Comparison

SecPortal vs Vulcan Cyber
delivery workspace vs multi-scanner orchestration

Vulcan Cyber is a cyber risk management platform that aggregates output from third-party scanners (Tenable, Qualys, Rapid7, Wiz, Snyk, GitHub Advanced Security) and pushes remediation campaigns into ticketing. SecPortal is a security delivery workspace that runs its own scanning, holds the findings record, generates AI reports, and ships through a branded client portal on one tenant. Different categories, different buyers. Vulcan was acquired by Tenable in 2025, which has buyers actively re-evaluating their orchestration layer. The honest framing on this page is whether you want an aggregation layer above existing scanner contracts or a workspace that scans, reports, and delivers on its own.

No credit card required. Free plan available forever.

FeatureSecPortalVulcan Cyber
Primary use case
Security delivery workspace with scanning, findings, reports, and client portal on one tenant
Cyber risk management platform that aggregates output from third-party scanners
Engagement model with scope, ROE, and deliverables
Programme model rather than scoped engagement
Client model with onboarding, contacts, and access control
Internal asset owner model
Branded white-label client portal on your subdomain
Built-in external vulnerability scanning (16 modules)
Imports third-party scanner output (Tenable, Qualys, Rapid7)
Authenticated web application scanning (DAST)
Imports DAST output from third-party scanners
Code scanning (SAST/SCA via Semgrep)
Imports SAST/SCA output from third-party scanners (Snyk, GHAS)
Subdomain enumeration and external attack surface discovery
Manual finding entry with full editor
Limited (vulnerability item creation through forms)
AI-powered report generation (executive, technical, remediation)
300+ finding templates with remediation guidance
Vendor-mapped vulnerability records
CVSS 3.1 vector parsing and auto-scoring
CVSS plus VulcanRisk scoring
Scanner result import (Nessus, Burp Suite, CSV)
Hundreds of vendor connectors plus API ingestion
Encrypted credential vault for authenticated scans (AES-256-GCM)
Relies on third-party scanner credential storage
Retest workflow paired to original finding
Re-scan validates closure through underlying scanner
Compliance framework templates
21 frameworks
Compliance dashboards mapped to ingested scanner data
Integrated invoicing and Stripe Connect payments
Activity audit trail with CSV export
Platform audit logs
MFA enforcement on every workspace
SSO and IdP-driven controls
Free plan available
Pricing model
Free, Pro, Team
Sales-led, asset-based licensing (now aligned to Tenable One bundle)
Setup time
2 minutes
Connector configuration plus asset onboarding
Best fit for
Pentest firms, MSSPs, consultancies, AppSec teams, vulnerability management teams, and in-house security functions that scan, report, and deliver from one workspace
Large enterprises that already operate Tenable, Qualys, Rapid7, Wiz, Snyk, and GHAS in parallel and need an aggregation layer above them

SecPortal vs Vulcan Cyber: delivery workspace vs multi-scanner orchestration

Vulcan Cyber is a cyber risk management platform that aggregates output from third-party scanners, correlates findings across asset records, and pushes remediation campaigns downstream to ticketing. It assumes you already operate Tenable, Qualys, Rapid7, Wiz, Snyk, or GitHub Advanced Security and that the bottleneck is consolidating their results. Vulcan was acquired by Tenable in 2025 and is now positioned alongside Tenable One, which is a meaningful change for buyers who picked Vulcan precisely because they wanted an independent orchestration layer that sat above any scanner vendor.

SecPortal is a different category. SecPortal is a security delivery workspace that carries the engagement, the findings, the scanning, the AI report, the branded client portal, and the invoice all on one tenant. The buyer is a penetration testing firm, an MSSP, a consultancy, an AppSec team, a vulnerability management team, or an in-house security function that ships work to clients or stakeholders. If you are comparing a multi-scanner aggregation layer above a stack of existing tools to a delivery workspace that scans and reports on its own, this page is the side-by-side. The adjacent comparison for the new owner of Vulcan is SecPortal vs Tenable.io. Buyers who picked Vulcan for an independent RBVM layer often shortlist SecPortal vs Nucleus Security and SecPortal vs Kenna Security in the same evaluation.

Where Vulcan Cyber stops for delivery and in-house security work

These are not Vulcan-specific criticisms; they are properties of a multi-scanner orchestration platform when you compare it to running scoped engagements or a scanner-plus-findings programme on a single workspace.

Built as a multi-scanner aggregation layer, not a delivery workspace

Vulcan Cyber is a cyber risk management platform that ingests output from dozens of third-party scanners (Tenable, Qualys, Rapid7, Wiz, Snyk, GitHub Advanced Security, Microsoft Defender, and similar), correlates findings across asset records, and pushes remediation campaigns into ticketing. The buyer assumption is that the scanners are already deployed and the team needs an orchestration layer above them. SecPortal is the opposite shape: scanning, manual finding entry, AI report generation, branded client portal, and the engagement record live inside one workspace.

No engagement, scope, or deliverable model

Vulcan Cyber is organised around the asset, the finding, and the remediation campaign rather than around a scoped engagement with a kickoff, a defined target list, a final report, and a closure date. If the work you ship is a pentest, a vulnerability assessment, a code review, or a compliance audit with a contract scope and a deliverable, Vulcan does not carry that record.

