---
description: Page 5 - Compare the top Vulnerability Scanner Software software and providers on Capterra Israel. Our free interactive tool makes software selection fast and easy. Filter by price, feature or user rating.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/capterra/og_logo-e5a8c001ed0bd1bb922639230fcea71a.png?auto=format%2Cenhance%2Ccompress
title: Page 5 - Vulnerability Scanner Software - Compare Prices & Top Sellers - Capterra Israel 2026
---

Breadcrumb: [Home](/) > [Vulnerability Scanner Software](https://www.capterra.co.il/directory/32775/vulnerability-scanner/software) > [Page 5](https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5)

# Vulnerability Scanner Software

Canonical: https://www.capterra.co.il/directory/32775/vulnerability-scanner/software

Page: 5 / 5\
Prev: [Previous page](https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=4)

> A vulnerability scanner is a tool used to monitor applications, networks and environments for security flaws and vulnerabilities. Vulnerability scanners maintain a database of known vulnerabilities and conduct continuous scans to identify new ones. Vulnerability scanners typically produce reports on specific vulnerabilities, as well as provide prioritized remediation recommendations.

-----

## Products

1. [Solidcheck](https://www.capterra.co.il/software/1042370/solidcheck) (0 reviews) — Solidcheck is crypto compliance software offering automated scans, DARA scoring, and monitoring to help firms meet MiCA regulations.
2. [Vulnsy](https://www.capterra.co.il/software/1086663/Vulnsy) (0 reviews) — Vulnsy is vulnerability management software that helps security teams create, manage, and deliver reports with reusable findings.
3. [IONIX](https://www.capterra.co.il/software/1089174/IONIX) (0 reviews) — IONIX is attack surface management software that provides security teams with visibility, prioritization, and validation of threats.
4. [Securetom](https://www.capterra.co.il/software/1094509/Securetom) (0 reviews) — AI-based security scanner that helps businesses combine traditional web security analysis with AI-specific risk detection.
5. [CyberComplyAI](https://www.capterra.co.il/software/1094669/CyberComplyAI) (0 reviews) — CyberComplyAI scans attack surfaces to generate compliance evidence for ISO 27001, SOC2, NIS2, and Cyber Essentials.
6. [Am I Being Pwned](https://www.capterra.co.il/software/1094997/Am-I-Being-Pwned) (0 reviews) — Am I Being Pwned audits browser extensions to detect malicious behavior and vulnerabilities

-----

Page: 5 / 5\
Prev: [Previous page](https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=4)

## Related Categories

- [Computer Security Software](https://www.capterra.co.il/directory/10005/computer-security/software)
- [Cloud Security Software](https://www.capterra.co.il/directory/31344/cloud-security/software)
- [Vulnerability Management Software](https://www.capterra.co.il/directory/31062/vulnerability-management/software)
- [Network Security Software](https://www.capterra.co.il/directory/30003/network-security/software)
- [Risk Management Software](https://www.capterra.co.il/directory/30665/risk-management/software)

## Links

- [View on Capterra](https://www.capterra.co.il/directory/32775/vulnerability-scanner/software)
- [All Categories](https://www.capterra.co.il/directory)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":null,"address":{"@type":"PostalAddress","addressLocality":null,"addressRegion":null,"postalCode":null,"streetAddress":null},"description":"Capterra Israel helps millions of people find the best business software. With software reviews, ratings, infographics and a comprehensive list of business software.","email":"info@capterra.co.il","url":"https://www.capterra.co.il/","logo":"https://dm-localsites-assets-prod.imgix.net/images/capterra/logo-a9b3b18653bd44e574e5108c22ab4d3c.svg","@id":"https://www.capterra.co.il/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/capterra","https://www.facebook.com/Capterra/","https://www.linkedin.com/company/capterra","https://www.instagram.com/capterra/","https://www.youtube.com/user/CapterraTV"]},{"name":null,"url":"https://www.capterra.co.il/","@id":"https://www.capterra.co.il/#website","@type":"WebSite","publisher":{"@id":"https://www.capterra.co.il/#organization"},"potentialAction":{"query":"required","target":"https://www.capterra.co.il/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Vulnerability Scanner Software","description":"Page 5 - Compare the top Vulnerability Scanner Software software and providers on Capterra Israel. Our free interactive tool makes software selection fast and easy. Filter by price, feature or user rating.","url":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5","about":{"@id":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5#itemlist"},"breadcrumb":{"@id":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5#breadcrumblist"},"@id":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5#webpage","@type":["WebPage","CollectionPage"],"mainEntity":{"@id":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5#itemlist"},"publisher":{"@id":"https://www.capterra.co.il/#organization"},"isPartOf":{"@id":"https://www.capterra.co.il/#website"},"inLanguage":"en-IL"},{"@id":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Scanner Software","position":2,"item":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software","@type":"ListItem"},{"name":"Page 5","position":3,"item":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5","@type":"ListItem"}]}]}
</script><script type="application/ld+json">
  {"name":"Page 5 - Vulnerability Scanner Software - Compare Prices &amp; Top Sellers - Capterra Israel 2026","@context":"https://schema.org","@id":"https://www.capterra.co.il/directory/32775/vulnerability-scanner/software?page=5#itemlist","@type":"ItemList","itemListElement":[{"name":"Solidcheck","position":1,"description":"Solidcheck is a digital asset compliance platform that streamlines audits, risk assessments, and real-time monitoring across blockchain networks. The platform features automated vulnerability scanning to identify flaws in smart contracts, reducing potential risks. Its DARA© risk scoring engine delivers compliance-ready scores with insights into asset risk profiles. The system monitors hacks, governance changes, and on-chain activity in real-time to enhance compliance management.\nThe platform aligns with regulatory frameworks including MiCA, AML, FATF, and ESG standards. Solidcheck offers automation capabilities, APIs, and AI copilots that support compliance operations. The system supports multiple blockchain networks and thousands of assets while integrating with blockchain explorers and analytics providers. This comprehensive approach helps organizations maintain compliance while managing digital assets effectively.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/0e048922-92e3-4f2d-a4c4-258a995eab11.png","url":"https://www.capterra.co.il/software/1042370/solidcheck","@type":"ListItem"},{"name":"Vulnsy","position":2,"description":"Vulnsy is a penetration testing report management platform designed to streamline report creation, management, and delivery for security teams. It features a reusable findings library with customizable vulnerability descriptions, reducing repetitive documentation tasks. Automated formatting ensures consistent styling and branding across reports. The platform includes a secure client portal for report delivery and real-time collaboration tools like role-based access control and live updates to enhance team workflows. Evidence management allows screenshots and proof-of-concept materials to be organized and embedded into reports with proper formatting. Vulnsy addresses challenges like manual formatting and inconsistent report quality, offering DOCX exports and customizable templates. Project management tools help track engagements and deadlines from a centralized dashboard.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/a79e57d6-68b9-4912-9837-cc04453ed9dd.png","url":"https://www.capterra.co.il/software/1086663/Vulnsy","@type":"ListItem"},{"name":"IONIX","position":3,"description":"IONIX is an External Exposure Management platform that continuously discovers, validates, and prioritises exploitable vulnerabilities across an organisation's full external attack surface: directly managed assets, vendor-managed infrastructure, and digital supply chain dependencies.\n\nUnlike traditional ASM tools that surface findings without confirmation, IONIX uses non-intrusive exploit simulation to validate that discovered exposures are actually exploitable, reducing false positives and security team noise.\n\nCore capabilities include multi-factor asset discovery (DNS, TLS, WHOIS, cloud APIs, browser-based crawling), ML-based asset attribution, recursive dependency mapping across nth-party supply chain relationships, WAF posture management, Active Protection against DNS hijacking and dangling assets, threat path analysis, risk prioritisation, and automated remediation workflows integrating with JIRA, ServiceNow, and leading SIEMs.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/189ee494-663b-45e6-9073-99f5abf24ecd.jpg","url":"https://www.capterra.co.il/software/1089174/IONIX","@type":"ListItem"},{"name":"Securetom","position":4,"description":"Securetom is a comprehensive domain security scanner built for the AI era. While traditional scanners stop at web vulnerabilities, Securetom extends into AI-specific attack surfaces, detecting exposed LLM endpoints, testing for prompt injection vulnerabilities, analyzing AI data leakage risks, and scoring compliance against EU AI Act and NIST AI RMF frameworks.\n\nThe platform includes multiple integrated security modules, such as DNS Security Analysis, HTTP Security Headers, SSL/TLS Vulnerability Detection, WAF detection with fingerprints, hosting infrastructure analysis, AI endpoint detection, prompt injection scanning, AI data leakage testing, AI supply chain risk assessment, and AI Compliance Scoring.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/b295af52-9139-4e90-a2e5-2498e3753862.png","url":"https://www.capterra.co.il/software/1094509/Securetom","@type":"ListItem"},{"name":"CyberComplyAI","position":5,"description":"CyberComplyAI is an attack surface scanning platform that generates compliance evidence for frameworks like ISO 27001, SOC2, NIS2, and Cyber Essentials. It scans public-facing assets to identify vulnerabilities and maps findings to compliance controls. Zero-configuration asset discovery detects domains, subdomains, and services without internal access or agent installation. Automated scans uncover misconfigurations, outdated software, and missing security headers. Findings are mapped to framework requirements, supporting audit preparation and remediation planning. The platform provides downloadable reports documenting security posture and control effectiveness. Continuous scanning monitors internet-facing infrastructure, prioritizing remediation based on exposures. Operating externally, CyberComplyAI inspects assets as auditors and attackers would, without requiring passwords or invasive access.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/8b29b2d1-d6ae-484e-9589-70a8b6cc5229.png","url":"https://www.capterra.co.il/software/1094669/CyberComplyAI","@type":"ListItem"},{"name":"Am I Being Pwned","position":6,"description":"Am I Being Pwned is enterprise browser security software that audits, scores, and monitors browser extensions to detect and prevent data harvesting, session hijacking, code injection, and other malicious behaviors. \n\nThe software deobfuscates and decompiles extensions to trace execution, data access, and communication patterns. LLM-powered threat detection identifies subtle and novel threats often missed by signature-based tools, with all critical findings verified by human researchers to minimize false positives. \n\nThe platform offers integration options, including a privacy-focused browser extension, a REST API for risk intelligence, and MDM support. \n\nAm I Being Pwned combines deep code analysis, advanced threat detection, and verified reporting to help organizations secure their browser extension ecosystem and protect against malicious activities with state of the art results, finding tens of vulnerabilities and hundreds of malicious extensions.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductLogo/35c41be9-f60b-4520-a22b-fe4be0b3a12c.png","url":"https://www.capterra.co.il/software/1094997/Am-I-Being-Pwned","@type":"ListItem"}],"numberOfItems":6}
</script>
