Compare the Top Patch Management Software for Cloud as of June 2025 - Page 2

  • 1
    OPSWAT MetaDefender
    MetaDefender layers an array of market-leading technologies to protect critical IT and OT environments and shrinks the overall attack surface by detecting and preventing sophisticated known and unknown file-borne threats like advanced evasive malware, zero-day attacks, APTs (advanced persistent threats), and more. MetaDefender easily integrates with existing cybersecurity solutions at every layer of your organization’s infrastructure. With flexible deployment options purpose-built for your specific use case, MetaDefender ensures files entering, being stored on, and exiting your environment are safe—from the plant floor to the cloud. This solution uses a range of technologies to help your organization develop a comprehensive threat prevention strategy. MetaDefender protects organizations from advanced cybersecurity threats in data that originates from a variety of sources, such as web, email, portable media devices, and endpoints.
    Starting Price: $0
  • 2
    Cruz Operations Center (CruzOC)
    CruzOC is a scalable multi-vendor network management and IT operations tool for robust yet easy-to-use netops. Key features of CruzOC’s integrated and automated management include performance monitoring, configuration management, and lifecycle management for 1000s of vendors and converging technologies. With CruzOC, administrators have implicit automation to control their data center operations and critical resources, improve network and service quality, accelerate network and service deployments, and lower operating costs. The result is comprehensive and automated problem resolution from a single-pane-of-glass. Cruz Monitoring & Management. NMS, monitoring & analytics -- health, NPM, traffic, log, change. Automation & configuration management -- compliance, security, orchestration, provisioning, patch, update, configuration, access control. Automated deployment -- auto-deploy, ZTP, remote deploy. Deployments available on-premise and from the cloud.
    Starting Price: $1350
  • 3
    KernelCare Enterprise
    Global organizations trust TuxCare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the TuxCare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. TuxCare automates the patching process and eliminates the need to wait weeks or months for reboot cycles to apply patches. TuxCare currently protects over 1 million workloads worldwide. Tight integrations with popular patch management and vulnerability scanners, including Qualys, Crowdstrike, and Rapid7, enable TuxCare to fit seamlessly into existing infrastructure. The TuxCare secure patch server, ePortal, allows operations in gated and air-gapped environments. Reduce risk by significantly reducing the mean time to patch vulnerabilities
    Starting Price: $3.95 per month
  • 4
    Patchdeck

    Patchdeck

    Patchdeck

    Patchdeck is a cloud-based patch management solution for Windows, Linux and Mac. With Patchdeck IT professionals can quickly see which systems are missing patches and remediate vulnerabilities with one click. Patch policies allow to configure a fully automated patch process and reports show the patching health of an environment developing over time. Patchdeck provides advanced access control features so that IT teams can work together to keep their environment fully patched. Alerting via email or integrations and an API allows integrating Patchdeck into other security or management tools.
    Starting Price: $1 per month per endpoint
  • 5
    Seal Security

    Seal Security

    Seal Security

    Redefine open source vulnerability and patch management with Seal Security. Easy integration directly into your existing SDLC, and workflows. Standalone security patches for immediate resolution of critical security issues. Predictable remediation and optimal resource allocation, with centralized control and reduced R&D dependency. Streamline your open source vulnerability remediation without introducing the risk of breaking changes. Say goodbye to alert fatigue and start patching with Seal Security. Pass every product security scan with confidence. Seal Security provides immediate remediation for open source vulnerabilities. By meeting your customers' SLAs and offering a vulnerability-free product, you can ensure customer trust and fortify your market standing. Seal Security seamlessly integrates with various coding languages, patch management systems, and open source platforms through powerful APIs and CLI.
    Starting Price: Free
  • 6
    vRx

