United Kingdom Show local products
48 results
A prioritization-driven threat and vulnerability management software for enterprises that offers built-in patching. Learn more about ManageEngine Vulnerability Manager Plus
Vulnerability Manager Plus delivers comprehensive coverage, continual visibility, risk-based assessment, and integral remediation of vulnerabilities and misconfigurations from a central console. It offers extensive features including vulnerability assessment, automated patching, CIS compliance management, security configuration management, high-risk software audit, antivirus audit and active port audit. Vulnerability Manager Plus comes with plenty of reports, dashboards, and endless scalability. Learn more about ManageEngine Vulnerability Manager Plus

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Nessus Pro, the industry leader in vulnerability assessment, helps you quickly and easily identify and fix vulnerabilities.
Built for security practitioners, by security professionals, Nessus Professional is the de-facto industry standard for vulnerability assessment. Nessus performs point-in-time assessments to help security professionals quickly identify and fix vulnerabilities, including software flaws, missing patches, malware, and misconfigurations. With features such as pre-built policies and templates, group snooze functionality, and real-time updates, it makes vulnerability assessment easy and intuitive. Learn more about Nessus

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Stay one step ahead of any threat with advanced and proactive endpoint security that predicts, detects, and neutralizes vulnerabilities
Syxsense Secure offers vulnerability scanning, patch management, plus endpoint security all in one powerful solution. Syxsense Secure uses artificial intelligence (AI) to help security teams predict and eliminate threats. Experience real-time monitoring for malicious processes, automated device quarantine, and live data for insight into the health of every endpoint across your network. Learn more about Syxsense

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Web application penetration testing tool that helps you to identify vulnerabilities on your website before hackers exploit them.
Automate vulnerability assessment, accelerate remediation and secure your web applications from the latest security vulnerabilities. Security tests can be scheduled on a weekly or monthly basis to have regular vulnerability assessments and keep the website security intact. The DevSecOps CI plugins allow one to automate regular vulnerability assessment in the CI/CD pipeline to get real-time updates of an application's security on Slack, JIRA or Trello right during the development phase. Learn more about Beagle Security

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
100+ cloud assets? Get instant-on, workload-deep security for AWS, Azure & GCP - without the gaps in coverage & headaches of agents.
Orca Security is the industry-leading agentless Cloud Security Platform for AWS, Azure, Google Cloud and Kubernetes that identifies, prioritizes, and remediates risks. Orca saves your time by connecting to your environment in minutes with patent-pending Sidescanning technology to provide complete coverage across vulnerabilities, malware, misconfigurations, lateral movement risks, weak and leaked passwords, and overly-permissive identities. Learn more about Orca Security

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
All-in-one security solution that scans your website, detects vulnerabilities and offers remediation, in three steps: Find-Fix-Prevent.
Acunetix (by Invicti) is an automated application security testing tool that enables small security teams to tackle huge application security challenges. With fast scanning, comprehensive results, and intelligent automation, Acunetix helps organizations to reduce risk across all types of web applications. With Acunetix, security teams can: - Save time and resources by automating manual security processes - Work more seamlessly with developers, or embrace DevSecOps by integrating directly in Learn more about Acunetix

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
AppTrana monitors web traffic and blocks malicious attacks. It is combined with DDoS, API risk, and Bot mitigation solutions.
Indusface’s AppTrana is a fully managed web application firewall that ensures risk-based protection with its DDoS, API risk, and Bot mitigation services while assuring web acceleration with secure CDN. Combining automated scanning with manual pen-testing, it detects application vulnerabilities. All of this with 24x7 expert support to meet zero false-positive guarantees. Indusface is the only vendor to be named Customers’ Choice for WAAP in all the 7 segments of the Gartner VoC 2022 Report. Learn more about AppTrana

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Monitors the vulnerability management process, tracks remediation and ensures policy compliance.
Security Risk and Compliance Management - On Time, On Budget, On Demand -- Qualys is the first company to deliver an on demand solution for security risk and compliance management. Qualys monitors your company's vulnerability management process, tracks remediation and ensures policy compliance. QualysGuard is also the widest deployed security on demand platform in the world, performing over 150 million IP audits per year - with no software to install and maintain. Learn more about Qualys Cloud Platform

