Vulnerability Visualization - List of Manufacturers, Suppliers, Companies and Products

Vulnerability Visualization Product List

1~2 item / All 2 items

Displayed results

Achieve reduced operational costs and risks! Visualize vulnerabilities with Invicti.

By setting the target website and starting the scan, vulnerabilities can be automatically detected! No special knowledge of security is required.

Invicti can automatically detect vulnerabilities by setting up the target website and starting a scan. By utilizing the scheduling feature, it is also possible to configure regular scan executions. The vulnerabilities detected in the scan results are displayed in a list categorized by severity, and reports can be generated in formats compliant with various compliance requirements. These features simultaneously reduce security-related operational costs and mitigate the risk of being affected by attacks from unknown threats.

  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Visualize inherent vulnerabilities! Web vulnerability scanner 'Invicti'

Scan websites from the outside and visualize inherent vulnerabilities! Achieve both reduced operational costs and risk mitigation simultaneously.

"Invicti" is a web vulnerability scanner that automatically detects vulnerabilities by setting up the target website and starting the scan. By utilizing the scheduling feature, it is also possible to configure regular scan executions. The vulnerabilities detected in the scan are displayed in a list categorized by their severity, and reports can be generated in formats compliant with various compliance requirements. 【Features】 ■ Centralized management of detected vulnerabilities and confirmation of results regardless of time and place, as well as re-testing after vulnerability remediation. ■ Detection and scanning of applications, services, and technologies used within the website, and identification of areas that require protection. ■ Scheduling feature that enables regular automated scans. ■ Scanning for vulnerabilities listed in compliance requirements such as OWASP Top 10 and PCI DSS, and creation of reports in accordance with each requirement. *For more details, please refer to the PDF materials or feel free to contact us.

  • Scanner

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration