WARNINGThis page is considered a work in progress and is more for example than truth.

Vulnerability Management Product Matrix

Feature Matrix - Core Updated: Oct 2025 / Feature Data is updated daily.


ConnectSecure
Huntress
OpenVAS
Qualys
Rapid7
Tenable
Company
Parent
Parent Company
ConnectSecure, LLC
Huntress Labs, Inc.
Greenbone Networks GmbH
Qualys, Inc.
Rapid7, Inc.
Tenable Holdings, Inc.
Employee Size
Size of the company or division
50-100 employees
200+ employees
50-100 employees
1,500+ employees
2,500+ employees
2,000+ employees
Founded
Year the company was founded
2015
2015
2005
1999
2000
2002
Headquarters
Location of company headquarters
United States
Ellicott City, Maryland, USA
Osnabrück, Germany
Foster City, California, USA
Boston, Massachusetts, USA
Columbia, Maryland, USA
Public/Private
Whether the company is publicly traded or privately held
Private
Private
Private
Public (NASDAQ: QLYS)
Public (NASDAQ: RPD)
Public (NASDAQ: TENB)
Acquisition
Details about any acquisitions
None
None
None
None (IPO in 2012)
None (IPO in 2015)
None (IPO in 2018)
Architecture & Deployment
Cloud
Cloud-based deployment option
On Premises
On-premises deployment option
Hybrid
Supports both cloud and on-premises deployment options
SaaS
Software as a Service delivery model
Private Cloud
Ability to deploy in a private cloud environment
Multi-Tenant
Multi-tenant architecture for MSPs
High Availability
Redundancy and failover capabilities
Scalability
Ability to scale with increasing demand
Containerized Deployment
Support for containerized deployment (Docker, Kubernetes)
API Access
Provides API for custom integrations
Distributed Scanning
Support for distributed scanning architecture
Agent-Based
Uses agents installed on endpoints for scanning
Agentless
Performs scanning without requiring agents
Offline Scanning
Ability to scan systems that are not connected to the internet
Discovery & Asset Management
Network Discovery
Automatically discover assets on the network
Asset Inventory
Maintain an inventory of all assets
Asset Classification
Classify assets based on criticality or other factors
Asset Tagging
Tag assets for organization and filtering
Asset Grouping
Group assets by function, location, or other criteria
CMDB Integration
Integration with Configuration Management Database
Cloud Asset Discovery
Discover assets in cloud environments
Container Discovery
Discover containers and container images
IoT Discovery
Discover Internet of Things devices
OT Discovery
Discover Operational Technology devices
Mobile Device Discovery
Discover mobile devices
Dynamic Asset Tracking
Track assets as they move or change
Asset Baselining
Establish baselines for assets
Asset Lifecycle Management
Track assets through their lifecycle
Asset Relationship Mapping
Map relationships between assets
Scanning & Assessment
Vulnerability Scanning
Scan for known vulnerabilities
Network Scanning
Scan network devices for vulnerabilities
Web Application Scanning
Scan web applications for vulnerabilities
Database Scanning
Scan databases for vulnerabilities
Cloud Infrastructure Scanning
Scan cloud infrastructure for vulnerabilities
Container Scanning
Scan containers and container images for vulnerabilities
Code Scanning
Scan source code for vulnerabilities
Mobile App Scanning
Scan mobile applications for vulnerabilities
IoT Scanning
Scan IoT devices for vulnerabilities
OT Scanning
Scan operational technology for vulnerabilities
Configuration Scanning
Scan for misconfigurations
Compliance Scanning
Scan for compliance violations
Authenticated Scanning
Perform scans with authentication credentials
Unauthenticated Scanning
Perform scans without authentication credentials
Scheduled Scanning
Schedule scans to run automatically
Continuous Scanning
Perform continuous, ongoing scanning
On-Demand Scanning
Perform scans on demand
Deep Scanning
Perform thorough, in-depth scans
Fast Scanning
Perform quick scans for rapid assessment
Scan Templates
Pre-defined templates for common scan types
Custom Scanning
Create custom scan profiles
Scan Throttling
Control scan performance impact
Scan Windows
Define time windows for scanning
Scan Blackout Periods
Define periods when scanning is not allowed
Vulnerability Management
Vulnerability Database
Comprehensive database of known vulnerabilities
Custom Vulnerabilities
Support for defining custom vulnerabilities
Vulnerability Scoring
Score vulnerabilities based on severity
CVSS Support
Support for Common Vulnerability Scoring System
Vulnerability Trending
Track vulnerability trends over time
Vulnerability Aging
Track how long vulnerabilities have been open
Vulnerability Correlation
Correlate vulnerabilities across assets
False Positive Management
Identify and manage false positives
Exception Management
Manage exceptions to vulnerability findings
Vulnerability Verification
Verify the existence of vulnerabilities
Exploit Availability
Track availability of exploits for vulnerabilities
Threat Intelligence
Integration with threat intelligence feeds
Zero-Day Detection
Detect zero-day vulnerabilities
Vulnerability Prediction
Predict potential vulnerabilities
Attack Path Analysis
Analyze potential attack paths
Attack Surface Analysis
Analyze the attack surface
Risk Scoring
Score risk based on vulnerabilities and other factors
Risk Trending
Track risk trends over time
Risk Heatmaps
Visual representation of risk across the environment
Risk Acceptance
Process for accepting certain risks
Risk Transfer
Process for transferring risks
Remediation Management
Remediation Guidance
Guidance on how to remediate vulnerabilities
