Host ScannersRSS

Host Vulnerability Scanners
Policy Compliance Monitor/Managers

This includes tools that look at the hosts Operating System and applications for vulnerabilities that could be exploited and checks them against the System Security Policy for non-compliance. These products work in contrast from the Network Mapping Tools by analysing the host from a privileged user account.  Many Network Vulnerability Scanners have the ability to include privileged account to also perform such scans.  A Policy Compliance Monitor advises about what vulnerabilities exist. A Policy Compliance Manager not only advises about the vulnerabilities that exist but will also fix them.  Most require agents to be installed on the target host, though there are some that don't.

Advanced Research Corporation

tiger is a set of scripts that scan a Un*x system looking for security problems, in the same fashion as Dan Farmer's COPS. 'tiger' was originally developed to provide a check of UNIX systems on the A&M campus that want to be accessed from off campus (clea ...

Modified

Plixer NPMD Popular

Commercial
Pricing Model

Device discovery Track assets scattered across your entire enterprise. Gather a complete and accurate view of all network endpoints, including managed and unmanaged devices, and authorized and unauthorized devices. Understand what types of devices are on ...

Modified
Plixer NPMD
Tripwire by HelpSystems

Tripwire Enterprise is the configuration control solution that combines best-of-breed file integrity monitoring with comprehensive compliance policy management to protect, detect and correct IT systems throughout the modern enterprise. As a part of the Tr ...

Modified
Tripwire Enterprise
Open Source
Pricing Model

Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SLL connections and sensitive cleartext traffic on devices and applications in a flexible, scalable, powerful way. It includes testing ...

Modified