Categories
Problems that solves
Employee personal use of corporate IT during working hours
Risk or Leaks of confidential information
Non-compliant with IT security requirements
Unauthorized access to corporate IT systems and data
Values
Reduce Costs
Ensure Security and Business Continuity
Netsparker Standard
Netsparker Standard is available as a Windows application with built-in penetration testing and reporting tools, many of which allow for fully automated security testing.
About Product
Description
Netsparker Standard is used to conduct manual analysis and exploitation, and is ideal in situations when more advanced testing is required, such as on an individual component that requires user input.
The main features of Netsparker Standard:
- Search for vulnerabilities in any type of website automatically. Netsparker Standard uses a Chrome based crawling engine. It can crawl and scan any type of modern and custom web application including HTML5, Web 2.0 and Single Page Applications (SPA).
- Save Time & Costs with Proof-Based Scanning™. Netsparker pioneered Proof-Based Scanning™, a technology that automatically verifies identified vulnerabilities, demonstrating that they are real and not false positives.
- Highest scanning accuracy. The Netsparker web application security uses the Netsparker Hawk vulnerability testing infrastructure to identify even the the most complex vulnerabilities, such as Server Side Request Forgery (SSRF) and Out-of-Band and Second Order vulnerabilities.
- Ideal for manual web application scanning. Every feature and aspect of the scan, including automated ones, is customizable (custom cookies, anti-CSRF tokens, custom HTTP headers and more).
- Generate Any Type Of Report For Compliance And Management. The Netsparker web application security scanner has a built in reporting tool to help you generate any type of report you want, including compliance reports for PCI DSS, HIPAA and OWASP Top 10.
- Proof-Based Scanning
- Integration Capabilities
- Pen Testing Tools
- Heuristic URL Rewrite Detection
- Advanced (Out of Band) Vulnerability Detection
Scheme of work
Competitive products
User features
Roles of Interested Employees
Chief Information Officer
Chief Technical Officer
Chief IT Security Officer
IT Security and Risk Management
Organizational Features
Internet access is available for employees