• Reseller Application
  • Procurement Portal
  • Invicti Security Partner Portal
888-891-8885
Alliance Technology Partners - The Web Security Experts
  • Home
  • Solutions
    • Acunetix Overview
    • Request Acunetix Demo
    • Acunetix Videos
    • Netsparker Overview
    • Request Netsparker Demo
    • Netsparker Videos
  • About Us
  • Contact Us
  • Find Government Reseller
  • Menu Menu

Tag Archive for: Acunetix

Posts

Gartner recognizes Acunetix as a Challenger for Application Security Testing in 2015

October 20, 2015/in Acunetix Security, Blog, Frontpage Article, News /by Bryan Ferrario

Gartner recognizes Acunetix as a Challenger

Acunetix Receives 2nd highest product score for Manual Web Penetration Testing in Gartner’s 2015 Critical Capabilities for Application Security Testing Report

Gartner, Inc., the leading provider of research and analysis on the global information technology industry, has recognized Acunetix as a challenger, assigning Acunetix Web Vulnerability Scanner a score of 4.36 out of 5.0 in the Manual Web Penetration Testing Use Case, in Gartner’s most recent Critical Capabilities for Application Security Testing Report.

Read More

 

https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png 0 0 Bryan Ferrario https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png Bryan Ferrario2015-10-20 18:50:022021-02-04 10:23:12Gartner recognizes Acunetix as a Challenger for Application Security Testing in 2015

SecureWorld St. Louis 2015

October 7, 2015/in Acunetix Security, Frontpage Article, Images /by Bryan Ferrario

IMG_0332

We had a great time speaking with everyone who stopped by our booth at SecureWorld on Sept. 22nd & 23rd.

Alliance and Acunetix were highly visible at the show due to our unique value proposition. Acunetix offers the best web application vulnerability scanner on the market and Alliance trains Acunetix users how to apply industry best practices and take full advantage of the solution.

If you were unable to come see us, it’s okay! We’re still available to answer your questions and resolve security issues dragging down efficiency, security, and revenue.

 

https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png 0 0 Bryan Ferrario https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png Bryan Ferrario2015-10-07 02:22:322021-02-04 10:23:26SecureWorld St. Louis 2015

The Importance of an Authenticated Network Security Scan

August 6, 2015/in Acunetix Security /by Bryan Ferrario

Authenticated network security scans are tests for vulnerabilities that are performed as an authenticated or logged-in user. Authenticated scans happen from a computer that is logged in normally to a network with extra software installed, or from a machine that is designated for the task and given login credentials. These procedures can determine how secure a network is from the interior point of view. Running an authenticated network security scan can provide users with a wealth of information, and here we explore how that is important to a business.

 

Detect Insider Threats

An insider threat is a malicious hacker who is an officer or employee of a business. Sometimes it is an outside individual who pretends to be an employee by obtaining false credentials. The insider threat’s goal is to gain access to the networks or computer systems of the business, then use found data to maliciously harm the company. Authenticated network security scans limit the damage these insider threats can do.

 

Find Vulnerabilities 

Authenticated scans can find vulnerabilities that are not detected with an unauthenticated scan. These scans can reveal weak share permissions, missing patches and general overall misconfigurations. Many companies skip running an authenticated scan, but it is the best way to see exactly where things stand for your network.

 

Prepare for Information Overload

Businesses must be prepared to deal with how authenticated network scans can give you an overload of information, which can be a problem if the individual reading reports is not skilled in IT speak. If they see a lot of “critical” or high level flaws, they can make managers and internal auditors jumpy when they don’t truly know what they are reading. A managed service provider can help your company interpret results of an authenticated network scan.

 

Set Aside Time for a Scan

Running authentication network security scans can take up to two to three times longer to implement than unauthenticated scans. The more network hosts you have, the more time it will take. You also need time to analyze the scanner results and to report them since they are much bigger than unauthenticated scans. Be prepared and have a significant chunk time set aside.

 

Scan with Several User Role Levels

To get the most accurate authenticated network security scan it is best from the views of different levels of privilege, such as a standard domain user with limited access and a domain or local administrator. It is also recommended to scan at the highest level possible. By scanning as an administrator or a role that is equivalent to that level you will get the most insight into your company’s network security vulnerabilities.

 

Contact us today if you have any questions about running an authenticated network security scan for your business. Our highly qualified team is here to help.

https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png 0 0 Bryan Ferrario https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png Bryan Ferrario2015-08-06 08:00:092021-02-04 10:24:15The Importance of an Authenticated Network Security Scan

How Web Scanning Can Help With Web Security Pitfalls

June 4, 2015/in Blog, News /by Bryan Ferrario

The Internet is a vast place, full of intrigue and wonder – but also chock full of risk. More than 70 percent of all websites have vulnerabilities that could put your business at risk. More than 20 percent of those vulnerabilities are classified as critical, which has the potential to bring business operations to a screeching halt.

The Five Most Common and Significant Web Security Pitfalls, according to the Open Web Application Security Project (OWASP):

Injection – Injection flaws, such as SQL, OS, and LDAP injection occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.

Broken Authentication and Session Management – Application functions related to authentication and session management are often not implemented correctly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities.

Cross-Site Scripting (XSS) – XSS flaws occur whenever an application takes untrusted data and sends it to a web browser without proper validation or escaping. XSS allows attackers to execute scripts in the victim’s browser, which can hijack user sessions, deface web sites, or redirect the user to malicious sites.

Insecure Direct Object References – A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, or database key. Without an access control check or other protection, attackers can manipulate these references to access unauthorized data.

Security Misconfiguration – Good security requires having a secure configuration defined and deployed for the application, frameworks, application server, web server, database server, and platform. Secure settings should be defined, implemented, and maintained, as defaults are often insecure. Additionally, software should be kept up to date.

With the threat landscape continually evolving, it’s important to take steps to prevent would-be attacks and protect sensitive data.

Web Vulnerability Scanning is a method that uses tools to automatically scan web applications for known security vulnerabilities and deliver a report on the findings. The scans can be scheduled to run when it’s convenient and reports are broken down in a way that is easy to understand, thus enabling you to protect your business more effectively.

https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png 0 0 Bryan Ferrario https://www.alliancewebsecurity.com/wp-content/uploads/2013/04/Alliance-LOGO.png Bryan Ferrario2015-06-04 14:57:282021-02-04 10:25:36How Web Scanning Can Help With Web Security Pitfalls
Page 2 of 41234
Alliance Technology Partners
Cybersecurity Solutions For The US Government
Alliance Technology Partners Alliance Technology Partners Schedule Free Consultation Click Here

Contact Us

Phone: (314) 649-8888
Toll Free: (888) 891-8885
Email: websec@alliancetechpartners.com

758 Spirit 40 Park Drive
Chesterfield, MO 63005

Acunetix Distributor

Alliance Technology Partners is an Authorized Acunetix Distributor in the United States. We have been partnering with Acunetix since 2007. We work with Government and Corporate Technology Resellers and Consultants to deliver best in class vulnerability management solutions.

Links

Reseller Application
Reseller Login
Acunetix Portal
Support
Acunetix

Alliance

© Copyright 2020. Alliance Technology Partners. Terms and Conditions

Sitemap | Privacy Policy | Website Accessibility Statement

  • Follow
  • Follow
  • Follow
  • Follow
  • Follow
Scroll to top

Schedule Your Free Consultation Today.

Fill out the form below to start the process.



We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Alliance Technology Partners - The Web Security Experts
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.