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Invicti Enterprise is a comprehensive automated web vulnerability scanning solution.
Invicti is an automated application security testing tool that makes it possible for enterprise organizations to secure thousands of websites and dramatically reduce the risk of attack. By empowering security teams with the most unique DAST + IAST scanning capabilities on the market, Invicti allows organizations with complicated environments to automate their web security with confidence. Learn more about Invicti

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Security management platform offering fully integrated security controls for threat detection and compliance management.
USM Anywhere delivers a unified, simple and affordable solution for threat detection and compliance. Powered by the latest AlienVault Labs Threat Intelligence and the Open Threat Exchange the largest crowd-sourced threat intelligence exchange, USM enables mid-size organizations to defend against modern threats. Learn more about USM Anywhere

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Our Active Directory Audit Tool is free and runs on Windows Server 2008 & later. The audit results are provided in a clickable report.
FREE tool that scans your Active Directory, and detects security-related weaknesses, specifically related to password policies. Collect and display interactive reports containing user and password policy information. This includes checking user account passwords against a list of vulnerable passwords obtained from leaks and ones observed in real attacks. The audit can also help you identify which accounts may be violating your security policy by using the same password across multiple accounts. Learn more about Specops Password Auditor

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Probely is a DAST scanner designed to empower Security and DevOps teams working together to reduce the security risk of web apps & APIs
Probely is the premier cloud-based automated application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs. With over 30 000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them. Learn more about Probely

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Cyber Chief is a vulnerability scanner & issue management tool that helps you ship software with zero security known vulnerabilities
Cyber Chief gives software teams the power to find and fix thousands of vulnerabilities in their web applications and cloud infrastructure. With its one-click vulnerability scanning and smart vulnerability management features, Cyber Chief will help your software team secure their applications and infrastructure, even if there is zero application security qualifications or experience on your team. Cyber Chief is cloud-based and has military-grade security controls so that your security secret Learn more about Cyber Chief

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
United Kingdom Local product
User behavior analytics and vulnerability management solution that helps identify internal and external threats.
User behavior analytics and vulnerability management solution that helps identify internal and external threats. Learn more about ArcSight

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Our aim is to make cybersecurity understandable, affordable and manageable for everyone.
If you want to assess your online assets' vulnerabilities, Security for Everyone is the tool for you whether you are a tech expert or a digital asset owner who does not have any coding experience. You can have: 1-Automated vulnerability assessment, 2- API integration, 3- Manual scanning options. Whichever opiton you choose, your vulnerabilities will be shown with video and pdf outputs. You can either send them to an expert or use them yourself to make your fixing process easier. Learn more about Security for Everyone

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
HackerOne is the industry standard for hacker-powered security.
HackerOne is the #1 hacker-powered security platform, helping organizations find and fix critical vulnerabilities before they can be exploited. The U.S. Department of Defense, General Motors, Google, Twitter, GitHub, Qualcomm, Starbucks, Dropbox, Intel,and over 1,200 other organizations have partnered with HackerOne to resolve over 90,000 vulnerabilities and award over $42M in bug bounties. Learn more about HackerOne

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Application security platform that empowers developers to create secure applications by providing continuous security.
GuardRails provides the perfect customizable security solution for organizations that need a flexible approach to their internal process. With thousands of possible coding vulnerabilities, you can stay ahead of threats and weaknesses in your organizations software by tracking which ones matter the most and need the most prior attention! Learn more about GuardRails

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
CloudWize gives maximum cloud security and compliance from architecture design to runtime.
CloudWize gives maximum cloud security and compliance from architecture design to runtime. Get 360° protection for your cloud in minutes from onboarding. This drag and drop, no code solution saves you resources by detecting and fixing cloud issues in minutes. You can now investigate your cloud like a pro. See how security and compliance impact business cost, performance, and operations. Learn more about CloudWize

