Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

As the top choice for automated web application security testing, Acunetix by Invicti stands out as the preferred security solution among Fortune 500 firms. DevSecOps teams can efficiently navigate through complexities to identify hidden risks and address serious vulnerabilities, allowing for comprehensive detection and reporting on various security flaws. Featuring a state-of-the-art crawler that adeptly handles HTML5, JavaScript, and single-page applications, Acunetix facilitates the thorough examination of intricate, authenticated applications, providing a clearer understanding of an organization's risk profile. Its status as a leader in the field is well-deserved, as the technology behind Acunetix is the only one available that can autonomously identify out-of-band vulnerabilities, thus ensuring complete management, prioritization, and oversight of vulnerability threats based on their severity. Additionally, Acunetix is offered in both online and on-premise versions, seamlessly integrating with popular issue trackers and web application firewalls, which allows DevSecOps teams to maintain momentum while developing cutting-edge applications. This unique combination of features not only enhances security but also streamlines the workflow for teams dedicated to keeping their applications secure.

Description

DevSecOps Next Generation - Securing Your Binaries. Identify security flaws and license violations early in development and block builds that have security issues before deployment. Automated and continuous auditing and governance of software artifacts throughout the software development cycle, from code to production. Additional functionalities include: - Deep recursive scanning components, drilling down to analyze all artifacts/dependencies and creating a graph showing the relationships between software components. - On-Prem or Cloud, Hybrid, Multi-Cloud Solution - An impact analysis of how one issue in a component affects all dependent parts with a display chain displaying the impacts in a component dependency diagram. - JFrog's vulnerability database is continuously updated with new component vulnerabilities data. VulnDB is the industry's most comprehensive security database.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

ArmorCode
Kondukto
Phoenix Security
Axonius
Boozang
Centraleyezer
Chainguard
Cider
Dradis
Imperva DDoS Protection
Jenkins
Jira Work Management
NAVEX IRM
OpsLevel
Prometheus
ReleaseIQ
Scuba Database Vulnerability Scanner
SecurityHQ
ThreadFix
WordPress

Integrations

ArmorCode
Kondukto
Phoenix Security
Axonius
Boozang
Centraleyezer
Chainguard
Cider
Dradis
Imperva DDoS Protection
Jenkins
Jira Work Management
NAVEX IRM
OpsLevel
Prometheus
ReleaseIQ
Scuba Database Vulnerability Scanner
SecurityHQ
ThreadFix
WordPress

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Invicti Security

Founded

2018

Country

United States

Website

acunetix.com

Vendor Details

Company Name

JFrog

Founded

2008

Country

United States

Website

jfrog.com/xray/

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Continuous Integration

Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Alternatives

Alternatives

aqua cloud Reviews

aqua cloud

aqua cloud GmbH
Astra Pentest Reviews

Astra Pentest

Astra Security
Invicti Reviews

Invicti

Invicti Security
AppTrana Reviews

AppTrana

Indusface