Typhon III transforms the process of identifying and fixing infrastructure and web application vulnerabilities into an exact science.
Capabilities include the fast and accurate identification of current and historical security vulnerabilities – the swiftest, non–intrusive vulnerability scanner on the market brings your business secure quality protection against current threats including:
- SQL Injection
It also confers protection against emerging risks such as:
- Confidential Data theft
What's more, the correct use of Typhon III will assist in meeting regulatory requirements on the protection and storage of data.
How the programme works
By providing a comprehensive security audit of all hosts in your network, from routers and printers through to web and database servers, Typhon III helps the network to stay secure from threats. Exposing weak passwords in a variety of protocols it contains a full range of checks for both common vulnerabilities and configuration errors. Typhon III can also audit web applications using its integrated web spider, a device which will locate every page and script on a website (even hidden, unlinked and test files) and rigorously test for SQL injection and cross–site scripting flaws.
Typhon III provides a fully configurable, intuitive environment across over thirty distinct application modules. It can be employed to quickly and accurately assess enterprise environments for security vulnerabilities. With its uniquely holistic approach to auditing Typhon III is the complete security solution for businesses that place a high priority on network integrity.