com/en-us/products/cloud-optix/

Cloud Optix CSPM to Optimize Cloud Costs and Improve Security. Automated Workload Discovery, Visualization and Guided Remediation. Try Cloud Optix Free.

41.
Qualys Web Application Scanning | Qualys
https://www.qualy
.com/apps/web-app-scanning/

Discover Qualys Web Application Scanning, our cloud solution for continuous web app discovery and detection of vulnerabilities. Try it today!

42.
ThreatX Managed API and Application Security - Edge to Runtime
https://www.threat
.com/

Transform your approach to API and AppSec with a single platform approach to detect and remediate vulnerabilities, while protecting vulnerable APIs and web apps.

43.
Network detection and response (NDR) solutions - IBM Security
https://www.ib
.com/products/qradar-siem/ndr/

Catch hidden threats on your networks before it's too late with network visibility and advanced analytics from IBM QRadar NDR

44.
Astra Security - Continuous Pentest Platform
https://www.getastr
.com/

Astra Security is a one of a kind continuous Pentest Platform that makes chaotic pentests a breeze & continuous with its hacker-style vulnerability scanner.

45.
Cisco Talos—Threat Intelligence Research Team - Cisco
https://www.cisc
.com/site/us/en/products/security/talos/index.html/

Cisco Talos, a proven threat intelligence team of researchers, analysts, and incident responders, provides leading security research and response globally.

46.
Cisco Nexus Dashboard – Cloud Network Dashboard - Cisco
https://www.cisc
.com/site/us/en/products/networking/cloud-networking/nexus-platform/index.html/

Automate the provisioning of your data center network infrastructure with Cisco Nexus Dashboard, our operations and automation networking platform.

47.
Qualys Web Application Firewall | Qualys
https://www.qualy
.com/apps/web-app-firewall/

Discover Qualys Web Application Firewall, our web app firewall cloud service for scalable, simple, and powerful protection of web applications. Try it today!

48.
Cisco Catalyst SD-WAN Manager (formerly vManage) - Cisco
https://www.cisc
.com/site/us/en/products/networking/wan/vmanage/index.html/

Cisco Catalyst SD-WAN Manager (formerly vManage) is a highly customizable dashboard that simplifies and automates the deployment, configuration, management, and operation for Cisco SD-WAN.

49.
Invicti (formerly Netsparker) | Web Application and API Security for Enterprise
https://www.invict
.com/

Get accurate, automated application security testing that scales like no other solution. Secure 1000s of web assets with less manual effort. Reduce your risk with the only…

50.
IBM QRadar SIEM
https://www.ib
.com/products/qradar-siem/

Learn about intelligent security information and event management (SIEM) with IBM QRadar SIEM for actionable insight into your most critical threats.

51.
Enhance Security with OSSIM | LevelBlue
https://cybersecurity.at
.com/products/ossim/

Elevate your security game with OSSIM. The open-source platform that optimizes threat detection, incident response, & compliance management.

52.
Cisco ASA 5500-X Series Firewalls - Cisco
https://www.cisc
.com/c/en_ca/products/security/asa-5500-series-next-generation-firewalls/index.html/

Cisco ASA 5500 Series Next-Generation Firewalls scale to meet a wide range of needs while providing highly secure, high-performance connectivity.

53.
Acunetix | Web Application Security Scanner
https://www.acuneti
.com/

Acunetix is an end-to-end web security scanner that offers a 360 view of an organization’s security. Allowing you to take control of the security of all you web applications, web services, and APIs to ensure long-term protection. Acunetix’s scanning engine is globally known and trusted for its unbeatable speed and precision.

54.
Network Threat Detection & Cyber Security | NetWitness
https://www.netwitnes
.com/

Professional network threat detection & cyber security monitoring services are offered by NetWitness. Accelerate threat detection and cyber attack response for your organization's SOC with unparalleled visibility, analytics and automation. Contact us today!

55.
InsightAppSec Web Application Security Product - Rapid7
https://www.rapid
.com/products/insightappsec/

Rapid7's web application security testing tool offers cloud-native application security analysis. Automatically crawl and assess web applications to identify vulnerabilities like SQL Injection, XSS, and CSRF.

56.
Home | SecOps® Solution
https://secopsolutio
.com/

Award-winning agent-less Full-stack Vulnerability and Patch Management Platform which Identify, prioritize, and remediates security vulnerabilities in seconds.

57.
Halo Security | Security testing for the modern attack surface.
https://www.halosecurit
.com/

Discover the risks across your attack surface with Halo Security's complete attack surface management platform.

