Ratings and Reviews 0 Ratings
Ratings and Reviews 173 Ratings
What is SecurityMetrics Perimeter Scan?
A thorough assessment of vulnerabilities is essential for ensuring network security. Utilizing vulnerability scans and network scanners effectively uncovers significant cybersecurity threats such as improperly configured firewalls, malware risks, and vulnerabilities related to remote access. These tools are instrumental in assisting organizations with compliance requirements, including those outlined in PCI Compliance (PCI DSS) and HIPAA regulations.
In addition to their scanning capabilities, the Perimeter Scan Portal allows for the easy addition and removal of targets as needed.
Additionally, users can perform mass uploads of scan targets and group them efficiently.
To enhance the management of scan targets, organizations can categorize and label them based on specific locations, network types, or particular situations they face.
Frequent port scans can be conducted on the most critical assets, while designated PCI targets can be tested quarterly, ensuring that any changes to the network are promptly addressed through dedicated IP assessments.
The reports generated from vulnerability scanning provide comprehensive insights, detailing the target, type of vulnerability, associated service (like https or MySQL), and the categorized severity level, whether it is low, medium, or high.
This comprehensive reporting not only aids in remediation efforts but also enhances the overall security posture of the organization.
What is Astra Pentest?
Astra's Pentest offers a thorough approach to penetration testing, combining an advanced vulnerability scanner with detailed manual testing services.
This automated scanner executes over 10,000 security assessments, addressing all CVEs highlighted in the OWASP top 10 and SANS 25, while also fulfilling the necessary evaluations for ISO 27001 and HIPAA compliance.
Users benefit from an interactive pentest dashboard that facilitates vulnerability analysis visualization, allows for the assignment of vulnerabilities to team members, and encourages collaboration with security experts.
Additionally, for users who prefer not to navigate back to the dashboard repeatedly, Astra provides integrations with CI/CD platforms and Jira, streamlining the process of vulnerability management and assignment.
This seamless integration enables teams to efficiently address security concerns without disrupting their workflow.
Integrations Supported
Astra Security
GitHub
GitLab
Jira
SecurityMetrics
Slack
Workfolio Website
Integrations Supported
Astra Security
GitHub
GitLab
Jira
SecurityMetrics
Slack
Workfolio Website
API Availability
Has API
API Availability
Has API
Pricing Information
$99.00/one-time
Free Trial Offered?
Free Version
Pricing Information
$199 per month
Free Trial Offered?
Free Version
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Supported Platforms
SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Customer Service / Support
Standard Support
24 Hour Support
Web-Based Support
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Training Options
Documentation Hub
Webinars
Online Training
On-Site Training
Company Facts
Organization Name
SecurityMetrics
Date Founded
2000
Company Location
United States
Company Website
www.securitymetrics.com/vulnerability-scan
Company Facts
Organization Name
Astra Security
Date Founded
2018
Company Location
Claymont, USA
Company Website
www.getastra.com/continuous-pentest-and-dast
Categories and Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection
Categories and Features
Vulnerability Management
Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning
Vulnerability Scanners
Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection