Scuba Database Vulnerability Scanner Description

Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client.
A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.

Pricing

Free Version:
Yes
Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
Imperva
Year Founded:
2002
Headquarters:
United States
Website:
www.imperva.com/resources/free-cyber-security-testing-tools/scuba-database-vulnerability-scanner/

Media

Recommended Products
Deliver secure remote access with OpenVPN. Icon
Deliver secure remote access with OpenVPN.

Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Get started — no credit card required.

Product Details

Platforms
SaaS
Windows
Mac
Linux
Type of Training
Documentation
Live Online
In Person
Customer Support
Phone Support
24/7 Live Support
Online

Scuba Database Vulnerability Scanner Features and Options

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Scuba Database Vulnerability Scanner User Reviews

Write a Review
  • Previous
  • Next