---
description: Page 6 - Compare the top Vulnerability Management Software software and providers on Capterra Israel. Our free interactive tool makes software selection fast and easy. Filter by price, feature or user rating.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 6 - Vulnerability Management Software - Compare Prices & Top Sellers - Capterra Israel 2026
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](https://www.capterra.co.il/directory/31062/vulnerability-management/software) > [Page 6](https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6)

# Vulnerability Management Software

Canonical: https://www.capterra.co.il/directory/31062/vulnerability-management/software

Page: 6 / 10\
Prev: [Previous page](https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=5)\
Next: [Next page](https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=7)

> Vulnerability Management software helps to predict, identify, and fix potential corporate cybersecurity breaches.

-----

## Products

1. [Cobalt](https://www.capterra.co.il/software/209997/cobalt) — 4.5/5 (2 reviews) — Intelligent hacker-like testing built into your development cycle
2. [Pentest-Tools.com](https://www.capterra.co.il/software/211194/pentest-tools-com) — 4.5/5 (2 reviews) — From scan to proof, Pentest-Tools.com gives security teams the speed, accuracy, and coverage to deliver results that matter.
3. [CySight](https://www.capterra.co.il/software/211715/netflow-auditor) — 4.5/5 (2 reviews) — Helps monitor and analyze networks. Advanced Dropless Collection capabilities. Predictive AI baselining and Machine Learning algorithms
4. [Debricked](https://www.capterra.co.il/software/216435/debricked) — 4.5/5 (2 reviews) — Research based SaaS-service that helps companies of all sizes manage risks when using open source in commercial product development.
5. [Tenable Cloud Security](https://www.capterra.co.il/software/220034/ermetic) — 5.0/5 (2 reviews) — Tenable Cloud Security's holistic platform reveals, prioritizes and immediately remediates security gaps in cloud infrastructure
6. [DeepSurface](https://www.capterra.co.il/software/1025270/deepsurface) — 4.5/5 (2 reviews) — Automates vulnerability analysis and uses context-based prioritization to reduce cyber risk, time, and money spent.
7. [OpenText Application Security Aviator](https://www.capterra.co.il/software/1036935/fortify) — 5.0/5 (2 reviews) — Fortify is an application security platform that protects applications from breaches, malware, and malicious insiders.
8. [Netwrix Change Tracker](https://www.capterra.co.il/software/118082/nnt-change-tracker-enterprise) — 3.0/5 (1 reviews) — Security configuration management and change control software that helps you secure critical IT systems and prove compliance
9. [RedSeal Network Advisor](https://www.capterra.co.il/software/119862/redseal-network-advisor) — 4.0/5 (1 reviews) — Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.
10. [ImmuniWeb](https://www.capterra.co.il/software/145360/immuniweb) — 5.0/5 (1 reviews) — ImmuniWeb® leverages Machine Learning and Artificial Intelligence for intelligent automation and acceleration of app security testing.
11. [Fidelis Elevate](https://www.capterra.co.il/software/168954/fidelis-elevate) — 5.0/5 (1 reviews) — Comprehensive vulnerability management for organizations to prioritize and remediate security vulnerabilities effectively.
12. [Vulnerability Intelligence](https://www.capterra.co.il/software/173345/saas-vulnerability-scanner) — 5.0/5 (1 reviews) — Vulnerability Intelligence by CyberSecurity Help provides actionable intelligence on software vulnerabilities to enhance security.
13. [Zeguro](https://www.capterra.co.il/software/180867/zeguro) — 5.0/5 (1 reviews) — Zeguro Cyber Safety: employee security training, customizable pre-built security policies, \&amp; web app monitoring in one easy solution.
14. [Morphisec Guard](https://www.capterra.co.il/software/191197/morphisec) — 5.0/5 (1 reviews) — Morphisec provides prevention-first security to prevent the most advanced threats and close security gaps.
15. [Cyber Hawk](https://www.capterra.co.il/software/194231/cyber-hawk) — 4.0/5 (1 reviews) — Cyber Hawk detects insider cybersecurity threats and generates alerts of suspicious network changes and anomalous end-user behaviors.
16. [Sonrai Public Cloud Security Platform](https://www.capterra.co.il/software/198150/sonrai-public-cloud-security-platform) — 5.0/5 (1 reviews) — Sonrai Security empowers organizations to take total control of privileges in their cloud.
17. [Autobahn Fit](https://www.capterra.co.il/software/200336/autobahnfit) — 5.0/5 (1 reviews) — Highly automated vulnerability management solution drawing on years of consulting, suitable for any IT footprint from SME to Enterprise
18. [CybrHawk SIEM XDR](https://www.capterra.co.il/software/204613/siem-ztr) — 5.0/5 (1 reviews) — CybrHawk: Unmatched visibility against evolving cyber threats. Trust our advanced Open XDR SIEM platform for securing your business.
19. [ShadowKat](https://www.capterra.co.il/software/206500/the-reconcilor) — 5.0/5 (1 reviews) — ShadowKat is a cloud-based platform designed to manage an organization’s internet facing attack surface.
20. [Synack Platform](https://www.capterra.co.il/software/210933/synack-platform) — 3.0/5 (1 reviews) — It is a vulnerability management solution that helps businesses conduct security testing, receive vulnerability reports, and more.
21. [CloudJacket MXDR](https://www.capterra.co.il/software/212808/cloudjacketx) — 5.0/5 (1 reviews) — High-fidelity security where agentic AI handles the volume and human analysts validate every real threat.
22. [Extended Threat Intelligence](https://www.capterra.co.il/software/214273/socradar) — 5.0/5 (1 reviews) — Extended Threat Intelligence delivers extended threat intelligence, digital risk protection \&amp; external attack surface management.
23. [Carbon Black Cloud Workload](https://www.capterra.co.il/software/215391/carbon-black-cloud-workload) — 5.0/5 (1 reviews) — Carbon Black Workload Cloud is a solution designed to protect cloud and on-premises workloads with advanced threat protection.
24. [SecOps Solution](https://www.capterra.co.il/software/1014060/secops) — 5.0/5 (1 reviews) — SecOps Solution is a full-stack vulnerability and patch management platform.
25. [NuDetect](https://www.capterra.co.il/software/1016112/nudetect) — 5.0/5 (1 reviews) — Cloud-based tool that helps businesses monitor the behavior of website visitors and prevent potential threats.

