Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Ossisto 365 IT Scanner offers thorough assessments of IT risks, effortlessly revealing concealed problems within Microsoft Active Directory, while also providing valuable suggestions for addressing AD risks, enhancing security, and implementing hardening measures. Furthermore, it extends its assessment capabilities to include various other Microsoft Server Technologies, ensuring a comprehensive approach to IT risk management.

Description

Introducing Scuba, a complimentary vulnerability scanner designed to reveal concealed security threats within enterprise databases. This tool allows users to conduct scans to identify vulnerabilities and misconfigurations, providing insight into potential risks to their databases. Furthermore, it offers actionable recommendations to address any issues detected. Scuba is compatible with various operating systems, including Windows, Mac, and both x32 and x64 versions of Linux, and boasts an extensive library of over 2,300 assessment tests tailored for prominent database systems such as Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2, and MySQL. With Scuba, users can efficiently identify and evaluate security vulnerabilities and configuration deficiencies, including patch levels. Running a Scuba scan is straightforward and can be initiated from any compatible client, with an average scan duration of just 2-3 minutes, depending on the complexity of the database, the number of users and groups, as well as the network connection. Best of all, no prior installation or additional dependencies are necessary to get started.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Microsoft 365
Microsoft Azure
SQL Server
Acunetix
Amazon Web Services (AWS)
BMC AMI Data for Db2
Buyer Discovery
Forcepoint CASB
Goldfish
Intelligent Management Center
Microsoft Exchange
MySQL
Oracle Cloud Infrastructure
Proofpoint Cloud App Security Broker (CASB)
SolarWinds Access Rights Manager
Teradata VantageCloud
Veracode
Vormetric Data Security Platform

Integrations

Microsoft 365
Microsoft Azure
SQL Server
Acunetix
Amazon Web Services (AWS)
BMC AMI Data for Db2
Buyer Discovery
Forcepoint CASB
Goldfish
Intelligent Management Center
Microsoft Exchange
MySQL
Oracle Cloud Infrastructure
Proofpoint Cloud App Security Broker (CASB)
SolarWinds Access Rights Manager
Teradata VantageCloud
Veracode
Vormetric Data Security Platform

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Ossisto 365

Founded

2019

Country

United States

Website

ossisto365.com

Vendor Details

Company Name

Imperva

Founded

2002

Country

United States

Website

www.imperva.com/resources/free-cyber-security-testing-tools/scuba-database-vulnerability-scanner/

Product Features

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

Server Management

CPU Monitoring
Credential Management
Database Servers
Email Monitoring
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Adaxes Reviews

Adaxes

Softerra
I-Insight Reviews

I-Insight

Threeisquared
DBArtisan Reviews

DBArtisan

IDERA