Host ScannersRSS

Host Vulnerability Scanners
Policy Compliance Monitor/Managers

This includes tools that look at the hosts Operating System and applications for vulnerabilities that could be exploited and checks them against the System Security Policy for non-compliance. These products work in contrast from the Network Mapping Tools by analysing the host from a privileged user account.  Many Network Vulnerability Scanners have the ability to include privileged account to also perform such scans.  A Policy Compliance Monitor advises about what vulnerabilities exist. A Policy Compliance Manager not only advises about the vulnerabilities that exist but will also fix them.  Most require agents to be installed on the target host, though there are some that don't.

CyberSight Professional is a new type of security software solution. It is an intrusion and abuse prevention system, designed specifically to protect your organisation by combatting the new generations of threats and computer abuse, that often bypass or c ...

VendorCryptic Software Ltd
Pricing ModelCommercial
Modified

automates the discovery of security vulnerabilities and deviations of the security policy in mission critical e-Business applications and servers across the enterprise from a single location. It provides enterprise-class tools that allow administrators to ...

VendorSymantec
Modified

Altiris SecurityExpressions software supports an organization’s security processes through the implementation of sound security configuration baselines, proactive evaluation, and comprehensive reporting of application availability. Key Features ...

VendorSymantec Corporation
Pricing ModelCommercial
Modified

tiger is a set of scripts that scan a Un*x system looking for security problems, in the same fashion as Dan Farmer's COPS. 'tiger' was originally developed to provide a check of UNIX systems on the A&M campus that want to be accessed from off campus (clea ...

VendorAdvanced Research Corporation
Modified

WebTrends Security Analyzer discovers and fixes the latest known security vulnerabilities on Internet, intranet and extranet hosts. Currently Security Analyzer supports over 1000 tests for Windows, Solaris and Linux with the most advanced agent-based tech ...

VendorWebTrends Corporation
Modified

AuditPro® is a comprehensive enterprise security assessment solution featuring critical asset identification, policy compliance, risk analysis, real time vulnerability views, enhanced reporting capability, graphical progress analysis and more. Supporting ...

VendorNetwork Intelligence (I) Pvt. Ltd.
Pricing ModelCommercial
Modified

CA Security Compliance Manager provides automation of security processes required to meet compliance objectives. It enables continuous and automated compliance testing processes, analysis of findings, remediation, validation, and publishing of compliance ...

VendorComputer Associates
Pricing ModelCommercial
Modified
Secure Windows Auditor

Secure Windows Auditor™ (SWA) A must have windows security software for information security professionals to conduct in-depth security auditing and risk assessments of network-based windows systems. Regulatory compliance and the latest network auditing t ...

VendorSecure Bytes
Pricing ModelCommercial
Modified

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SLL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing ...

VendorGoogle
Pricing ModelOpen Source
Modified

Microsoft Baseline Security Analyzer (MBSA) can perform local, or remote scans on Windows desktops and servers, identifying any missing service packs, security patches, and common security misconfigurations. You can chose what you want to scan for, includ ...

VendorMicrosoft
Pricing ModelFreeware
Modified
Tripwire SecureCheq

Tests for common configuration errors and weaknesses in Microsoft Windows desktops and servers. This software demonstrates how your systems need to be continually hardened against configuration errors related to OS hardening, data protection, user accoun ...

VendorTripwire
Pricing ModelFreeware
Modified

© Computer Network Defence Limited 2019