DefectDojo10Security
|
SecurityMetrics Perimeter ScanSecurityMetrics
|
|||||
Related Products
|
||||||
About
Take DefectDojo for a spin and review the demo of DefectDojo and login with sample credentials. DefectDojo is available on Github and has a setup script for easy installation. A docker container with a pre-built version of DefectDojo is available. Know exactly when new vulnerabilities are introduced in a build or remediated. Tracking when a product is assessed is easily accomplished using DefectDojo's API to track security tests that are run on each build. DefectDojo has the ability to track the build-id, commit hash, branch or tag, orchestration server, source code repo, and build server for every on-demand security test. Various reports are available for tests, engagements, and products. Products can be grouped into critical products to track products that are critical to your organization. Similar findings can be easily merged into one finding to provide developers one finding instead of multiple findings.
|
About
Comprehensive Vulnerability Assessment Scan For Network Security. Vulnerability scans and network scans find top cybersecurity risks such as misconfigured firewalls, malware hazards, remote access vulnerabilities, and can be used for cyber security or compliance mandates like PCI Compliance (PCI DSS) and HIPAA.
Add and remove your own targets through your Perimeter Scan Portal.
You can mass upload scan targets and groups.
You can group and label scan targets to make it easier to manage by location, network type, or unique circumstances at your organization.
Run port scans on your most sensitive targets more frequently, test in scope PCI targets quarterly, or test designated IPs after changes to your network with simplicity.
Vulnerability scanning reports list the target, vulnerability type, service (e.g., https, MySQL, etc.), and the severity of each vulnerability (low, medium, high).
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Developers and companies requiring an application vulnerability management solution
|
Audience
Ecommerce, payments, e-commerce, merchant, PCI compliance, HIPAA compliance, HIPAA, PCI
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$99.00/one-time
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company Information10Security
United States
www.defectdojo.org
|
Company InformationSecurityMetrics
Founded: 2000
United States
www.securitymetrics.com/vulnerability-scan
|
|||||
Alternatives |
Alternatives |
|||||
|
|
|||||
|
|
|||||
|
||||||
|
||||||
Categories |
Categories |
|||||
Vulnerability Management Features
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
|
||||||
Integrations
Crashtest Security
CycloneDX
Deepinfo
Probely
SecurityMetrics
Semgrep
Trivy
Workfolio Website
|
Integrations
Crashtest Security
CycloneDX
Deepinfo
Probely
SecurityMetrics
Semgrep
Trivy
Workfolio Website
|
|||||
|
|