Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Edgescan offers on-demand vulnerability scanning for web applications, allowing you to schedule assessments as frequently as needed. You can continuously monitor risk validation, trending, and metrics, all accessible through an advanced dashboard that enhances your security intelligence. The vulnerability scanning service is available for unlimited use, enabling you to retest whenever you desire. Additionally, Edgescan provides notifications via SMS, email, Slack, or Webhook whenever a new vulnerability is identified. Our Server Vulnerability Assessment encompasses over 80,000 tests and is tailored to ensure that your deployment, whether in the cloud or on-premises, is both secure and properly configured. Each vulnerability is rigorously validated and assessed for risk by our expert team, with results readily available on the dashboard for tracking and reporting purposes. Recognized as a certified ASV (Approved Scanning Vendor), Edgescan surpasses the PCI DSS requirements by delivering continuous and verified vulnerability assessments to maintain your system's integrity and security. This commitment to comprehensive security solutions helps organizations stay ahead of potential threats and safeguard their digital assets effectively.
Description
Comprehensive Vulnerability Assessment for Network Security. Vulnerability scans and network scanners can identify top cybersecurity risks like misconfigured firewalls, malware hazards and remote access vulnerabilities. They can be used to help with cyber security and compliance mandates such as PCI Compliance (PCI DSS), and HIPAA.
You can add and remove targets using your Perimeter Scan Portal.
Mass uploading scan targets and groups can be done.
To make it easier to manage scan targets by location, network type or unique circumstances in your organization, you can group and label them.
You can run port scans on the most sensitive targets more often, test in scope PCI targets every quarter, or test designated IPs following changes to your network.
Vulnerability scanning reports include the target, vulnerability type, and service (e.g. https, MySQL, etc.). ), and the severity (low, medium, or high) of each vulnerability.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Axonius
Ivanti Neurons for RBVM
Jira
Microsoft 365
Microsoft Sentinel
Microsoft Teams
SecurityMetrics
Slack
ThreatAware
Integrations
Amazon Web Services (AWS)
Axonius
Ivanti Neurons for RBVM
Jira
Microsoft 365
Microsoft Sentinel
Microsoft Teams
SecurityMetrics
Slack
ThreatAware
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$99.00/one-time
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Edgescan
Founded
2011
Country
United Kingdom
Website
www.edgescan.com
Vendor Details
Company Name
SecurityMetrics
Founded
2000
Country
United States
Website
www.securitymetrics.com/vulnerability-scan
Product Features
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection