Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 1 Rating

Total
ease
features
design
support

Description

As the top choice for automated web application security testing, Acunetix by Invicti stands out as the preferred security solution among Fortune 500 firms. DevSecOps teams can efficiently navigate through complexities to identify hidden risks and address serious vulnerabilities, allowing for comprehensive detection and reporting on various security flaws. Featuring a state-of-the-art crawler that adeptly handles HTML5, JavaScript, and single-page applications, Acunetix facilitates the thorough examination of intricate, authenticated applications, providing a clearer understanding of an organization's risk profile. Its status as a leader in the field is well-deserved, as the technology behind Acunetix is the only one available that can autonomously identify out-of-band vulnerabilities, thus ensuring complete management, prioritization, and oversight of vulnerability threats based on their severity. Additionally, Acunetix is offered in both online and on-premise versions, seamlessly integrating with popular issue trackers and web application firewalls, which allows DevSecOps teams to maintain momentum while developing cutting-edge applications. This unique combination of features not only enhances security but also streamlines the workflow for teams dedicated to keeping their applications secure.

Description

AppTrana, a fully managed Web app firewall, includes Web application scanning to identify application-layer vulnerabilities, instant and managed Risk-based Protection with its WAF and Managed DDOS, and Bot Mitigation service. Web site acceleration can also be provided with a bundled CDN, or can integrate with an existing CDN. All this is backed by a 24x7 managed security expert service that provides policy updates and custom rules with zero false positive guarantee. Only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ArmorCode
Axonius
Bizzy
Centraleyezer
CyberArk Workforce Identity
Dradis
Enso
Hexway Pentest Suite
Imperva CDN
Imperva DDoS Protection
Jenkins
Jira Work Management
Kondukto
NAVEX IRM
Nucleus
Phoenix Security
Scuba Database Vulnerability Scanner
SecurityHQ
ThreadFix
ThreatAdvisor

Integrations

ArmorCode
Axonius
Bizzy
Centraleyezer
CyberArk Workforce Identity
Dradis
Enso
Hexway Pentest Suite
Imperva CDN
Imperva DDoS Protection
Jenkins
Jira Work Management
Kondukto
NAVEX IRM
Nucleus
Phoenix Security
Scuba Database Vulnerability Scanner
SecurityHQ
ThreadFix
ThreatAdvisor

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$99/month
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Invicti Security

Founded

2018

Country

United States

Website

acunetix.com

Vendor Details

Company Name

Indusface

Founded

2012

Country

India

Website

www.indusface.com/web-application-firewall.php

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

CDN

Content Acceleration
DDoS Protection
Load Balancing
Managed CDN
Multi-CDN Switching
Reporting/Analytics
Software Downloads
Transparent Caching
Video Streaming
Web Application Firewalls (WAF)

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

DDoS Protection

DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

Alternatives

Astra Pentest Reviews

Astra Pentest

Astra Security
Invicti Reviews

Invicti

Invicti Security
Invicti Reviews

Invicti

Invicti Security
AppTrana Reviews

AppTrana

Indusface
BooleBox Reviews

BooleBox

Boole Server