Comparing the top vulnerability management tools