Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Experience top-tier execution and delivery in penetration testing with Resolve. This platform consolidates all vulnerability information from your organization into one comprehensive view, enabling you to identify, prioritize, and address vulnerabilities more swiftly. You can easily access all your testing data whenever needed through Resolve, and with just a click, request additional assessments. Monitor the progress and outcomes of all ongoing penetration testing projects seamlessly. Furthermore, evaluate the advantages of both automated and manual penetration testing within your vulnerability data. Many vulnerability management programs are currently being pushed to their limits, leading to remediation timelines extending into months instead of being completed in days or weeks. It’s likely that you may be unaware of potential exposures in your system. Resolve not only integrates all your vulnerability data into a unified view but also incorporates remediation workflows designed to expedite the fixing of vulnerabilities and minimize your risk exposure. By enhancing visibility and streamlining processes, Resolve empowers organizations to take control of their security posture effectively.
Description
Comprehensive Vulnerability Assessment for Network Security. Vulnerability scans and network scanners can identify top cybersecurity risks like misconfigured firewalls, malware hazards and remote access vulnerabilities. They can be used to help with cyber security and compliance mandates such as PCI Compliance (PCI DSS), and HIPAA.
You can add and remove targets using your Perimeter Scan Portal.
Mass uploading scan targets and groups can be done.
To make it easier to manage scan targets by location, network type or unique circumstances in your organization, you can group and label them.
You can run port scans on the most sensitive targets more often, test in scope PCI targets every quarter, or test designated IPs following changes to your network.
Vulnerability scanning reports include the target, vulnerability type, and service (e.g. https, MySQL, etc.). ), and the severity (low, medium, or high) of each vulnerability.
API Access
Has API
API Access
Has API
Integrations
Adobe Acrobat
Microsoft Excel
Microsoft Word
SecurityMetrics
Workfolio Website
Integrations
Adobe Acrobat
Microsoft Excel
Microsoft Word
SecurityMetrics
Workfolio Website
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
$99.00/one-time
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
NetSPI
Founded
2001
Country
United States
Website
www.netspi.com/security-testing/resolve-vulnerability-management-orchestration-platform/
Vendor Details
Company Name
SecurityMetrics
Founded
2000
Country
United States
Website
www.securitymetrics.com/vulnerability-scan
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Product Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection