Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Edgescan offers on-demand vulnerability scanning for web applications, allowing you to schedule assessments as frequently as needed. You can continuously monitor risk validation, trending, and metrics, all accessible through an advanced dashboard that enhances your security intelligence. The vulnerability scanning service is available for unlimited use, enabling you to retest whenever you desire. Additionally, Edgescan provides notifications via SMS, email, Slack, or Webhook whenever a new vulnerability is identified. Our Server Vulnerability Assessment encompasses over 80,000 tests and is tailored to ensure that your deployment, whether in the cloud or on-premises, is both secure and properly configured. Each vulnerability is rigorously validated and assessed for risk by our expert team, with results readily available on the dashboard for tracking and reporting purposes. Recognized as a certified ASV (Approved Scanning Vendor), Edgescan surpasses the PCI DSS requirements by delivering continuous and verified vulnerability assessments to maintain your system's integrity and security. This commitment to comprehensive security solutions helps organizations stay ahead of potential threats and safeguard their digital assets effectively.

Description

Zenmap serves as the official graphical user interface for the Nmap Security Scanner. This free and open-source application is compatible with multiple platforms, including Linux, Windows, Mac OS X, and BSD, and is designed to simplify Nmap for novices while still offering comprehensive features for seasoned users. Users can save frequently used scans as profiles, facilitating easy execution of those scans in the future. Additionally, a command creator is available for the interactive construction of Nmap command lines. The application allows users to save scan outcomes for later viewing, and it also enables the comparison of saved results to highlight differences. Recent scan results are conveniently stored in a database that can be searched. Zenmap can typically be downloaded alongside Nmap from the official Nmap download page. While Zenmap is user-friendly, further information on its features and usage can be found in the Zenmap User's Guide or the Zenmap man page for quick reference. The combination of its intuitive interface and robust functionalities makes Zenmap a valuable tool for network security assessments.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Axonius
Jira
Microsoft 365
Microsoft Sentinel
Microsoft Teams
RiskSense
Slack
ThreatAware
Zapier

Integrations

Amazon Web Services (AWS)
Axonius
Jira
Microsoft 365
Microsoft Sentinel
Microsoft Teams
RiskSense
Slack
ThreatAware
Zapier

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Edgescan

Founded

2011

Country

United Kingdom

Website

www.edgescan.com

Vendor Details

Company Name

Zenmap

Founded

1997

Country

United States

Website

nmap.org/zenmap/

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Product Features

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Alternatives

Tenable One Reviews

Tenable One

Tenable

Alternatives