Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Best Vulnerability Management Products 2009

Readers vote on the best vulnerability management products, including network vulnerability assessment scanners, vulnerability risk management, reporting, remediation and compliance, patch management, vulnerability lifecycle management.

QualysGuard Vulnerability Management

For the third year in a row, Qualys Inc. has come out on top in the vulnerability management category. QualysGuard Vulnerability Management is the company's automated vulnerability management and network auditing product. Readers were most pleased with its ease of installation, the accuracy in which it identifies vulnerabilities, as well as the breadth of applications and devices covered.

Tenable Network Security

Nessus, offered by Tenable Network Security in conjunction with the company's Security Center and Passive Scanner products, placed second this year. Readers were especially enthusiastic about the product's accuracy, as well as its ability to integrate with threat management or early warning systems. Other notable features include configuration auditing, asset profiling, and high-speed discovery.

McAfee Vulnerability Manager

The vulnerability management product of security giant McAfee Inc. places third this year, after landing the second spot in 2008. McAfee Vulnerability Manager offers a priority-based approach to vulnerability management. Other features include broad content checks, threat correlation and asset-based discovery, management, scanning and reporting. Readers highlighted the product's comprehensive and flexible reporting system as one of the best features. [59]

"The sweet spot of the market now is ASV scanning for PCI compliance. Some of the big players have been acquiring application security scanning vendors, so you'll see [the scanning tools] tied much more tightly into other parts of the software development lifecycle. More of the traditional scanning tools are incorporating web application scan, and that's again being driven by PCI." -- John Kindervag, senior analyst, Forrester Research


  Introduction and Methodology
  Best Antimalware Products
  Best Application Security Products
  Best Authentication Products
  Best Data Loss Prevention Products
  Best Email Security Products
  Best Identity and Access Management Products
  Best Intrusion Detection and Prevention Products
  Best Mobile Data Security Products
  Best Network Access Control Products
  Best Network Firewalls
  Best Risk and Policy Management Products
  Best Secure Remote Access Products
  Best Security Information and Event Management Products
  Best Unified Threat Management Products
  Best Vulnerability Management Products
  Best Web Security Gateway Products
  Best Wireless Security Products
This was last published in September 2009

Dig Deeper on Penetration testing, ethical hacking and vulnerability assessments

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.