online web security scanning service video storyboard for netsparker by advids

25

Upload: advids-video-creation-made-easy

Post on 11-Feb-2017

45 views

Category:

Business


0 download

TRANSCRIPT

advids.co

Storyboard

advids.co

advids.co

VO: Hackers are constantly trying to �nd and exploit security �aws to break into your website.

Scene 1 A map of the world with a web server icon in one location.

advids.co

Scene 1 Hacker icons pop up in di�erent parts of the world…dotted lines connect from the hacker iconsto the web server icons and malicious code icons �y towards the web server.

advids.co

VO: To beat hackers at their own game you need to �nd the vulnerabilities in your websites before hackers do.

Scene 2 Zoom into the web server and show a typical website mockup open up on a computer monitor.

advids.co

Scene 2 A scan like beam passes over the website mock-up

advids.co

Scene 2 Mock-up reveals di�erent vulnerabilities with typos and alert icon

SQL Injection

XSS

CSRF

LFI

RCEadvids.co

Scene 3Zoom out and show the website as an icon beside icons of

web application and web services. Above them logo of Netsparker.

Web applications

HTML PHP

JS

CSS

WWW

VO: Scan your websites, web applications and web services with Netsparker.

Web services

advids.co

Scene 4 Typos below

VO: You do not need to have access to the source-code, install an agent or use specialized software.

Access source code Install an agent Use specialized software

Web applications

HTML PHP

JS

CSS

WWW

Web services

advids.co

Scene 5 The typos disappear. A probe appears from the logo and casts a scanning light the icons.

VO: Simply point the Netsparker web application security scanner to your website and it will automatically �nd the security holes.

Web applications

HTML PHP

JS

CSS

WWW

Web services

advids.co

Scene 5 . Small red exclamation marks pop up above the icon.

Web applications

HTML PHP

JS

CSS

WWW

Web services

advids.co

Scene 6 The exclamation mark over the web app icon moves to the center of the screen,as the rest of the visual goes out of focus in the background.

VO: Netsparker's deadly-accurate scanning technology can �nd vulnerabilities in any type of custom and modern web application,

Vulnerability

advids.co

Scene 7 Scene continues.

Vulnerability

VO: regardless of the technology it is built with.

advids.co

Scene 8The visual is absorbed back into the Netsparker logo in the background as the rest of the screen

clears up and two icons appear alongside Netsparker logo showing thumbs-up signs

VO: E�ective use of Netsparker doesn't require you to be a seasoned security professional.

advids.co

Scene 8 Typo below

Easy-to-Use

advids.co

Scene 9 Everything disappears except the logo. Below a warning or alert sign with typo “Vulnerability”.

VO: Not only is it easy to use, upon �nding a vulnerability, Netsparker automatically exploits it in a safe way and generates a proof of exploitation.

Vulnerability

advids.co

Scene 9The alert sign unfurls into a command prompt mockup with dummy text.

The typo “Vulnerability” morphs into “Proof of Exploit”. Scroll through the mockup slowly.

Proof of Exploit

Command Injections

Vulnerability Details

Identified Database Bersion

Identified Database Name

Identified Database User

CLASSIFIATION

CONFIRMED CRITICAL

microsoft sql server 2014 - 12.0.4100.1 (x64)

shoppingcart

dbo_admin

advids.co

Scene 10The typos disappear and the command prompt disappears. A software window opens up out of

the Netsparker logo below. Show vulnerability listed. The Con�rmed box gets highlighted.

VO: Because the vulnerability has been con�rmed, you don't need to manually check for a false positive.

Command Injections

Vulnerability Details

Identified Database Bersion

Identified Database Name

Identified Database User

CLASSIFIATION

CONFIRMED CRITICAL

microsoft sql server 2014 - 12.0.4100.1 (x64)

shoppingcart

dbo_admin

advids.co

Scene 10 Typo below the window

Automatic Vulnerability Verification

Command Injections

Vulnerability Details

Identified Database Bersion

Identified Database Name

Identified Database User

CLASSIFIATION

CONFIRMED CRITICAL

microsoft sql server 2014 - 12.0.4100.1 (x64)

shoppingcart

dbo_admin

advids.co

Scene 11 Icons of a clock with spinning hands and reducing money stack appears.

VO: This saves you time and money.

advids.co

Scene 12Only the clock remains on screen…

Below a computer screen facing the camera shows Netsparker logo actively scanning a website

VO: Finally, you’ll be able to leave the o�ce on time because Netsparker does all the hard work for you.

advids.co

Scene 13 Below two lines snake out like a hierarchy chart and two versions of the Netsparker tool pop up.

VO: Netsparker scanner is available as a desktop-based software and as a multi-user cloud based service,

Netsparker Desktop

advids.co

Scene 14 Customer logos pop up around the earlier visual

VO: which has already helped world renowned companies ensure the security of all their websites.

advids.co

Scene 15

www.netsparker.com

VO: Choose what the best choose. Choose Netsparker.

advids.co