-----

Page: 6 / 10\
Prev: [Previous page](https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=5)\
Next: [Next page](https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=7)

## Related Categories

- [Cloud Security Software](https://www.capterra.co.il/directory/31344/cloud-security/software)
- [Computer Security Software](https://www.capterra.co.il/directory/10005/computer-security/software)
- [Endpoint Protection Software](https://www.capterra.co.il/directory/30907/endpoint-protection/software)
- [Network Security Software](https://www.capterra.co.il/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.co.il/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.co.il/directory/31062/vulnerability-management/software)
- [All Categories](https://www.capterra.co.il/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Capterra Israel helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.co.il","url":"https://www.capterra.co.il/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.il/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":null,"url":"https://www.capterra.co.il/","@id":"https://www.capterra.co.il/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.il/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.il/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Management Software","description":"Page 6 - Compare the top Vulnerability Management Software software and providers on Capterra Israel. Our free interactive tool makes software selection fast and easy. Filter by price, feature or user rating.","url":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6","about":{"@id":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6#breadcrumblist"},"@id":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.capterra.co.il/#website"},"inLanguage":"en-IL","mainEntity":{"@id":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6#itemlist"},"publisher":{"@id":"https://www.capterra.co.il/#organization"}},{"@id":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"https://www.capterra.co.il/directory/31062/vulnerability-management/software","@type":"ListItem"},{"name":"Page 6","position":3,"item":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 6 - Vulnerability Management Software - Compare Prices &amp; Top Sellers - Capterra Israel 2026","@context":"https://schema.org","@id":"https://www.capterra.co.il/directory/31062/vulnerability-management/software?page=6#itemlist","@type":"ItemList","itemListElement":[{"name":"Cobalt","position":1,"description":"Pentest as a Service (PtaaS) platform that simplifies security and compliance needs of DevOps-driven teams with workflow integrations and high-quality talent on-demand.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2f3c0f3f-e6a9-4d48-a43d-8e964b9392d4.png","url":"https://www.capterra.co.il/software/209997/cobalt","@type":"ListItem"},{"name":"Pentest-Tools.com","position":2,"description":"Pentest-Tools.com helps security professionals find, validate, and communicate vulnerabilities faster and with greater confidence - whether they’re internal teams defending at scale, MSPs juggling clients, or consultants under pressure.\n\nWith comprehensive coverage across network, web, API, and cloud assets, and built-in exploit validation, it turns every scan into credible, actionable insight.\n\nTrusted by over 2,000 teams in 119 countries and used in more than 6 million scans annually, it delivers speed, clarity, and control - without bloated stacks or rigid workflows.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2bc70b88-f8bd-4078-9ac5-6b4715a624a0.png","url":"https://www.capterra.co.il/software/211194/pentest-tools-com","@type":"ListItem"},{"name":"CySight","position":3,"description":"A complete and Advanced Network Monitoring solution.\nCySight is an integrated cyber network intelligence solution delivering scalable, granular on-demand and actionable intelligence about everything traversing your network. Global threat intelligence big-data coupled with machine learning, anomaly detection and automated diagnostics leverages the benefit of economical flow-based analytics substantially reducing the cost of securing and managing a network.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e278f1b7-8a57-4247-b231-cc525db4cca1.png","url":"https://www.capterra.co.il/software/211715/netflow-auditor","@type":"ListItem"},{"name":"Debricked","position":4,"description":"Debricked's tool enables for increased use of Open Source while keeping the risks at bay, making it possible to keep a high development speed while still staying secure. The service runs on state of the art machine learning, allowing the data quality to be outstanding as well as instantly updated. \n\nHigh precision (over 90% in supported languages) in combination with flawless UX and scalable automation features makes Debricked one of a kind and the way to go for Open Source Management.