    vRx

    Vicarius

    Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most. vRx's prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation. vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities. For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.
    Starting Price: $5 per asset per month
  • 7
    ESET PROTECT Complete
    ESET PROTECT Complete is a comprehensive cybersecurity solution designed to safeguard business endpoints, cloud applications, and email systems. It offers advanced protection against ransomware and zero-day threats through cloud-based sandboxing technology and machine learning-driven detection. It includes full disk encryption capabilities, aiding compliance with data protection regulations. ESET PROTECT Complete also provides robust security for mobile devices, file servers, and email servers, incorporating anti-malware, anti-phishing, and anti-spam measures. Its centralized, cloud-based management console allows for streamlined deployment, monitoring, and response to security incidents across the organization. Additional features include vulnerability and patch management, ensuring that software vulnerabilities are promptly identified and addressed.
    Starting Price: $287.72 one-time payment
  • 8
    ESET PROTECT Elite
    ESET PROTECT Elite is an enterprise-grade cybersecurity solution that integrates extended detection and response with comprehensive multilayered protection. It offers advanced threat defense using adaptive scanning, machine learning, cloud sandboxing, and behavioral analysis to prevent zero-day threats and ransomware. The platform includes modern endpoint protection for computers and smartphones, server security for real-time data protection, and mobile threat defense. It also features full disk encryption, helping organizations comply with data protection regulations. ESET PROTECT Elite provides robust email security, including anti-phishing, anti-malware, and anti-spam technologies, along with cloud app protection for Microsoft 365 and Google Workspace. Vulnerability and patch management capabilities allow for automatic tracking and patching of vulnerabilities across all endpoints.
    Starting Price: $275 one-time payment
  • 9
    Syxense Manage
    Syxsense Manage lets users see and manage all endpoints inside and outside the network with coverage for all major operating systems and endpoints, including IoT devices. Syxsense provides users with a complete view of their IT infrastructure with an intuitive interface, and all-inclusive features. The service is designed to provide full endpoint intelligence with OS, hardware, and software inventory details. Know if patches are missing or security standards are compromised. Critical devices are color coded in the datagrid, dashboards, and reports. Use sites, queries, and groups to target and view devices in logical subsets. Scan and prioritize security and patching priorities relative to exposed risk. Find out which patches have been released, their severity, and if vulnerabilities are being exploited. Automated Maintenance and Blackout Windows protect business productivity while deploying updates.
  • 10
    Panorama9

    Panorama9

    Panorama9

    This is IT monitoring and management done right. Get the full picture and respond quickly to issues. Patch management, remote control, network discovery, all built into one beautiful and easy-to-use solution. Got a minute? That’s how long it takes to deploy and install a powerful and lightweight agent on all of your devices. Within minutes you are provided with detailed information about your IT environment. IT administration is complex but we make your job easier. Automatically discover devices and services in your IT environment. Remote install applications and run scripts. Everything you need in one comprehensive tool. Downtime is unacceptable. Panorama9 foresees problems so you can be proactive instead of reactive. When things do go wrong you are notified instantly and can take action before your users notice anything. Your security is only as strong as the weakest link - we'll tell you where that is.
  • 11
    Patch My PC