Remediation Workflows
Workflows for managing remediation
Remediation Prioritization
Prioritize vulnerabilities for remediation
Remediation Automation
Automate remediation of vulnerabilities
Patch Management
Manage and deploy patches
Patch Verification
Verify that patches have been applied correctly
Configuration Remediation
Remediate misconfigurations
Remediation SLAs
Service level agreements for remediation
Remediation Tracking
Track remediation progress
Remediation Validation
Validate that remediation was successful
Remediation Rollback
Roll back remediation if necessary
Remediation Delegation
Delegate remediation tasks to appropriate teams
Remediation Approval
Approval workflow for remediation actions
Remediation Scheduling
Schedule remediation activities
Remediation Testing
Test remediation in non-production environments
Reporting & Analytics
Executive Reporting
Reports designed for executive stakeholders
Technical Reporting
Detailed technical reports
Compliance Reporting
Reports for compliance purposes
Custom Reporting
Ability to create custom reports
Scheduled Reports
Automatically generate and send reports
Report Templates
Pre-defined report templates
Dashboards
Visual dashboards for key metrics
Custom Dashboards
Create custom dashboards
Trend Analysis
Analyze trends over time
Comparative Analysis
Compare different time periods or environments
Benchmarking
Compare against industry benchmarks
Metrics and KPIs
Track key performance indicators
Data Visualization
Visual representation of data
Data Export
Export data for external analysis
BI Integration
Integration with business intelligence tools
Compliance & Frameworks
Compliance Frameworks
Support for compliance frameworks
PCI DSS
Payment Card Industry Data Security Standard
HIPAA
Health Insurance Portability and Accountability Act
GDPR
General Data Protection Regulation
NIST CSF
NIST Cybersecurity Framework
NIST 800-53
NIST Special Publication 800-53
NIST 800-171
NIST Special Publication 800-171
ISO 27001
ISO/IEC 27001
SOC 2
Service Organization Control 2
CIS Benchmarks
Center for Internet Security Benchmarks
FedRAMP
Federal Risk and Authorization Management Program
CMMC
Cybersecurity Maturity Model Certification
Custom Frameworks
Support for custom compliance frameworks
Compliance Mapping
Map vulnerabilities to compliance requirements
Compliance Scoring
Score compliance posture
Compliance Trending
Track compliance trends over time
Evidence Collection
Collect evidence for compliance audits
Audit Support
Support for compliance audits
Integration
SIEM Integration
Integration with Security Information and Event Management systems
SOAR Integration
Integration with Security Orchestration, Automation and Response platforms
Ticketing System Integration
Integration with ticketing systems
ITSM Integration
Integration with IT Service Management tools
RMM Integration
Integration with Remote Monitoring and Management tools
PSA Integration
Integration with Professional Services Automation tools
ConnectWise Manage
Integration with ConnectWise Manage
Autotask
Integration with Autotask PSA
ServiceNow
Integration with ServiceNow
Jira
Integration with Jira
DevOps Integration
Integration with DevOps tools and processes
CI/CD Integration
Integration with Continuous Integration/Continuous Deployment pipelines
Webhook Support
Support for webhooks for custom integrations
API Integration
Integration via API
Data Import/Export
Import and export data
Email Integration
Integration with email systems
Slack Integration
Integration with Slack
Microsoft Teams Integration
Integration with Microsoft Teams
Security & Access Control
Role-Based Access Control
Access control based on roles
Multi-Factor Authentication
Support for multi-factor authentication
Single Sign-On
Integration with single sign-on solutions
Audit Logging
Comprehensive audit logging
Data Encryption
Encryption of stored data
Secure Communications
Secure communication channels
API Security
Security controls for API access
User Activity Monitoring
Monitor user activity within the platform
Session Management
Manage user sessions
IP Restrictions
Restrict access by IP address
Data Masking
Mask sensitive data
Data Retention
Controls for data retention periods
Data Purging
Securely purge data when no longer needed
MSP Features
White Label
Ability to rebrand the solution with your own branding
Multi-Tenant Management
Tools for managing multiple client tenants
Client Reporting
Client-specific reporting capabilities
Client Onboarding
Tools for onboarding new clients
MSP Dashboard
Centralized dashboard for MSP management
MSP Billing Integration
Integration with MSP billing systems
Service Tiers
Support for different service tiers
MSP Pricing
Special pricing for Managed Service Providers
MSP-Specific Support
Dedicated support for MSPs
MSP Training
Training resources for MSPs
Client Isolation
Isolation between client environments
Delegation
Ability to delegate administration to clients
Client Portal
Portal for client access
Pricing & Licensing
Per Asset
Pricing based on number of assets
Per IP
Pricing based on number of IP addresses
Per Scan
Pricing based on number of scans
Unlimited Scanning
Unlimited scanning included
Tiered Pricing
Pricing based on tiers of functionality
Free Tier
Availability of a free tier or version
Trial Available
Availability of a free trial
Monthly Billing
Option for monthly billing
Annual Billing
Option for annual billing
Volume Discounts
Discounts for volume purchases
Perpetual License
One-time purchase option
Subscription License
Recurring subscription model