Vulnerability Visualization - メーカー・企業と製品の一覧 | イプロス

Vulnerability Visualizationの製品一覧

1~2 件を表示 / 全 2 件

表示件数

Achieve reduced operational costs and risks! Visualize vulnerabilities with Invicti.

By setting the target website and starting the scan, vulnerabilities can be automatically detected! No special knowledge of security is required.

Invicti can automatically detect vulnerabilities by setting up the target website and starting a scan. By utilizing the scheduling feature, it is also possible to configure regular scan executions. The vulnerabilities detected in the scan results are displayed in a list categorized by severity, and reports can be generated in formats compliant with various compliance requirements. These features simultaneously reduce security-related operational costs and mitigate the risk of being affected by attacks from unknown threats.

  • Security Assessment
  • Vulnerability Visualization

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Visualize inherent vulnerabilities! Web vulnerability scanner 'Invicti'

Scan websites from the outside and visualize inherent vulnerabilities! Achieve both reduced operational costs and risk mitigation simultaneously.

"Invicti" is a web vulnerability scanner that automatically detects vulnerabilities by setting up the target website and starting the scan. By utilizing the scheduling feature, it is also possible to configure regular scan executions. The vulnerabilities detected in the scan are displayed in a list categorized by their severity, and reports can be generated in formats compliant with various compliance requirements. 【Features】 ■ Centralized management of detected vulnerabilities and confirmation of results regardless of time and place, as well as re-testing after vulnerability remediation. ■ Detection and scanning of applications, services, and technologies used within the website, and identification of areas that require protection. ■ Scheduling feature that enables regular automated scans. ■ Scanning for vulnerabilities listed in compliance requirements such as OWASP Top 10 and PCI DSS, and creation of reports in accordance with each requirement. *For more details, please refer to the PDF materials or feel free to contact us.

  • Scanner
  • Vulnerability Visualization

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録