Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Database Security Service (DBSS) leverages advanced machine learning and big data technologies to safeguard your cloud databases by conducting intelligent audits and identifying risky activities such as SQL injection attempts. You can easily initiate your use of DBSS without any manual installation or the need to modify your database settings. Meeting essential auditing standards, DBSS adheres to regulations like HIPAA, SOX, and PCI DSS, ensuring compliance. By utilizing sophisticated algorithm models, it quickly and accurately identifies SQL injection and unusual behaviors. Operating in a bypass mode, DBSS ensures that your business operations remain unaffected. A diverse selection of policies is available, allowing for the detection of SQL injection and the auditing of database activities. DBSS also enables real-time monitoring of databases to spot anomalies related to performance, data integrity, and user actions. Customized audit reports cater to various scenarios, both pre-event and post-event, as well as for different user roles, including common users and administrators. With DBSS, you can conduct thorough database audits that align with legal requirements and regulations, enhancing the overall security posture of your organization. Additionally, the service provides ongoing updates to ensure you are always protected against emerging threats.
Description
Wapiti is a tool designed for scanning vulnerabilities in web applications. It provides the capability to assess the security of both websites and web applications effectively. By conducting "black-box" scans, it avoids delving into the source code and instead focuses on crawling through the web pages of the deployed application, identifying scripts and forms that could be susceptible to data injection. After compiling a list of URLs, forms, and their associated inputs, Wapiti simulates a fuzzer by inserting various payloads to check for potential vulnerabilities in scripts. It also searches for files on the server that may pose risks. Wapiti is versatile, supporting attacks via both GET and POST HTTP methods, and handling multipart forms while being able to inject payloads into uploaded filenames. The tool raises alerts when it detects anomalies, such as server errors or timeouts. Moreover, Wapiti differentiates between permanent and reflected XSS vulnerabilities, providing users with detailed vulnerability reports that can be exported in multiple formats including HTML, XML, JSON, TXT, and CSV. This functionality makes Wapiti a comprehensive solution for web application security assessments.
API Access
Has API
API Access
Has API
Integrations
Drupal
Google Chrome
Google Sheets
HTML
Huawei Cloud
Intellicomp CI
JSON
Microsoft Excel
Mozilla Firefox
MySQL
Integrations
Drupal
Google Chrome
Google Sheets
HTML
Huawei Cloud
Intellicomp CI
JSON
Microsoft Excel
Mozilla Firefox
MySQL
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Huawei Cloud
Founded
1987
Country
China
Website
www.huaweicloud.com/intl/en-us/product/dbss.html
Vendor Details
Company Name
Wapiti
Website
wapiti-scanner.github.io