58.
MDR | Cybereason Services
https://www.cybereaso
.com/services/managed-detection-response-mdr/

Cybereason Managed Detection and Response (MDR) enhances security operations and maximizes prevention, detection and response capabilities to uncover the most sophisticated and pervasive threats.

59.
Adlumin Cybersecurity | XDR, MDR, SIEM
https://adlumi
.com/

Elevate your security with Adlumin XDR and MDR. Get continuous threat detection, incident response, and proactive threat hunting, all with full transparency.

60.
DefectDojo | CI/CD and DevSecOps Automation
https://www.defectdoj
.org/

DefectDojo is an open-source application vulnerability management correlation and security orchestration tool. Scale security by creating an AppSecPipeline with DefectDojo.

61.
CYRISMA - An All-in-One Cyber Risk Management Platform
https://www.cyrism
.com/

Discover, Understand, Mitigate and Manage your Cyber Risk with CYRISMA - a Comprehensive SaaS Platform for Cost-Effective Cyber Risk Management

62.
Network Penetration Testing Platform | vPenTest
https://www.vonah
.io/services/network-penetration-testing/

vPenTest is an automated network penetration testing platform that makes pentesting scalable, accurate, faster, consistent, and not prone to human error.

63.
Cisco Catalyst Center 2.3.7 Data Sheet - Cisco
https://www.cisc
.com/c/en/us/products/collateral/cloud-systems-management/dna-center/nb-06-dna-center-data-sheet-cte-en.html/

Describes the Catalyst Center platform, a powerful network controller and management dashboard. Includes overview, licensing, automation and assurance features, SD-Access features and scale, system and platform capabilities, Meraki integration, and appliance scale and specifications.

64.
Runtime-Driven. Open-source First. Cloud Security | ARMO
https://www.armose
.io/

Continuously minimize cloud attack surface based on runtime insights, while actively adapting runtime security with real risk context.

65.
Tripwire Solutions | Tripwire
https://www.tripwir
.com/products/tripwire-enterprise/

Tripwire Enterprise helps accurately identify security misconfigurations and indicators of compromise to reduce your attack surface.

66.
HCL AppScan: Advanced Application Security Testing
https://www.hcl-softwar
.com/appscan/

Enhance security with HCL AppScan's Application Security Testing suite. Find vulnerabilities, automate workflows and protect your software.

68.
69.
Mend.io (formerly WhiteSource) - Start Managing Application Risk
https://www.men
.io/

Mend.io gives you all the tools you need to build a mature, proactive AppSec program that effectively manages application risk.

70.
Network Security Monitoring | LevelBlue
https://cybersecurity.at
.com/solutions/network-security-monitoring/

Stay vigilant with LevelBlue's Network Security Monitoring. Real-time insights and proactive defense against threats targeting your network.

71.
Heimdal® - One Platform. Total Cyber Security.
https://heimdalsecurit
.com/

From endpoints and networks to emails, identities, and beyond, Heimdal has you covered with advanced detection and response capabilities.

73.
Complete External Attack Surface Management | Detectify
https://detectif
.com/

Use Detectify to get complete coverage of your growing attack surface with Surface Monitoring and Application Scanning.

75.
Red Canary: Find and stop cyber threats anywhere
http://redcanar
.com/

Get actionable threat intelligence across cloud, identity, and endpoint. Anywhere you run your business, we got you.

76.
Network Detection and Response (NDR) | Verizon
https://www.verizo
.com/business/products/security/threat-detection/network-detection-response/

With Verizon's Network Detection & Response (NDR), gain advanced threat intelligence and expert support to protect your business from suspicious activities and cyber attacks.

77.
Cyber Security Experts & Solution Providers USA | Top Cybersecurity Specialists Companies New York, Boston, Massachusetts, USA, India, South Korea, Japan, United Kingdom, Dubai, Sri Lanka, Bangladesh, Turkey, Germany, South Africa & Hong Kong
https://www.seceo
.com/

Top Cyber Security Company USA - Seceon is a comprehensive top cybersecurity Specialists Companies provides Online managed IT security services in New York, Boston, Massachusetts, USA, India, South Korea, Japan, United Kingdom, Dubai, Sri Lanka, Bangladesh, Turkey, Germany and South Africa & Hong Kong.

78.
SOOS Application Security Posture Management
https://soo
.io/

SOOS Application Security Platform. Find & Fix vulnerabilities with SCA, DAST, Containers, SAST & manage SBOMs across your SDLC Lifecycle.

79.
Penetration Testing | Securin
https://www.securi
.io/penetration-testing/

Our penetration testing simulates a real-world attack on your digital assets to determine the strength of your security & defenses.

80.
Security Command Center | Google Cloud
https://cloud.googl
.com/security/products/security-command-center/

Multi-cloud CNAPP cloud security and risk management solution to protect Google Cloud, AWS, and Azure cloud environments, powered by Mandiant threat intel and Gemini AI.

81.
JupiterOne: Cyber asset analysis for total enterprise visibility
https://jupiteron
.io/

JupiterOne is a cyber asset analysis platform for cybersecurity designed to continuously collect, connect, and analyze asset data so security teams can see and secure their entire attack surface through a single platform.

83.
Cisco Identity Services Engine (ISE) - Cisco
https://www.cisc
.com/site/us/en/products/security/identity-services-engine/index.html/

ISE is a next-generation NAC solution used to manage endpoint, user, and device access to network resources within a zero-trust architecture.

84.
Cyber Risk Analytics Management Platform - QOMPLX
https://www.qompl
.com/os/

QOMPLX enables customers to analyze, model, manage, and transfer complex cyber risks. Learn how to identify attackers before they have a chance to do harm.

85.
ESET PROTECT Platform | ESET
https://www.ese
.com/me/business/protect-platform/

The world’s most formidable cybersecurity based on superior research that’s easy to use. A unique balance of prevention, detection and response.

86.
Cisco AnyConnect Secure Mobility Client - Cisco
https://www.cisc
.com/c/en_sg/products/security/anyconnect-secure-mobility-client/index.html/

Get much more than industry-leading VPN client connectivity. Cisco AnyConnect protects your enterprise resources through a single agent. See how.

87.
Forward Networks | Best-in-Class Network Digital Twin Software
https://www.forwardnetwork
.com/

Forward Networks' flagship software, Forward Enterprise, delivers the best digital twin technology to the world's largest networks. Multi-vendor fully-scalable

88.
Stop Advanced Cyberattacks with Vectra AI
https://www.vectr
.ai/

Vectra AI's Threat Detection and Response Platform protects your business by detecting cyberattacks in real time and responding instantly.

89.
Cisco Duo - Cisco
https://www.cisc
.com/c/en/us/products/security/duo/index.html/

Cisco Duo is a user-centric zero-trust security platform with two-factor authentication to protect access to sensitive data for all users, devices, and applications.

90.
Singularity XDR | SentinelOne
https://www.sentinelon
.com/platform/singularity-xdr-protection/

Turn to SentinelOne for holistic security data insights. Singularity XDR Protection ensures data integrity and proactive threat management. Try it now!

91.
Observability Platform | Cloud Monitoring | Free Trial | AppDynamics
https://www.appdynamic
.com/

Shape the future of apps with AppDynamics cloud monitoring and Cisco Secure Application. Start your 15-day free trial today

92.
The Security Validation Platform
https://www.picussecurit
.com/

Prioritize critical issues across siloed data sources, validate exposures in real-time, and deploy one-click mitigations to close gaps fast.

93.
FOSSA: Comprehensive Open Source Security and SBOM Management
https://foss
.com/

Stop open source vulnerabilities, automate compliance, and mitigate third-party risk in your applications.

94.
Cortex XDR- Extended Detection and Response - Palo Alto Networks
https://www.paloaltonetwork
.com/cortex/cortex-xdr/

Cortex XDR is the industry’s only detection and response platform that runs on fully integrated endpoint, network and cloud data. Explore Use Cases for Cortex XDR 3.0.

95.
Internet of Things (IoT) Control Center - Cisco
https://www.cisc
.com/c/en/us/solutions/internet-of-things/iot-control-center.html/

Cisco IoT Control Center is a comprehensive solution empowering businesses to manage and monetize their Internet of Things (IoT) devices efficiently.

97.
Cymulate - Exposure Management & Security Validation Platform
https://cymulat
.com/

Challenge, assess, and optimize your enterprise's cybersecurity posture with the number one Exposure Management & Security Validation platform.

98.
IBM Guardium Vulnerability Assessment
https://www.ib
.com/products/ibm-guardium-vulnerability-assessment/

IBM Guardium Vulnerability Assessment scans your data environment to detect vulnerabilities and suggest remedial actions.

99.
Security X-Force | IBM
https://www.ib
.com/x-force/

IBM X-Force provides deep security research expertise and global threat intelligence for enhanced security solutions.