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Strobes is a Risk-centric Vulnerability Management Platform with 45+ open-source vulnerability assessment scanners!
Strobes Security is leading the way to disrupt the vulnerability management space. Our flagship product VM365 consolidates & de-duplicates assets and vulnerabilities from various sources, seamlessly integrating with other key tools of cybersecurity & IT infrastructure. VM365 prioritizes vulnerabilities based on temporal threat exposure and predicts the impact of vulnerabilities to expedite remediation implementation. Learn more about Strobes

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Expose exploits automatically with Red Sentry’s cloud and external penetration testing, vulnerability scanning, and asset monitoring.
Annual penetration tests are expensive and time-consuming, and they don’t help with vulnerabilities that pop up a week after the pentest is complete. Red Sentry is better – it’s an automated, continuous pentesting platform that can help keep you secure 24/7/365. Red Sentry’s attack surface analysis is easy, fast, and surprisingly affordable. You deserve true peace of mind with continuous pentesting across your company’s cloud and external assets. Learn more about Red Sentry

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability management solution that helps businesses identify assets , determine risks and prioritize remediation.
CODA Footprint is an AI-driven , cloud-agnostic Vulnerability Management platform designed to make cybersecurity Accessible, Affordable, and Actionable for every business.? It is operating under the NIST Cybersecurity Framework. CODA Footprint automatically identifies software, hardware, and business assets and correlates them using proprietary algorithms. Our solution automatically identifies and recommends missing cybersecurity controls and remediation in a multi-tenant environment. Learn more about CODA Footprint

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
United Kingdom Local product
Intruder is a proactive vulnerability scanner that finds weaknesses in your exposed systems and helps with their remediation.
Intruder is a cloud-based vulnerability scanner that helps to find weaknesses in your online systems. It saves you time by proactively scanning for new threats as well as offering a unique threat prioritisation solution. Our vulnerability scanner uses the same underlying engine as the big banks do, so you can enjoy the same level of security, but with none of the complexity. Intruder also integrates with AWS, Google Cloud Platform and Microsoft Azure cloud providers. Learn more about Intruder

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Hybrid approach to vulnerability scanning with accurate security assessment results.
Hybrid approach to vulnerability scanning with accurate security assessment results. Learn more about SaaS Vulnerability Scanner

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Detectify is the only automated EASM solution powered by a hacker community. Continuously secure the growing attack surface and detect
Detectify is the only fully automated External Attack Surface Management solution powered by a world-leading ethical hacker community. By leveraging hacker insights, security teams using Detectify can map out their entire attack surface to find anomalies and detect the latest business critical vulnerabilities in time – especially in third-party software. The only way to secure your attack surface is to hack it but it doesn’t have to be complicated. With Detectify, continuous security starts with Learn more about Detectify

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
SecOps Solution is a full-stack cybersecurity assessment platform.
SecOps Solution is a full-stack cybersecurity assessment platform. It identifies the top 1% security risks that could have the maximum impact on the organisation, thereby saving millions of dollars and hundreds of hours of engineering effort in patchwork and remediation. It is an AI-powered agent-less platform for Vulnerability Management and remediating misconfigurations in applications and the cloud. SecOps configures and starts protecting your assets - within seconds not days. Learn more about SecOps Solution

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Software-based security segmentation that turns every host into a sensor to detect unauthorized traffic and enforce security policies.
Illumio reduces risk and increases cyber resiliency for modern organizations by providing visibility and protection of critical applications and data. As the only proven segmentation platform that is purpose-built for the Zero Trust security model, Illumio allows organizations to see their risk, isolate breaches, and better protect their data. The world’s leading organizations across the industries rely on Illumio's Zero Trust segmentation. Learn more about Illumio

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Simplify the management of your vulnerabilities Monitor all of your vulnerabilities, from their detection to their correction.
Cyberwatch Vulnerability Manager provides you with a global and continuous overview of your vulnerabilities Cyberwatch makes an inventory of your technologies, detects the vulnerabilities of your servers, workstations, network equipment, containers, and reviews them based on your business requirements. Cyberwatch allows you to gain visibility and prioritize risks, to build a simple and motivating action plan for your team, and to deploy the adapted security fixes for your vulnerabilities. Learn more about Cyberwatch Vulnerability Manager

