Netsparker Standard
1.00

Problems that solves

Employee personal use of corporate IT during working hours

Risk or Leaks of confidential information

Non-compliant with IT security requirements

Unauthorized access to corporate IT systems and data

Values

Reduce Costs

Ensure Security and Business Continuity

Netsparker Standard

Netsparker Standard is available as a Windows application with built-in penetration testing and reporting tools, many of which allow for fully automated security testing.

Description

Netsparker Standard is used to conduct manual analysis and exploitation, and is ideal in situations when more advanced testing is required, such as on an individual component that requires user input. The main features of Netsparker Standard:
  • Search for vulnerabilities in any type of website automatically. Netsparker Standard uses a Chrome based crawling engine. It can crawl and scan any type of modern and custom web application including HTML5, Web 2.0 and Single Page Applications (SPA).
  • Save Time & Costs with Proof-Based Scanning™. Netsparker pioneered Proof-Based Scanning™, a technology that automatically verifies identified vulnerabilities, demonstrating that they are real and not false positives.
  • Highest scanning accuracy. The Netsparker web application security uses the Netsparker Hawk vulnerability testing infrastructure to identify even the the most complex vulnerabilities, such as Server Side Request Forgery (SSRF) and Out-of-Band and Second Order vulnerabilities.
  • Ideal for manual web application scanning. Every feature and aspect of the scan, including automated ones, is customizable (custom cookies, anti-CSRF tokens, custom HTTP headers and more).
  • Generate Any Type Of Report For Compliance And Management. The Netsparker web application security scanner has a built in reporting tool to help you generate any type of report you want, including compliance reports for PCI DSS, HIPAA and OWASP Top 10.
Netsparker Standard includes:
  • Proof-Based Scanning
  • Integration Capabilities
  • Pen Testing Tools
  • Heuristic URL Rewrite Detection
  • Advanced (Out of Band) Vulnerability Detection

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

Chief Information Officer

Chief Technical Officer

Chief IT Security Officer

IT Security and Risk Management

Organizational Features

Internet access is available for employees