Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Resolver Reviews & Ratings
    246 Ratings
    Company Website
  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • Criminal IP Reviews & Ratings
    11 Ratings
    Company Website
  • Astra Pentest Reviews & Ratings
    173 Ratings
    Company Website
  • Aikido Security Reviews & Ratings
    71 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    2,427 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • Action1 Reviews & Ratings
    455 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    154 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website

What is Strobes RBVM?

Strobes serves as a comprehensive resource for security professionals to safeguard their organizations against cyber threats and vulnerabilities. With features such as a centralized dashboard that displays security risks for each asset and support for integrations with top scanners and bug bounty platforms, Strobes truly stands out as the ultimate solution for security needs. In addition, its user-friendly interface makes it easier for stakeholders to manage and respond to security challenges effectively.

What is Nsauditor Network Security Auditor?

Nsauditor Network Security Auditor is a powerful tool specifically crafted to assess network security by performing scans on both networks and individual hosts to uncover vulnerabilities and provide security alerts. This software functions as a holistic vulnerability scanner, evaluating an organization's network for a variety of potential attack vectors that hackers could exploit, while generating in-depth reports on any issues detected. By employing Nsauditor, companies can considerably reduce their overall network management costs, since it enables IT personnel and system administrators to gather comprehensive data from all connected computers without needing to install software on the server side. Moreover, the capability to produce detailed reports not only helps in pinpointing security flaws but also facilitates a more organized approach to resolving these vulnerabilities. This tool ultimately empowers organizations to enhance their security posture and operational efficiency.

Media

Media

Integrations Supported

Anchore
Appknox
Bitbucket
Brakeman
Burp Suite
Docker
Flock
GitHub
Jira
LeaksID
Nessus
Nexpose
SMTP Provider
Slack
Sonar
Strobes PTaaS

Integrations Supported

Anchore
Appknox
Bitbucket
Brakeman
Burp Suite
Docker
Flock
GitHub
Jira
LeaksID
Nessus
Nexpose
SMTP Provider
Slack
Sonar
Strobes PTaaS

API Availability

Has API

API Availability

Has API

Pricing Information

$999
Free Trial Offered?
Free Version

Pricing Information

$69 one-time payment
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Strobes Security

Date Founded

2019

Company Location

United States

Company Website

www.strobes.co

Company Facts

Organization Name

Nsasoft

Company Website

www.nsauditor.com

Categories and Features

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Categories and Features

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Vulnerability Scanners

Asset Discovery
Black Box Scanning
Compliance Monitoring
Continuous Monitoring
Defect Tracking
Interactive Scanning
Logging and Reporting
Network Mapping
Perimeter Scanning
Risk Analysis
Threat Intelligence
Web Inspection

Popular Alternatives

Popular Alternatives

Infiltrator Reviews & Ratings

Infiltrator

Infiltration Systems
Qualys VMDR Reviews & Ratings

Qualys VMDR

Qualys
Nessus Reviews & Ratings

Nessus

Tenable