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
SaaS and on-premise enterprise CMDB software solution based on historizied configuration items.
SaaS and on-premise enterprise CMDB software solution based on historizied configuration items. Learn more about Versio.io

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
We help you identify vulnerabilities in your cyber security defenses covering both technical and human assets.
The Next-Gen Vulnerability Management Platform from Holm Security helps our customers both identify and remediate vulnerabilities as well as weaknesses in their cyber security defenses, covering both their technical and human assets across their entire organization, all in one integrated view. Learn more about Holm Security VMP

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Easy-to-use SaaS network, website and code vulnerability scanner for small and medium enterprises
Vulkyrie believes that basic vulnerability discovery should be free. Importantly, solutions should be easy-to-use for small and medium enterprises who may not have the resources and expertise of large companies. Our Free Plan offers a cloud-based solution for unlimited network and website vulnerability scanning. With our Pro Plan, you get a static code analyzer for scanning your software code. Learn more about Vulkyrie

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale.
ShiftLeft CORE is a suite of modern AST tools that simplify work between Dev and AppSec teams and provide early scans of code at scale. Learn more about ShiftLeft CORE

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more.
It is a vulnerability scanner software that helps businesses identify security bugs, generate reports, manage users, and more. Learn more about Reconwithme

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
The industry’s ONLY vulnerability management solution for storage & backup systems, helping you protect your most valuable data.
Ransomware gangs are now targeting storage & backup systems. StorageGuard is the industry’s ONLY vulnerability management solution for storage & backup systems, helping organizations protect their most valuable data - and ensure recoverability. StorageGuard helps you automatically detect, prioritize and remediate vulnerabilities and security misconfigurations - for your enterprise storage & backup systems. Learn more about StorageGuard

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Attack surface management solution that automatically scans services, IPS, domains, networks and more for ransomware and other attacks.
Attack surface management solution that automatically scans services, IPS, domains, networks, and more for ransomware and other attacks. Learn more about Randori

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Trend Micro Cloud One™: automated, flexible, all-in-one security on AWS. Try it yourself with a free, 30-day trial.
1 platform. 7 security services. Trend Micro Cloud One™ has cloud builders on AWS covered with security services for all your needs—from file storage security to open source security, and everything in between. Turn-key integrations into your CI/CD pipelines, customizable APIs, and automated deployment, enable you to go further. Try it yourself with a free, 30-day trial. Learn more about Trend Micro Cloud One

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning.
Vulnerability scanning solution that helps businesses conduct unauthenticated and authenticated testing and performance tuning. Learn more about OpenVAS

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Allows companies to monitor and fix vulnerabilities within their network.
Allows companies to monitor and fix vulnerabilities within their network. Learn more about Nexpose

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities.
Amazon Inspector is a security assessment solution that helps businesses assess applications for exposure and vulnerabilities and enhance the security and compliance of applications across AWS. With Amazon Inspector, IT administrators and security professionals can quickly discover vulnerabilities, prioritize patch remediation, meet compliance requirements, and identify zero-day vulnerabilities as soon as they appear. Learn more about Amazon Inspector

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
United Kingdom Local product
Uleska

Uleska

(0) United Kingdom Local product
Uleska helps security and dev teams manage application security at scale by automating and orchestrating their preferred security tools
Uleska helps security and development teams manage application security at scale by automating and orchestrating their preferred security tools within CI/CD. With Uleska, teams can confidently start an AppSec program using open-source, commercial, and custom tools and then quickly change, add or scale tools as the technology and business needs evolve. Uleska also brings speed and scale when integrating into development tools, and reporting of metrics and risk. Learn more about Uleska

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Trava's vulnerability assessment tool scans external/internal environments; provides insights to build better defenses against hackers.
Trava's vulnerability assessment tool scans external and internal environments and provides insights for building better defenses against hackers. External Scans: Weaknesses in your systems that could help avoid a potential incident. Pressing security issues. Changes like services or server setup and whether they present any new threats to the organization. Internal Scans: Known vulnerabilities that could compromise your network Verification that all issues are patched properly and up to date Learn more about Trava

