Overview
VulnCheck Exploit & Vulnerability Intelligence replaces the need to have separate scripts for downloading the NIST National Vulnerability Database (NVD), the CISA KEV catalog, etc. By integrating with VulnCheck Exploit & Vulnerability Intelligence, you're integrating with an Open Source Intelligence (OSINT) product that has best-in-class information, in a timely manner, on vulnerability exploitation and vulnerabilities generally.
Unlike alternative vulnerability intelligence approach, the VulnCheck platform and VulnCheck Exploit & Vulnerability Intelligence products are built from a fully autonomous system in software.
Organization leverage VulnCheck Exploit & Vulnerability Intelligence to make better decisions on which vulnerabilities need immediate remediation.
Unlike other vulnerability databases, VulnCheck includes the latest information on a wider range of vulnerabilities, including:
-Vulnerabilities in Open Source packages/dependencies
-Vulnerabilities in ICS/OT, IoMT, IoT, mobile, etc., devices
Most importantly, unlike other purely vulnerability-centric solutions, VulnCheck marries exploit intelligence with vulnerability intelligence. By coupling exploit intelligence with vulnerability intelligence, better insights into vulnerability prioritization & remediation can be gained.
Highlights
- Exploit Intelligence for Vulnerability Prioritization
- Next-generation Cyber Threat Intelligence platform
- Initial Access Intelligence for Detection
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
EVI | Exploit & Vulnerability Intelligence | $259,200.00 |
IAI | Initial Access Intelligence | $302,400.00 |
IPI | IP Intelligence | $216,000.00 |
GOV | VulnCheck for Government | $747,000.00 |
CI | Canary Intelligence | $288,000.00 |
Vendor refund policy
All fees are non-refundable and non-cancellable except as required by law.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
VulnCheck customers will be assigned a dedicated Customer Success Manager and Engineer to ensure that they are able to use VulnCheck intelligence to its fullest potential. We provide direct support via Slack/Teams, web meetings, phone, or email.
support@vulncheck.com
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

Standard contract
Customer reviews
Vulnerability intelligence has improved risk-based patching and now prioritizes exploitable threats
What is our primary use case?
Our main use case for VulnCheck is for tracking newly disclosed vulnerabilities and to analyze the patch availability and to see if there is any public exploit or any active exploitation. Based on that we prioritize that and we do the patching. After that we will inform the internal team to take immediate action.
When a new vulnerability is disclosed or a new vulnerability is detected, we check VulnCheck to see if there is any public exploit or any active exploitation in our security environment. Based on that, we prioritize that and we do patching. After that, we inform the internal team to take immediate action.
What is most valuable?
The best features that VulnCheck offers are real-time vulnerability intelligence data, exploit availability tracking data, it clearly prioritizes the vulnerabilities, and it is easy to understand the vulnerability data.
The most valuable features I use on a day-to-day basis are the exploit intelligence features because they help me understand which vulnerabilities are actually at risk.
VulnCheck positively impacts my organization by improving the vulnerability prioritization and also reducing the unnecessary patching effort. The positive outcome and the specific outcome from this is that it helps reduce the patching noise and it improves the response time by around 25 to 30%.
What needs improvement?
To measure the improvement in response time, I note that the user interface can be improved and more integration would be helpful for seeing more Defender tools and all. That would be very helpful. Integration to SIEM , EDR, and some other networking tools is needed. The reporting thing can also be enhanced.
Better customizations also help in dashboards, and that would be very useful.
For how long have I used the solution?
I have been using VulnCheck for the past two years.
What do I think about the stability of the solution?
VulnCheck is a stable platform.
What do I think about the scalability of the solution?
In terms of scalability, VulnCheck is scalable for all kinds of organizations.
How are customer service and support?
The customer support for VulnCheck is good.
Which solution did I use previously and why did I switch?
I previously used an earlier CVE database, which was a manual search. After that, when we learned about VulnCheck in 2022 and 2023, we started using it and switched to VulnCheck because it has better visibility into exploitability and the real world's risks. I have also evaluated other tools such as NVD and general threat intelligence sources.
What was our ROI?
I have seen a return on investment, and I can share two returns on investment: one is time saving, and the second one is better prioritization. It is a good return on investment.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing depends on the usage of features. I think the pricing is okay, and as far as I know, it is good. They did not change anything, and the setup cost is also good. It is easy and reasonable.
Which other solutions did I evaluate?
Before choosing VulnCheck, I evaluated other options such as NVD and general threat intelligence.
What other advice do I have?
My advice to organizations looking into using VulnCheck is that any organizations dealing daily with ONGC or network-related clients must use VulnCheck because you never know how attackers can exploit vulnerabilities in your security environment. They can get into your environment and do a lot of things. Since it is there, they should use this tool for prioritizing vulnerabilities, especially when dealing with a large number of CVEs. It is very useful, and I would say every organization should use VulnCheck.
