TECHNOLOGIES

Application security

Vulnerability management

Active search systems, identification and assessment of vulnerability risk level in systems and applications infrastructure.

Vulnerability scanners function as risk management – identification and assessment of vulnerabilities risk, enabling responsible executives to identify weaknesses in an information protection system before attackers do it. Modern vulnerability assessment solutions have a single, centralized console.

Console functionality:

comfortable and flexible vulnerability scanner management;

scan templates configuration;

administration; scanning;

reports generating.

PRODUCTS

RESOURCES

Acunetix

Web Vulnerability Scanner

Web Vulnerability Scanner

Website analysis and vulnerability detection.

Intel Security

Database Security

Database Security

Offers real-time, reliable protection for business-critical databases from external, internal, and intra-database threats.

Hewlett Packard Enterprise

HP Fortify on Demand

HP Fortify on Demand

Scan, access and report on the security of all the applications your organization uses to manage your business.

HP Fortify Static Code Analyzer

HP Fortify Static Code Analyzer

Scans source code, identifies root causes of software security vulnerabilities and correlates and prioritizes results — giving customer line–of–code guidance for closing gaps in your security.

HP WebInspect

HP WebInspect

An automated and configurable web application security and penetration testing tool that mimics real-world hacking techniques and attacks.

elements: 1-5

all elements: 5

Analytics articles

An Analysis of Black-box Web Vulnerability Scanners

An Analysis of Black-box Web Vulnerability Scanners

Identification of security issues in web applications based on an evaluation of eleven black-box web vulnerability scanners.

elements: 1-1

all elements: 1

15.11.2017 9:00 | News

26.10.2017 16:57 |

25.10.2017 16:56 |

Locky1024 attack analysis

17.10.2017 18:19 | News

13.10.2017 0:00 | News

CASE STUDIES

More case studies

NEXT STEPS

Send a request

NEWSLETTER SUBSCRIBTION

Enter a valid email address
that can be used to receive newsletters