Network Penetration Testing10

Select Up to 5 Products to Compare

  • Product Info
  • Resources
  • Awards
  • Certifications & Compliance
Product Vendor   Description License
SC Magazine (US) the 451 group White Papers InfoWorld ISSA Journal Awards CVE SCAP PCIDSS PCI ASV FDCC
Avalanche Vulnerability Assessment Spirent Communications   Avalanche Vulnerability Assessment provides integrated ThreatEx capabilities for attack and vulnerability generation. You have a powerful ally in the ongoing battle to defend your network against malicious traffic. By exposing devices and networks to actual threats in a controlled test lab environment, you can protect your network from malicious entities before costly damage is done. The Avalanche Vulnerability Assessment solution offers networks protection with three key features: Avalanche Attack Designer enables threats to be created within minutes without time-intensive programming. New threats are detected and posted to the Spirent Threat Knowledge Base, a continuously updated library of threat definitions. Finally, everything can be automated via the Avalanche API, which streamlines and automates the testing process by delivering a complete TCL scripting environment. The Avalanche Vulnerability Assessment solution is available on all Avalanche hardware options to provide network equipment vendors and enterprises with the comprehensive and flexible network vulnerability testing solution they need. Avalanche Vulnerability Assessment provides integrated ThreatEx capabilities for attack and vulnerability generation. You have a powerful ally in the... Commercial                    
CANVAS Immunity Inc   Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to penetration testers and security professionals worldwide. To see CANVAS in action please see our movies. Immunity's CANVAS makes available hundreds of exploits, an automated exploitation system, and a comprehensive, reliable exploit development framework to... Commercial                    
Core CloudInspect Core Security Technologies   Boost Confidence in the Cloud with Core CloudInspect Cloud Security Testing for Amazon AWS By proactively testing your Amazon AWS instances against real-world threats, Core CloudInspect™ helps you confidently confirm whether your cloud deployments are secure. Your company’s reputation, customer trust, intellectual property, sensitive data, and compliance status depend on your cloud-based infrastructure as much as they do on your in-house IT environment – so security was likely a key consideration when you selected Amazon AWS as your cloud provider. While Amazon has a robust process for implementing and maintaining host system and virtualization layer security, it’s your responsibility to continuously maintain and test the security of your guest operating systems and applications running on AWS. Ensuring ongoing security in the cloud requires that you not only equip your AWS instances with defensive security controls, but also regularly assess their ability to withstand the latest data breach threats. Boost Confidence in the Cloud with Core CloudInspect Cloud Security Testing for Amazon AWS By proactively testing your Amazon AWS instances against... Commercial     Read Review     Industry Innovators
SC Magazine
         
CORE INSIGHT™ Enterprise Core Security Technologies   CORE INSIGHT Enterprise helps security executives to benchmark and measure enterprise-wide security posture, verify actual business risks, and validate mandated security controls. CORE INSIGHT continuously replicates threats seeking to compromise defined business assets through web, network and client-side channels. The product's centralized dashboards and reports track the efficacy of security controls in terms of relevant operational areas, such as specific business units or compliance mandates. CORE INSIGHT Enterprise helps security executives to benchmark and measure enterprise-wide security posture, verify actual business risks, and validate... Commercial     Read Review     Industry Innovators
SC Magazine
TechWorld Awards 2008
TechWorld
         
Core WebVerify™ Core Security Technologies   Verify Web Application Security Beyond the Web Application Attackers won’t stop once your web application is breached, so why should your security test? Core WebVerify™ automated security testing software provides real-world intelligence on both your organization’s web application exposures and their implications for your broader operations – using the same techniques employed by actual attackers. With WebVerify, you not only identify exploitable application weaknesses, but also verify the security of application databases, the web server, backend network systems, and even end users against subsequent attacks. The result is a more holistic assessment of your web application security as it relates to the rest of your business. Verify Web Application Security Beyond the Web Application Attackers won’t stop once your web application is breached, so why should your security... Commercial     Read Review     Industry Innovators
SC Magazine
         
Metasploit Community Edition Rapid7, LLC   Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. Easily manage and conduct penetration tests Cyber criminals are successful in penetrating networks of enterprises and government agencies every day, creating huge security and compliance issues. Metasploit Community Edition simplifies network discovery and penetration testing spot-checks with specific exploits, increasing the effectiveness of vulnerability scanners such as Nexpose - for free. Importing third-party vulnerability scanner reports, it helps prioritize remediation and eliminates false positives, increasing productivity and providing true security risk intelligence. Defenders can demonstrate the impact of vulnerabilities to IT operations to obtain buy-in for remediation. Metasploit Community Edition simplifies network discovery and vulnerability verification for specific exploits, increasing the effectiveness of... Freeware                    
SAINTexploit™ SAINT Corporation   The SAINTexploit™ Penetration Testing Tool is the ultimate resource to demonstrate the security—or vulnerability—of your network. SAINTexploit goes beyond simply detecting vulnerabilities to safely exploiting them. The first integrated vulnerability and penetration testing tool, SAINTexploit is part of the complete solution SAINT offers to evaluate the vulnerabilities on your network. This fully automated product examines potentially vulnerable services discovered by SAINT, exposes points where an attacker could breach the network, and exploits the vulnerability to prove its existence without a doubt. The file browsing and command execution capabilities resulting from a successful exploit provide undeniable evidence of a network vulnerability. The SAINTexploit™ Penetration Testing Tool is the ultimate resource to demonstrate the security—or vulnerability—of your network. SAINTexploit goes... Commercial Read Review         Industry Innovator
SC Magazine
SANS WhatWorks - 4.3 Penetration Testing and Ethical Hacking
SANS
Best of 2007 Products
SC Magazine
         
The Penetrator SecPoint   Do You Know If Your Networks Are Secure? Prevent Hackers from entering your servers and network. You get the following benefits: Identify Vulnerabilities on your network A solution to fix the found vulnerabilities Automated Vulnerability Scanning Vulnerability Scanning Pen Testing Application Security Vulnerability Assessment Was Web Application Scanning Blackhat SEO Scannining Google Hack Database Do You Know If Your Networks Are Secure? Prevent Hackers from entering your servers and network. You get the following benefits: Identify... Commercial Read Review