VulnCheck is a very helpful tool for vulnerability intelligence and prioritization, especially for security teams. I would rate this review an 8.
Proactive exploit intelligence has transformed how we prioritize real-world vulnerability risks
What is our primary use case?
Over the year and a half that I have been dealing with VulnCheck , I have also worked with numerous similar solutions. I know the market and understand the similarities and what VulnCheck can do, what it cannot, and what other competitors offer within the field.
Essentially, what we are looking to accomplish with VulnCheck is to enable organizations to view vulnerabilities that exist within the cybersecurity landscape. I am taking this to partners to then sell to their customers, but their customers are simply looking for a way to sift through thousands of CVEs or new vulnerabilities. Traditional tools will just give you a long list. VulnCheck is an exploit intelligence platform that takes all that mass of information and then provides you with a clear view of the major vulnerabilities that need attention.
A partner or customer has used VulnCheck to take a load of CVE scores or vulnerability scores and then identify which ones are dangerous in the real world. It essentially indicates if a bug is dangerous, shows you how hackers are getting in, and where the attacks are coming from. This is facilitated by the IP intelligence feature, which gives contextualized data that matters because, at the end of the day, it can indicate how quickly a business can be breached or compromised. The core idea is simple, as it examines all different vulnerabilities and provides context to which ones have been found and how they can breach your organization.
What is most valuable?
I am focused on enterprise security teams and government critical national infrastructure, all collating data. What VulnCheck does is based on real-life exploitability and is continuously updated with intelligence to focus on what really matters. It does not generate a long list full of noise and is a very proactive solution.
In my opinion, the best feature of VulnCheck is the vulnerability intelligence piece, which enriches vulnerability data beyond just standard databases. It provides context regarding the validity of exploit availability and the attacker's activity. Essentially, it can answer the question: Is this bug dangerous? Could it breach us in a real-world attack? Another valuable feature is the IP intelligence, which identifies attackers' infrastructure, specifically the command and control servers, showing where the attacks are originating from.
Our customers and partners typically use the IP intelligence feature by employing AI and ML to find, connect, and prioritize signals indicating that a vulnerability is being exploited. It is not a single model; it is a pipeline of data collection with enrichment and scoring, and I also utilize AI extraction. This is where AI kicks in to highlight what is vulnerable, providing a kind of correlation.
I would probably say that the main feature of VulnCheck is its ability to cut down all the noise and provide a scoring of how you are going to get attacked and breached. It then utilizes intelligence to show you where the attacker is located.
What needs improvement?
VulnCheck needs improvement in terms of data. It is primarily an intelligence and data layering system and not a complete vulnerability management platform. This means that it lacks native patch workflows, so you do not have asset discovery as you would with Tenable or Qualys. You will require other tools to act on the data that you find, which necessitates engineering time for API integration, data mapping, and tuning. Additionally, not all exploit signs are clear; some can be noisy or ambiguous, so teams need to apply their judgment. Finally, the time to value is not instant; it requires integration, workflow changes, and team training.
I think VulnCheck is an excellent tool and valuable data resource. However, if you wish to send alerts via an API to platforms like Rapid7 or Tenable VM, you will need to integrate that with a SIEM solution to perform any kind of risk management.
For how long have I used the solution?
I have been using this product for a year and a half.
What was our ROI?
Although I do not have the exact numbers for VulnCheck, I can categorize the ROI into three buckets: preventing breaches, which is the most significant value; faster detection, which translates to real savings; and operational efficiency, which is often hidden but represents a real ROI. The average breach costs around five million, and incidents can be stopped by monitoring vulnerabilities on a daily basis. VulnCheck detects exploitable vulnerabilities days to weeks earlier than alternatives, with customer detection averaging just under six and a half days sooner than most competing products, resulting in an estimated $145,000 risk avoided per incident and about $700,000 risk avoided.
What other advice do I have?
VulnCheck has shifted the mindset within my organization and my partners from a reactive to a more proactive approach. By contextualizing vulnerabilities and understanding how people get breached, VulnCheck gives us the ability to adopt a proactive mindset rather than a reactive one. More often than not, a reactive approach leads to responding to breaches instead of being on top of vulnerability management.
I would definitely recommend looking into VulnCheck as a solution.
I think it is a really good tool to find vulnerabilities and help identify what is exploitable within your infrastructure. However, if you are seeking something to manage or take action on your vulnerabilities, you will still need a vulnerability management tool or a SIEM solution to facilitate any actions. Overall, it is an easy-to-use tool that provides simple ways to view risks without much noise.