Related Products
|
||||||
About
Robust cloud solution for continuous web app discovery and detection of vulnerabilities and misconfigurations. Fully cloud-based, it’s easy to deploy and manage, and scales to millions of assets. WAS finds and catalogs all web apps in your network, including new and unknown ones, and scales from a handful of apps to thousands. With Qualys WAS, you can tag your applications with your own labels and then use those labels to control reporting and limit access to scan data. WAS’ dynamic deep scanning covers all apps on your perimeter, in your internal environment and under active development, and even APIs that support your mobile devices. It also covers public cloud instances, and gives you instant visibility of vulnerabilities like SQLi and XSS. Authenticated, complex and progressive scans are supported. With programmatic scanning of SOAP and REST API services, WAS tests IoT services and APIs used by mobile apps and modern mobile architectures.
|
About
Complete risk visibility and assurance from a single pane of glass. Organizations rely on ZeroNorth (formerly CYBRIC) for software and infrastructure risk management at the speed of business. The ZeroNorth platform accelerates and scales the discovery and remediation of software and infrastructure vulnerabilities. converting your manual and siloed efforts into a single, orchestrated process. Only the ZeroNorth platform enables organizations to orchestrate a consistent vulnerability discovery and remediation program, deliver continuous risk visibility and assurance, improve the value of existing scanning tools and help organizations move forward from any point in their journey to secure DevOps.
|
About
Consolidate your software vulnerability assessment with one single vRx agent. Let vRx do the work so you can focus on and remediate the threats that matter most. vRx's prioritization engine using CVSS framework bases prioritization, plus AI of the specific security posture of your organization, and maps your digital environment to help you prioritize critical vulnerabilities for mitigation. vRx maps the potential consequences of a successful exploit within your unique digital infrastructure. CVSS metrics and context-based AI mapping provide the data needed to prioritize and mitigate critical vulnerabilities. For each detected app, OS, or asset vulnerability, vRx provides recommended actions that help you eliminate potential risks and stay resilient.
|
||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
||||
Audience
IT security teams in search of a web application scanning solution to find, fix, and prevent security holes in web apps
|
Audience |
Audience
IT teams interested in a platform that helps monitor vulnerabilities
|
||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
||||
API
Offers API
|
API
Offers API
|
API
Offers API
|
||||
Screenshots and Videos |
Screenshots and VideosNo images available
|
Screenshots and Videos |
||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$5 per asset per month
Free Version
Free Trial
|
||||
Reviews/
|
Reviews/
|
Reviews/
|
||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
||||
Company InformationQualys
Founded: 1999
United States
www.qualys.com/apps/web-app-scanning/
|
Company InformationZeroNorth
United States
www.zeronorth.io
|
Company InformationVicarius
Founded: 2016
United States
www.vicarius.io
|
||||
Alternatives |
Alternatives |
Alternatives |
||||
|
|
|
|
||||
|
|
|
|||||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
Categories |
||||
IT Security Features
Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
Internet Usage Monitoring
Intrusion Detection System
IP Protection
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting
|
||||||
Integrations
Amazon Web Services (AWS)
Azure Marketplace
BeyondTrust Endpoint Privilege Management
Citrix Analytics
Clair
LinkedIn
NopSec
NorthStar Navigator
OpenText Enterprise Security Manager
Qualys TruRisk Platform
|
Integrations
Amazon Web Services (AWS)
Azure Marketplace
BeyondTrust Endpoint Privilege Management
Citrix Analytics
Clair
LinkedIn
NopSec
NorthStar Navigator
OpenText Enterprise Security Manager
Qualys TruRisk Platform
|
Integrations
Amazon Web Services (AWS)
Azure Marketplace
BeyondTrust Endpoint Privilege Management
Citrix Analytics
Clair
LinkedIn
NopSec
NorthStar Navigator
OpenText Enterprise Security Manager
Qualys TruRisk Platform
|
||||
|
|
|
|