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0bf8ce7f-605c-41ca-b9eb-f43c1c76eaa1.png","url":"https://www.capterra.co.il/software/216435/debricked","@type":"ListItem"},{"name":"Tenable Cloud Security","position":5,"description":"Tenable's holistic cloud infrastructure security platform reveals and prioritizes security gaps in AWS, Azure and GCP, and enables you to remediate immediately. From full asset discovery and deep risk analysis to runtime threat detection and compliance, Tenable automates complex cloud security operations through meaningful visualization and step-by-step guidance. Using an identity-first approach, Tenable dramatically reduces your cloud attack surface and enforces least privilege at scale.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/2e562991-296b-443d-90fb-c55505ff8d97.jpeg","url":"https://www.capterra.co.il/software/220034/ermetic","@type":"ListItem"},{"name":"DeepSurface","position":6,"description":"DeepSurface is a software platform that gives CISOs, security analysts, and IT teams unparalleled visibility and insights in order to reduce the risk of a cyber attack. By automatically collecting key contextual data about a customer’s unique network and system topology, DeepSurface computes and shows which vulnerabilities pose the greatest risk. By utilizing DeepSurface’s proprietary threat model, customers prioritize the long list of vulnerabilities based on actual risk, not a CVSS score.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/c3120285-8e70-4508-8718-da24e7ce7329.jpeg","url":"https://www.capterra.co.il/software/1025270/deepsurface","@type":"ListItem"},{"name":"OpenText Application Security Aviator","position":7,"description":"Fortify provides a suite of application security solutions that help organizations analyze their open source code, detect vulnerabilities earlier in their development lifecycle, protect against advanced threats and safeguard their data. Fortify delivers extra layers of protection for the most vulnerable application attack surfaces—servers, web applications and data sources like databases, message queues and big data stores.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8e69a1f6-e956-4f36-8cfa-a48818fd3fd6.jpeg","url":"https://www.capterra.co.il/software/1036935/fortify","@type":"ListItem"},{"name":"Netwrix Change Tracker","position":8,"description":"As industry regulations expand in scope and complexity, organizations need solutions that simplify the process of securing, monitoring and validating the configuration of critical systems. A strong compliance posture starts with secure systems configurations coupled with intuitive detection of unauthorized changes. With Netwrix Change Tracker, you can significantly reduce your organizations attack surface, detect & remediate breaches and pass compliance audits more easily.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/e5d8ddcb-7996-4a4c-8cc5-4ac093ba423d.png","url":"https://www.capterra.co.il/software/118082/nnt-change-tracker-enterprise","@type":"ListItem"},{"name":"RedSeal Network Advisor","position":9,"description":"Software to continuously verify networks' security with a visual interface to ensure control policies, analyze access, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/af77400f-1523-42f9-b865-b6e18d3adec2.png","url":"https://www.capterra.co.il/software/119862/redseal-network-advisor","@type":"ListItem"},{"name":"ImmuniWeb","position":10,"description":"ImmuniWeb Application Security Testing platform facilitates DevSecOps and helps our customers monitor, detect, mitigate and prevent application security risks in the most reliable and cost-efficient way. ImmuniWeb provides flexible one time and continuous subscription for DAST, SAST, IAST and SCA for web internal and external applications.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/638363dd-23b5-4a6d-b546-9af3bbaa27bb.png","url":"https://www.capterra.co.il/software/145360/immuniweb","@type":"ListItem"},{"name":"Fidelis Elevate","position":11,"description":"Fidelis Elevate is the only XDR Solution that delivers endpoint security, Network Security, Deception & active Directory protection in a single platform, making it the powerhouse of a cyber-resilient environment. \n\nFidelis Elevate facilitates effective vulnerability management by providing actionable insights into security vulnerabilities and guiding organizations in prioritizing and addressing them. By integrating vulnerability management into a centralized platform, Fidelis Elevate streamlines the vulnerability management process, enhances collaboration between security teams, and accelerates remediation efforts. With Fidelis Elevate, organizations can proactively manage vulnerabilities, reduce their exposure to cyber threats, and maintain a strong security posture.