No native scanning of external domains, web apps, or code

Vulcan does not run its own external domain scan, authenticated web scan, or SAST/SCA code scan. It depends on the buyer already paying for separate Tenable, Qualys, Rapid7, Burp, Snyk, or GitHub Advanced Security licenses to populate the platform. SecPortal includes 16 external domain scan modules, 17 authenticated web modules, and SAST plus SCA code scanning via Semgrep on its own subscription.

No branded client portal on your subdomain

Vulcan Cyber output lives inside the Vulcan console. There is no white-label portal a security firm or in-house team can hand to an external client or to a stakeholder business unit under their own brand. SecPortal serves a branded client portal on the tenant subdomain so every finding, retest, remediation thread, and report download lives under your name rather than the vendor name.

No AI-generated executive summaries, technical writeups, or remediation guidance

Vulcan generates remediation campaigns and risk reports from the underlying scanner data, but it does not generate executive summaries, technical pentest writeups, or narrative remediation roadmaps. SecPortal uses Claude to draft executive, technical, and remediation deliverables from the live findings record so the deliverable goes out without separate writeup time.

Sales-led procurement, asset-based licensing, post-acquisition product change

Vulcan Cyber pricing was sales-led with asset-based licensing prior to its 2025 acquisition by Tenable. Following the acquisition, customers are seeing the product positioned alongside Tenable One exposure management, with roadmap and licensing aligned to the Tenable bundle. Buyers looking for an independent vendor with transparent pricing are evaluating alternatives. SecPortal pricing is published on the website with a free plan, monthly Pro and Team tiers, and no annual contract floor.

Who each platform is the right fit for

Vulcan Cyber and SecPortal solve different problems for different buyers. The honest answer is that the right tool depends on whether you are stitching together six existing scanner contracts or running scoped engagements and findings on one workspace.

Vulcan Cyber fits large enterprises with many scanners already in place

If you are a large internal security team running Tenable, Qualys, Rapid7, Wiz, Snyk, and GitHub Advanced Security in parallel and the bottleneck is correlating their output into one prioritised remediation queue piped into ServiceNow or Jira, Vulcan was built for that orchestration shape. The buyer assumption is multiple existing scanner contracts plus the budget for an aggregation layer above them.

SecPortal fits teams who want scanning, findings, reports, and delivery in one workspace

If you are a penetration testing firm, an MSSP, a consultancy, an AppSec team, a vulnerability management team, or an in-house security function that wants the scanner, the finding record, the AI report, the branded portal, and the invoice all on one tenant, SecPortal carries that lifecycle without forcing you to license six other tools first.

SecPortal fits buyers who want findings to live somewhere they own

If you want every finding, retest, remediation thread, and report to live in a workspace under your brand (rather than scattered across vendor consoles, Vulcan dashboards, and ticketing systems), SecPortal is the workspace that holds that record across vendors and across years. Findings can still be imported from Nessus, Burp Suite, or CSV when scanners outside SecPortal are part of the picture.

Transparent pricing, no procurement cycle

SecPortal pricing is published on the website and self-service from sign-up. There is no annual contract floor, no per-asset licensing model, and no sales call required before you can run a real engagement.

SecPortal Free

Free forever

1 user, 3 clients, 2 engagements per client, 3 AI credits, 6 core scan modules.

SecPortal Pro

From $149/month

All scan modules, 100 clients, 25 AI credits/month, branded client portal, invoicing, compliance tracking.

SecPortal Team

From $299/month

Up to 5 users, 75 AI credits/month, team management, activity audit trail with CSV export, MFA enforcement.

Why teams pick SecPortal over Vulcan Cyber

  • Run scoped engagements with a kickoff, deliverables, retests, and a final invoice on one record instead of an open-ended remediation campaign
  • Scan internally with 16 external modules, 17 authenticated modules, and SAST plus SCA code scanning rather than aggregating output from six other vendors
  • Generate executive, technical, and remediation deliverables with Claude from the live findings record
  • Deliver findings through a branded client portal on your tenant subdomain instead of through a vendor console or scheduled report email
  • Pair every retest to the original finding so the closure record holds up under audit
  • Map findings across 21 framework templates including OWASP, ISO 27001, SOC 2, PCI DSS, NIST 800-53, NIST 800-171, FedRAMP, MITRE ATT&CK, DORA, NIS2, CIS Controls, and Essential Eight
  • Store privileged scan credentials encrypted at rest with AES-256-GCM and rotate them through the in-product credential vault
  • Invoice clients or business units directly from the engagement record through Stripe Connect
  • Start on the free plan and upgrade without procurement, an asset-count audit, or a sales call

Related reading

If you are evaluating how to run an in-house vulnerability management programme or a delivery operation rather than pay for an aggregation layer above six existing scanners, the pages below cover the workflows and adjacent comparisons that come up most often.

Scanning, findings, reports, and delivery on one workspace

Run scoped engagements, generate AI reports, and ship findings through a branded client portal without licensing six other scanners first. Start free.

No credit card required. Free plan available forever.