hiab web application scanning

1
HIAB Web Application Scanning Key Features: Scan thousands of web pages for vulnerabilities quickly and easily on ad-hoc or recurring basis. Highly accurate Cross Site Scripting and SQL Injection vulnerability detection. Support for scanning virtual hosted sites. Easy to use reports that allow quick remediation guidance. Fulfills PCI ASV Requirement 11.2 Frequently updated with new vulnerability scans. Advanced user definable scope setting such as IP ranges, URI seed lists, URI white lists, URI black lists and virtual hosts. Scan crawler can be tuned for maximum links, request delays, and custom transfer timeouts. New settings allow for many types of authenticated scanning such as; HTML form, NTLM, & HTTP basic authentication. Highly accurate detection of remote file include, local file include, command injection, code injec- tion, format string issues, cross-site request forgery, and CRLF injection. Key Benefits: Integrated with existing tools to provide unified reporting of both network and web vulnerabilities. Discovers vulnerabilities in custom web sites and applications not just publicly available web applications. No software to download or install. High speed scanning with average scan times under one hour. All scan data is securely stored locally on the appliance without leaving the organizations network. | HIAB WAS

Upload: others

Post on 12-Sep-2021

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: HIAB Web Application Scanning

HIAB Web Application Scanning

Key Features:

Scan thousands of web pages for vulnerabilities quickly and easily on ad-hoc or recurring basis.Highly accurate Cross Site Scripting and SQL Injection vulnerability detection.Support for scanning virtual hosted sites.Easy to use reports that allow quick remediation guidance.Fulfills PCI ASV Requirement 11.2Frequently updated with new vulnerability scans.Advanced user definable scope setting such as IP ranges, URI seed lists, URI white lists, URI black lists and virtual hosts.Scan crawler can be tuned for maximum links, request delays, and custom transfer timeouts.New settings allow for many types of authenticated scanning such as; HTML form, NTLM, & HTTP basic authentication. Highly accurate detection of remote file include, local file include, command injection, code injec-tion, format string issues, cross-site request forgery, and CRLF injection.

Key Benefits:

Integrated with existing tools to provide unified reporting of both network and web vulnerabilities.Discovers vulnerabilities in custom web sites and applications not just publicly available web applications.No software to download or install.High speed scanning with average scan times under one hour.All scan data is securely stored locally on the appliance without leaving the organizations network.

| HIAB WAS

••

•••

••

QKomm
Rechteck
QKomm
Textfeld
Your value added reseller: QKomm GmbH In Gerderhahn 36a, 41812 Erkelenz, Germany Tel.: +49 24 31/ 980 893, Fax: +49 24 31/ 980 894, e-mail: [email protected], www.qkomm.de, www.GDPdU-email.de , www.qcom-shop.de
QKomm
Platziertes Bild