    Patch My PC

    Patch My PC

    Save more time than you ever thought possible and improve security by automating the patching of third-party applications in Microsoft ConfigMgr and Intune. Extend beyond patching, auto-create applications for the initial deployment of products in Microsoft SCCM and Intune. Including icons, keywords, descriptions, and much more! We'll keep the base installs up to date automatically — no need to deploy outdated apps and wait for the updates to apply after the fact. Use existing installation methods within SCCM including task sequences and collection deployments for the initial installation of products. Add your own custom pre/post-update scripts to perform environment-specific configurations when needed. Disable the self-update feature within applications to ensure you can manage when and how updates apply in your enterprise.
    Starting Price: $2 per device per year
  • 12
    Red Hat Ansible Automation Platform
    Red Hat® Ansible® Automation Platform is a unified solution for strategic automation. It combines the security, features, integrations, and flexibility needed to scale automation across domains, orchestrate essential workflows, and optimize IT operations to successfully adopt enterprise AI. The path to fully optimized automation is a journey. Moving from manual Day 2 operations and ad hoc solutions to a comprehensive, integrated automation platform requires a strategic commitment. And it determines your current—and future—business success. With Red Hat Ansible Automation Platform, you can maximize efficiency, improve security, and overcome increasing IT challenges like skill gaps and tech sprawl. It helps you: Deliver consistent, reliable automation across domains and use cases. Maximize the value of the technology and resources you already have. Build a strong foundation for AI adoption.
    Starting Price: $5,000 per year
  • 13
    Kaseya VSA
    Kaseya VSA is a next-generation remote monitoring and management (RMM) software for Managed Service Providers (MSP) and IT enterprises. With VSA, users get access to the fastest remote control powerful discovery, reliable patch management, and monitoring and security tools in a single solution. Thus, helping to increase IT staff productivity, service reliability, and systems security. A Unified IT Management solution to not only deliver better service but to transform the business. Kaseya’s IT Management solution increases IT teams’ efficiency by providing seamless workflows across tools, drives improved service delivery and business productivity See for yourself why thousands of IT departments use Kaseya VSA IT Management software to centrally manage and automate all of IT. You ought to be able to deliver more value with less service delivery costs. Kaseya VSA provides IT departments with the IT Management tools they need to proactively manage their systems from a unified platform.
  • 14
    Cisco Vulnerability Management
    A tidal wave of vulnerabilities, but you can’t fix them all. Rely on extensive threat intel and patented prioritization to cut costs, save time, and keep your teams efficiently focused on reducing the biggest risks to your business. This is Modern Risk-Based Vulnerability Management. We created Risk-Based Vulnerability Management software and now we’re defining the modern model. Show your security and IT teams which infrastructure vulnerabilities they should remediate, when. Our latest version reveals exploitability can be measured, and accurately measuring exploitability can help you minimize it. Cisco Vulnerability Management (formerly Kenna.VM) combines real-world threat and exploit intelligence and advanced data science to determine which vulnerabilities pose the highest risk and which you can deprioritize. Spoiler alert: Your mega-list of “critical vulnerabilities” will shrink faster than a woolen sweater-vest in a hot cycle.
  • 15
    Syxsense Secure
    Syxsense Secure is world’s first IT management and security solution that combines vulnerability scanning, patch management, and EDR capabilities in a single cloud console. With insight into the health of every endpoint across your network, you get the peace of mind that comes from predicting, preventing, and eliminating threats in real time. Make exposed risk and attack vectors a thing of the past.
  • 16
    Comodo Dragon Platform
    Our completely cloud-native framework delivers you zero day protection against undetectable threats while defending your endpoints from known threat signatures. Comodo introduced a new approach to endpoint protection, engineered to solve the issue of legacy security solutions. The Dragon platform delivers the foundation principles for complete next-generation endpoint protection. Easily improve your cybersecurity and performance with the Dragon Platform's lightweight agent delivering artificial intelligence (AI) and Auto Containment to stop all threats. Comodo delivers everything cybersecurity you ever needed to activate breach protection immediate value added from day one. 100% trusted verdict within 45 seconds on 92% of signatures via analysis, and 4 hours SLA on the remaining 8% via human experts. Automatic signature updates that simplifies deployment across your entire environment to lower operational costs.
  • 17
    Juriba Enterprise
    Discover the power of centralising your Digital Workplace management with the Juriba Platform. As the leading Digital Platform Conductor (DPC) tailored to the intricate demands of large enterprise Digital Workplace leaders, Juriba offers a comprehensive suite of tools. From complete Digital Workplace management and application testing and packaging to facilitating complex IT transformations and ongoing Evergreen IT management initiatives, our platform empowers you to streamline operations efficiently. Seamlessly integrating with Hybrid Digital Infrastructure Management tools like Microsoft Endpoint Manager, Microsoft Intune, ServiceNow, NexThink, and Workspace ONE, among others, Juriba synchronizes data across your entire Digital Workplace, granting you unparalleled visibility and control. Through intelligent workplace automation and orchestration, tedious tasks are eliminated, minimising human error and enhancing productivity.
  • 18
    FileWave

    FileWave

    FileWave

    Device management is becoming increasingly complex and extensive, but that doesn’t mean that it has to be more complicated at the same time. FileWave is the pioneer in unified management for all of your devices, for all of your platforms, in any environment. Discover one simple solution to manage all your devices, any time, anywhere, no matter the platform. Our convenient tool offers a streamlined approach to device management, asset management, and security for all major systems. FileWave saves IT departments money by saving their time with our powerful toolkit of advanced IT management tools. Thanks to remote access, imaging/provisioning, deployment, and automation, IT admins can manage devices from everywhere.
  • 19
    Naverisk RMM & PSA
    Beautifully simple RMM, Service Desk & PSA software. Slash your costs and simplify service delivery with a powerful, easy to use, all-in-one IT services automation platform. Naverisk has been empowering MSPs & IT Pros to deliver outstanding IT services for over 10 years. Deliver world class IT services with Naverisk’s powerful remote monitoring and management capabilities. Identify and resolve issues before your users are impacted. Transform the efficiency of your IT services with powerful, yet easy to use, automation. Full support for Windows, Linux, Mac & SNMP devices. It takes a team to deliver great customer service. Naverisk’s service desk is designed specifically for MSPs and IT Pros with powerful automation and collaboration capabilities. Power up your service delivery with modern collaboration features supporting teams working together with integrated device management to quickly resolve IT issues.
    Starting Price: $110 per month
  • 20
    OpenText ZENworks Endpoint Software Patch Management
    Enable automated processes for patch assessment, monitoring, and remediation. Apply patches up to 13 times faster without burdening your staff. Team workspaces enable you to create digital offices where local and global team members can gather online to coordinate their efforts. Monitor patch compliance, quickly identify and assess vulnerabilities, and automatically apply updates and patches to meet pre-defined standards. Patch Management watches your back, patching everything you’ve got on your network 24 hours a day, without the need for human intervention. With its unique policy-based approach, you set up the policies, define the actions, and then sit back and let ZENworks do the rest. ZENworks Patch Management includes fast, automatic patch deployment based on predefined policies, as well as the ability to customize tested patches as needed. It also supports phased rollouts to ensure smooth, error-free patch deployments to large numbers of systems.
  • 21
    Datto RMM

    Datto RMM

    Datto, a Kaseya company

    Datto RMM is a secure, reliable and modern cloud-based remote monitoring and management platform that gives MSPs the ability to securely and reliably manage their customers IT infrastructures. Built to remove complexity, costs, and risks, it includes powerful automation and monitoring tools such as ransomware detection, patch management, and remote control takeover to help MSPs proactively prevent IT issues, respond faster to incidents, and deliver a better service to their customers. Protect and quickly restore PCs with reliable, image-based, all-in-one cloud backup and disaster recovery. Cloud-to-cloud backup and fast recovery for critical data in Microsoft 365 and G Suite applications. Fast and easy file and folder backup and restore with support for Windows and Mac. Safe file sync and share with a centrally managed, secure collaboration platform. Protect and quickly restore servers with reliable, image-based, all-in-one business continuity and disaster recovery.
  • 22
    Phosphorus

    Phosphorus

    Phosphorus Cybersecurity

    Phosphorus is the backbone tool to secure the rapidly growing and often unmonitored enterprise IoT landscape. Providing visibility down to the device model and firmware version, Phosphorus gives you full, granular visibility into all embedded devices on your network. Phosphorus’s patented capabilities allow you to update all of your IoT devices to the latest firmware and rotate credentials at the click of a button. Unlike traditional scanners that search for vulnerabilities or require expensive Spanports, Phosphorus’s scanner provides light-touch detection of all IP-enabled IoT devices on your network without “knocking them over”. Gain full enterprise protection with our solutions. Audit IoT inventories. Meet compliance requirements and industry regulations. Automate key tasks like policy enforcement and patching updates – all at a fraction of the cost.
  • 23
    Panda Patch Management

    Panda Patch Management

    WatchGuard Technologies

    Patch Management is an easy-to-use solution for managing vulnerabilities in operating systems and third-party applications on Windows workstations and servers. It covers all the patch management processes including discovering, identifying, assessing, reporting, managing, deploying installations and remediating security risks. Reduce the attack surface, contain and mitigate vulnerability exploitation attacks, while strengthening your organization’s prevention and containment capabilities. Centralized and real-time visibility into the security status of software vulnerabilities, missing patches, updates and unsupported (EOL) software. Audit, monitor and prioritize operating system and application updates.
  • 24
    Layer Seven Security

    Layer Seven Security

    Layer Seven Security

    Leading cybersecurity protection for cloud and on-premise SAP applications including S/4HANA and HANA platforms. Layer Seven Security provides industry-leading experience, expertise and insight to secure your SAP technology stack including network, operating system, database and application components. Test your defences and discover vulnerabilities in your SAP systems before the attackers. Reveal the business impact of successful exploits against your SAP platform. 2 out of 3 SAP systems experience security breaches. Protect your SAP applications against cyber threats with the Cybersecurity Extension for SAP Solutions. The layered control strategy supported by assessments is based on best practices and SAP security recommendations. Our experienced security architects work closely with your organization to implement end-to-end protection for the entire SAP technology stack.
  • 25
    Waratek