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7cb9365f-59d8-485d-8469-660915078e60.png","url":"https://www.capterra.co.il/software/168954/fidelis-elevate","@type":"ListItem"},{"name":"Vulnerability Intelligence","position":12,"description":"Vulnerability Intelligence by CyberSecurity Help is vulnerability intelligence software that monitors software vendors to provide actionable vulnerability intelligence through data feeds and reports. The software tracks vulnerabilities by severity and patch availability, with details on information disclosure, authentication bypass, improper access control, and denial of service vulnerabilities.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/4c9b0300-df3f-4a70-a29d-4b64a3ce3635.png","url":"https://www.capterra.co.il/software/173345/saas-vulnerability-scanner","@type":"ListItem"},{"name":"Zeguro","position":13,"description":"Zeguro offers cyber insurance and an easy-to-use cyber risk management solution, Cyber Safety. Designed for small to midsize businesses, Cyber Safety includes: cybersecurity training to improve employee security awareness, customizable pre-built security policy templates for regulatory compliance, and automated web app scanning to monitor for and mitigate vulnerabilities. Cyber Safety users can also enjoy potential savings in their cyber insurance.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3f9d0b4e-27a9-4247-b55b-8d1f17af1262.png","url":"https://www.capterra.co.il/software/180867/zeguro","@type":"ListItem"},{"name":"Morphisec Guard","position":14,"description":"Morphisec provides prevention-first security against the most advanced threats to stop the attacks that others don’t, from endpoint to the cloud. Morphisec's software is powered by Automated Moving Target Defense (AMTD) technology, the next evolution of cybersecurity. AMTD stops ransomware, supply chain attacks, zero-days, and other advanced attacks. Over 7,000 organizations trust Morphisec to protect nine million Windows and Linux servers, workloads, and endpoints. Morphisec stops thousands of advanced attacks daily at Lenovo/Motorola, TruGreen, Covenant Health, Citizens Medical Center, and many more. Learn more at www.morphisec.com.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/87760b32-adef-438b-81fe-2988f382f232.png","url":"https://www.capterra.co.il/software/191197/morphisec","@type":"ListItem"},{"name":"Cyber Hawk","position":15,"description":"Cyber Hawk is a cybersecurity solution that detects insider cybersecurity threats and generates daily alerts of suspicious network changes and anomalous end-user behaviors, allowing you to create affordable, custom cybersecurity services.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/fa16fe8a-1bfc-42dd-9406-d55ba9a8f12a.png","url":"https://www.capterra.co.il/software/194231/cyber-hawk","@type":"ListItem"},{"name":"Sonrai Public Cloud Security Platform","position":16,"description":"Sonrai Security is a leading cloud privileged access management (PAM) solutions provider. With a mission to empower enterprises of all sizes to innovate securely and confidently, Sonrai Security delivers identity, access, and permissions security for companies running on AWS, Azure, and Google Cloud platforms. The company is renowned for pioneering the Cloud Permissions Firewall, enabling one-click least privilege while supporting developer access needs without disruption. \nTrusted by leading companies across various industries, Sonrai Security is committed to driving innovation and excellence in cloud security. Sonrai Security has offices in New York and New Brunswick, Canada and is backed by ISTARI, Menlo Ventures, Polaris Partners, and TenEleven Ventures.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/d11dd326-962f-47dc-a27d-fcaf0e89e864.png","url":"https://www.capterra.co.il/software/198150/sonrai-public-cloud-security-platform","@type":"ListItem"},{"name":"Autobahn Fit","position":17,"description":"Autobahn Fit is an innovative solution to measure and improve hacking resistance. Autobahn saves you time and increases your defenses.\n\nThe platform automates asset discovery, vulnerability scanning, and cyber benchmarking. Most importantly, it provides best-in-class remediation insights.\n\nAutobahn is used by companies globally from F500 to SME. We provide suitable packages for every size and security maturity level. Our customers value Autobahn's ease of use and comprehensive insights.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/081e666b-caaa-4aca-9dd6-f45d3bad5e71.png","url":"https://www.capterra.co.il/software/200336/autobahnfit","@type":"ListItem"},{"name":"CybrHawk SIEM XDR","position":18,"description":"Enterprises rely on CybrHawk as their trusted cybersecurity partner to uncover the unknown and reveal the truth. With our advanced Open XDR SIEM platform and comprehensive services, we provide unmatched visibility for sensitive data and critical systems. Trust CybrHawk to defend your business with confidence against evolving cyber threats. Discover the power of CybrHawk solutions and stay one step ahead in the dynamic digital landscape.