Action1 is an automated vulnerability management software for real-time vulnerability detection and vulnerability remediation that includes OS and application vulnerability patching and management of compensating controls. Unlike other vulnerability management tools, Action1 combines vulnerability assessment and remediation into one unified cloud-native vulnerability management solution.
Free and effective tools you can use today to take immediate action to reduce your cyber risk for your small business.
Identify and manage your cyber vulnerabilities in one platform. Import and scan your internal and external attack surfaces. Manage your risks via dashboards, alerts, and powerful reporting.
Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of modern web applications.
A vulnerability scanner and testing platform that can be used to scan and test web applications for vulnerabilities, including cross-site scripting, SQL injection, and directory traversal.
SecurityScorecard has been recognized as a leader in cybersecurity risk ratings. Download now to see the new cybersecurity risk rating landscape. Understand the principles, methodologies, and processes behind how our cybersecurity ratings work. Understand your vulnerabilities and make a plan to improve over time. Get started with a free account and suggested improvements. Gain a holistic view of any organization's cybersecurity posture with security ratings.
Intelligent Discovery helps you manage your AWS security with ease. Our industry-leading AWS vulnerability scanning and remediation tool allows you to quickly identify potential threats—without slowing down your infrastructure. Stay ahead of attackers looking for exploitable weaknesses by proactively identifying, resolving, and mitigating security threats through a user-friendly interface. Automate Security Auditing, Security Log Management, Customize Controls and so much more!
Evaluate your security posture, scan your network for vulnerabilities, and stay up-to-date on emerging threats with 3 award-winning modules from Defendify.
Identify, publicly disclosed cybersecurity vulnerabilities. You can search the CVE List for a CVE Record if the CVE ID is known. To search by keyword, use a specific term or multiple keywords separated by a space. Your results will be the relevant CVE Records
Free Online Security Scan Detect and fix viruses, worms, spyware, and other malicious threats for free.
OpenCVE is a platform used to locally import the list of CVEs (Security Vulnerabilities) and perform searches on it (by vendors, products, Security Vulnerabilities and Security Vulnerability Scores...). Subscribe to vendors or products you use, and OpenCVE will alert you when a new Security Vulnerability is created or when an update is done on Vendor Software Products. You can manually install OpenCVE, or use docker. OpenCVE also provides a running instance if you don't want to host it yourself.
Common Weakness Enumeration (CWE™) is a community-developed list of common software and hardware weakness types that have security ramifications. “Weaknesses” are flaws, faults, bugs, or other errors in software or hardware implementation, code, design, or architecture that if left unaddressed could result in systems, networks, or hardware being vulnerable to attack.
Our diverse industry experience and expertise in Cybersecurity, Information Risk Management and Regulatory Compliance is endorsed by leading industry certifications for the quality, value and cost-effective services we deliver to our clients.