    Waratek

    Waratek

    Integrate seamless security into the software delivery lifecycle to improve efficiency and agility. Ensure security policies are flexible, human readable, and not impacted by technical debt. Deploy applications securely across on-premises, hybrid, or cloud infrastructures. Automate systems' adherence to desired security behavior to minimize delays & fire drills. Execute the security of your apps in the runtime with a performance impact of less than 3% in production. We see agent-less solutions as a major disadvantage for highly regulated organizations that have tight security requirements. This is why Waratek leverages an agent to ensure its autonomous behavior that can secure unknown threats for themselves unlike agent-less models. Virtually upgrade apps and dependencies like Log4j without code changes, vendor patches, or downtime.
  • 26
    Easy2Patch
    Easy2Patch is a software that enables centralized updating of third-party products running on computers within IT ınfrastructures. It works integrated with WSUS, ConfigMgr, and Intune. Its scope is limited to third-party Updates on Windows Operating System Platforms. Easy2Patch does not allow the archiving of updates or the archiving of setup processes. This design ensures that your updating and installing processes are automatically on time. Updates for third-party products are securely provided with the original site link. With the Defender feature, Easy2Patch can automatically send third-party applications to the computers within the group the system administrators determined. These are on the CVE score to be determined but forgotten or not configured to be sent via Easy2Patch. *Stay up to date *Extensive application pool for wide use *Automatic protection of computers with Microsoft Defender feature
  • 27
    AWS Systems Manager
    AWS Systems Manager is a comprehensive solution that enables centralized visualization, management, and operation of nodes at scale across AWS, on-premises, and multi-cloud environments. It provides a unified console experience, consolidating various tools to facilitate common node tasks across AWS accounts and regions. With Systems Manager, you can automate routine operational tasks, reducing the time and effort required for system maintenance. It offers secure remote management of nodes without the need for bastion hosts, SSH, or remote PowerShell, simplifying operations and enhancing security. The platform also supports automated patching of operating systems and software, ensuring that your infrastructure remains up-to-date and compliant. Additionally, Systems Manager provides real-time insights into your node infrastructure, allowing for quick identification and resolution of issues. Its integration capabilities extend across hybrid and multi-cloud environments.
  • 28
    Ecora

    Ecora

    IgniteTech

    Manage workstations and servers with access to a wide range of reports based on machines' configurations. Automate system discovery, patch assessment and patch installation on workstations and servers. Collect information from your IT environment in seconds. Get the information you need without having to install anything in your environment. Ecora allows you to slice and dice your data on the fly, without a wait. Ecora is easy to install and get running. Set up your collections in a snap. Get the data you need to ensure you have the most secure environment with just a few clicks. Easily create custom reports on the attributes you need to review to keep your environment safe and secure. Maximize the return on your investment with IgniteTech’s Consulting Services, an exclusive benefit for IgniteTech Platinum customers. From advisory and process consulting, through implementation and support, our team of industry experts will ensure you get superior value from your technology investment.
  • 29
    dinCloud

    dinCloud

    dinCloud

    dinCloud is a Cloud Services Provider (CSP) that helps organizations rapidly migrate to the cloud through a strong network of Value Added Resellers (VARs) and Managed Service Providers (MSPs). Each customer’s hosted private cloud offers hosted workspaces and cloud infrastructure that the customer controls through direct and open access. dinCloud’s subscription-based services are tailored to fit a range of business models resulting in reduced cost, enhanced security, control, and productivity.
  • 30
    Wiz

    Wiz

    Wiz

    Wiz is a new approach to cloud security that finds the most critical risks and infiltration vectors with complete coverage across the full stack of multi-cloud environments. Find all lateral movement risks such as private keys used to access both development and production environments. Scan for vulnerable and unpatched operating systems, installed software, and code libraries in your workloads prioritized by risk. Get a complete and up-to-date inventory of all services and software in your cloud environments including the version and package. Identify all keys located on your workloads cross referenced with the privileges they have in your cloud environment. See which resources are publicly exposed to the internet based on a full analysis of your cloud network, even those behind multiple hops. Assess the configuration of cloud infrastructure, Kubernetes, and VM operating systems against your baselines and industry best practices.