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/74052533-80e7-420e-baf7-41358eb7a5a7.png","url":"https://www.capterra.co.il/software/204613/siem-ztr","@type":"ListItem"},{"name":"ShadowKat","position":19,"description":"ShadowKat is a cloud-based solution that helps reduce the risk of ShadowIT by providing a platform to help manage an organization’s internet facing attack surface.\n\nBenefits include:\nInternet facing asset management\nExpose cybersecurity risks\nFind problems before hackers do\nAutomation of the security testing process\nDetect changes as they occur","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/30b04813-70fc-499d-a848-9a0ef4189995.jpeg","url":"https://www.capterra.co.il/software/206500/the-reconcilor","@type":"ListItem"},{"name":"Synack Platform","position":20,"description":"It is a vulnerability management solution that helps businesses conduct security testing, receive vulnerability reports, and more.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/051f3211-6855-43c9-8e0e-cc173400a069.png","url":"https://www.capterra.co.il/software/210933/synack-platform","@type":"ListItem"},{"name":"CloudJacket MXDR","position":21,"description":"CloudJacket MXDR is a fully managed security platform that detects, investigates, and responds to threats across your entire environment. Real protection without the need to stitch together multiple tools, eliminating the burden of building or expanding an internal Security Operation Center. \n\nOur solution unifies EDR, ITDR, SIEM, and Cloud security into a single pane of glass, while our 24/7 U.S. based SOC does the work most “managed” providers leave to you. \n\nHigh-fidelity security where agentic AI handles the volume while human analysts validate every real threat. Our team proactively hunts for what automation misses and takes decisive action when it matters most. This approach enables rapid isolation of compromised systems, termination of malicious processes, and providing guided remediation with full incident context. \n\nWe operate as an extension of your team. One platform. One partner. Faster response times.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/3cf5efe1-be3b-4c48-96cf-3f3e2b05e99e.jpeg","url":"https://www.capterra.co.il/software/212808/cloudjacketx","@type":"ListItem"},{"name":"Extended Threat Intelligence","position":22,"description":"Extended Threat Intelligence is a threat intelligence software that monitors the web to identify cyber threats. It detects leaked data, phishing domains, breaches, and fraud to help organizations mitigate risks. The software provides cyber threat intelligence, digital risk protection, and external attack surface management. It scans the deep and dark web along with thousands of other sources. The software aims to deliver actionable intelligence organizations can use to enhance security.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/7c993300-b9ba-4ce1-a8bc-ccaaeaa969aa.jpeg","url":"https://www.capterra.co.il/software/214273/socradar","@type":"ListItem"},{"name":"Carbon Black Cloud Workload","position":23,"description":"Carbon Black Workload Cloud Workload Protection is a cloud-based workload security solution that helps organizations reduce the attack surface and protect critical assets across on-premises and cloud environments. The software provides advanced workload protection with capabilities like risk-prioritized vulnerability assessments, compliance reporting, next-gen antivirus, and full endpoint detection and response for workloads.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8bee8ab8-4b26-4ab4-ab63-3fd784fde924.png","url":"https://www.capterra.co.il/software/215391/carbon-black-cloud-workload","@type":"ListItem"},{"name":"SecOps Solution","position":24,"description":"SecOps Solution is a full-stack vulnerability and patch management platform. \n\nIt identifies the top 1% security risks that could have the maximum impact on the organisation, thereby saving millions of dollars and hundreds of hours of engineering effort in patchwork and remediation.\n\nIt is an AI-powered agentless platform with proprietary scanners built to identify and remediate misconfigurations in applications, infrastructure and the cloud.\n\nSecOps configures and starts protecting your assets - within seconds not days.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/df04569d-9e30-4d70-8661-d0e35521a54d.png","url":"https://www.capterra.co.il/software/1014060/secops","@type":"ListItem"},{"name":"NuDetect","position":25,"description":"Cloud-based tool that helps businesses monitor the behavior of website visitors and prevent potential threats.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/36094ffd-a0e5-46c7-a673-57d54a6fdb31.jpeg","url":"https://www.capterra.co.il/software/1016112/nudetect","@type":"ListItem"}],"numberOfItems":25}
</script>
