Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Amazon Inspector serves as an automated service for security assessments that enhances the security and compliance posture of applications running on AWS. This service efficiently evaluates applications for potential exposure, vulnerabilities, and deviations from established best practices. Upon completing an assessment, Amazon Inspector generates a comprehensive list of security findings ranked by their severity levels. Users can access these findings either directly or through detailed assessment reports available via the Amazon Inspector console or API. The security assessments conducted by Amazon Inspector enable users to identify unwanted network accessibility of their Amazon EC2 instances, as well as any vulnerabilities present on those instances. Furthermore, assessments are structured around pre-defined rules packages that align with widely accepted security best practices and vulnerability definitions. To expedite mean time to recovery (MTTR), the service leverages over 50 sources of vulnerability intelligence, which aids in the rapid identification of zero-day vulnerabilities. This comprehensive approach ensures that organizations can maintain a robust security framework while efficiently addressing potential risks.
Description
OpenVAS serves as a comprehensive vulnerability scanning tool, offering both unauthenticated and authenticated assessments, as well as support for a wide range of internet and industrial protocols at various levels. The scanner is designed to be optimized for extensive scanning operations and features a robust internal programming language that allows users to create customized vulnerability tests. It acquires its vulnerability detection tests from a continually updated feed with a rich historical background. Since its inception in 2006, OpenVAS has been developed by Greenbone Networks, and it is an integral component of their commercial product line, the Greenbone Enterprise Appliance, which includes several other Open Source modules for enhanced vulnerability management. With its extensive capabilities, OpenVAS empowers organizations to bolster their security posture effectively.
API Access
Has API
API Access
Has API
Integrations
HivePro Uni5
AWS Marketplace
AWS Security Hub
Amazon EC2
Azure Marketplace
Certa
Conviso Platform
Core Impact
CyCognito
Cyver
Integrations
HivePro Uni5
AWS Marketplace
AWS Security Hub
Amazon EC2
Azure Marketplace
Certa
Conviso Platform
Core Impact
CyCognito
Cyver
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Amazon
Founded
1994
Country
United States
Website
aws.amazon.com/inspector/
Vendor Details
Company Name
Greenbone Networks
Country
Germany
Website
www.openvas.org
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection