Average Ratings 1 Rating

Total
ease
features
design
support

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

API Access

Has API

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Screenshots View All

Integrations

Jira
ArmorCode
Axonius
Bizzy
Centraleyezer
CyberArk Workforce Identity
Dradis
Enso
GitHub
Hexway Pentest Suite
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jira Work Management
NAVEX IRM
Nucleus
Phoenix Security
SecurityHQ
ThreadFix
WordPress

Integrations

Jira
ArmorCode
Axonius
Bizzy
Centraleyezer
CyberArk Workforce Identity
Dradis
Enso
GitHub
Hexway Pentest Suite
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jira Work Management
NAVEX IRM
Nucleus
Phoenix Security
SecurityHQ
ThreadFix
WordPress

Integrations

Jira
ArmorCode
Axonius
Bizzy
Centraleyezer
CyberArk Workforce Identity
Dradis
Enso
GitHub
Hexway Pentest Suite
Imperva CDN
Imperva DDoS Protection
Imperva WAF
Jira Work Management
NAVEX IRM
Nucleus
Phoenix Security
SecurityHQ
ThreadFix
WordPress

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Invicti Security

Founded

2018

Country

United States

Website

acunetix.com

Vendor Details

Company Name

Positive Technologies

Founded

2002

Country

United Kingdom

Website

www.ptsecurity.com/ww-en/products/ai/

Vendor Details

Company Name

PortSwigger

Founded

2008

Country

United Kingdom

Website

portswigger.net/web-security

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Computer Security

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Source Code Management

Access Controls/Permissions
Bug Tracking
Build Automation
Change Management
Code Review
Collaboration
Continuous Integration
Repository Management
Version Control

Static Application Security Testing (SAST)

Application Security
Dashboard
Debugging
Deployment Management
IDE
Multi-Language Scanning
Real-Time Analytics
Source Code Scanning
Vulnerability Scanning

Static Code Analysis

Analytics / Reporting
Code Standardization / Validation
Multiple Programming Language Support
Provides Recommendations
Standard Security/Industry Libraries
Vulnerability Management

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Security Awareness Training

Analytics / Reporting
Certification Training
Custom Test Building
Gamification
Industry Benchmarking
Non-Email Based Testing
Online Courses
Phishing Simulation
Pre-Assessments
Prebuilt Training Library

Alternatives

Alternatives

Alternatives

Astra Pentest Reviews

Astra Pentest

Astra Security
myACI Learn Reviews

myACI Learn

ACI Learning
Invicti Reviews

Invicti

Invicti Security
AppTrana Reviews

AppTrana

Indusface
JBL Cybersecurity Reviews

JBL Cybersecurity

Jones & Bartlett Learning