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database.
Vulnerability scanner that lets users scan, identity, and manage vulnerabilities across a network and access vulnerabilities database. Learn more about Vulners

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Arcules is a cloud video surveillance solution that lets you instantly access your cameras in one security system.
Arcules is a cloud video surveillance solution that lets you instantly access your cameras in one security system. Arcules doesn't lock you into ripping and replacing your existing cameras. We support over 6,000+ devices so you can keep what you have, or mix in the right new ones for your needs - saving you up-front costs and offering the flexibility of choosing what works best for you. The platform also auto updates to improve your security so you don’t have to worry about things shutting down. Learn more about Arcules

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
WithSecure Elements Vulnerability Management is a vulnerability scanner that discovers, prioritizes, and resolves vulnerabilities.
WithSecure Elements Vulnerability Management is a vulnerability scanner that discovers, prioritizes, and resolves vulnerabilities. It combines IT asset discovery and inventory, identification and management both internal and external threats. Vulnerability Management gives you visibility into shadow IT and maps your full attack surface and responds to critical vulnerabilities associated with cyber threats. Adversaries don’t need many vulnerabilities – one is enough. Learn more about WithSecure Elements Vulnerability Management

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
A cybersecurity application that helps secure employee accounts by screening for unsafe credentials and passwords in Active Directory.
With Enzoic for AD, enterprises can eliminate unsafe passwords and adopt NIST requirements. Fully automate password screening and remediation Checks at creation and continuously against the latest exposures Evaluate both passwords and full credential combinations Prevent common passwords and predictable user behaviors Easily comply with NIST 800-63B guidelines Scans check against Enzoic’s complete database of billions of unsafe passwords, updated every day by Enzoic’s threat intelligence team. Learn more about Enzoic for Active Directory

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
PreConfirm offers a continuous full visibility into your organisation's attack surface and all the associated digital risks.
PreConfirm delivers actionable, objective insights to executives and their teams. With PreConfirm's External Landscape Threat Detection. You will discover, limit, evaluate and mitigate your entire attack surface. PreConfirm helps clients make smarter and faster security decisions and helps increase the resilience of your organization. PreConfirm gives organisations control over complex digital risks related to their entire attack surface. Learn more about PreConfirm

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
It is a vulnerability scanner solution that helps businesses receive monitoring alerts, manage compliance testing, and more.
tbVA is vulnerability Assessment tool, is comprehensive vulnerability assessment system that can detect security issues in all manner of servers and network devices. Key Features:- • Agent based Detection - In addition to our scanners, VM also works with the groundbreaking TechBridge Cloud Agents, extending its network coverage to assets that can’t be scanned. The lightweight, all-purpose, self-updating agents reside on the assets they monitor— no scan windows, credentials, or firewall changes Learn more about tbVA

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
It is a SIEM solution that helps businesses manage incidents, detect anomalies, generate reports, and more.
tbSIEM integrating a selection of tools designed to aid network administrators in computer security, intrusion detection and prevention. It can be used to effectively secure small to very large heterogeneous networks. It combines best-in-class detection methodologies with behavioral analysis and information from third party vulnerability assessment tools to provide the industry’s most intelligent security management solution. Learn more about tbSIEM

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API
Ostorlab is a platform that discovers and scans mobile applications, web applications, and external attack surfaces.
Ostorlab is a platform that discovers and scans mobile applications, web applications, and external attack surfaces to identify vulnerabilities and Security & Privacy weaknesses. Ostorlab will help you through the whole journey. Start by discovering and managing your infrastructure and external assets. Run scans for the critical ones, and analyze and aggregate the vulnerabilities. Integrate with your CI/CD pipelines, and finally set monitoring rules to trigger scans with every change. Learn more about Ostorlab

Features

  • Alerts/Notifications
  • Website Crawling
  • Vulnerability / Threat Prioritization
  • API