Web Application
Security Scanner_
What is Netsparker?
Netsparker, regardless the language or technology which web site is developed on, detects security vulnerabilities like SQL Injection and Cross-site Scripting (XSS) independently and reports with full details including solution recommendations. In addition, Netsparker, not only detects security vulnerabilities but presents evidence regarding if such security vulnerabilities really exist, thanks to its one of a kind scanning technologies. Thus you don’t need to check the accuracy of the results presented to you by Netsparker.

Gais Security
Properties_
Automatize Your Web Security
Netsparker helps you in your struggle with cyber security skills gap and totally automatize your web security processes.
Scale While Growing
Netsparker lightens the growing networks by scaling in a way to meet the requirements of small enterprises as well as big companies.
Reach Highest Efficiency
Netsparker is not only another application scanner but a complete security vulnerability solution.
Security_
Netsparker helps you in your struggle with cyber security skills gap and totally automatize your web security processes. You may conduct automatic security vulnerability assessment which helps you in prioritizing your work to eliminate problems.
Additionally, you may automatically discover and protect your existing web assets; so that you may avoid manual procedures requiring heavy resources.
When your enterprise expands, scope of your security requirements expand as well. Netsparker lightens the growing networks by scaling in a way to meet the requirements of small enterprises as well as big companies.
On of the keys of scalability is Proof-Based Scanning TM which prevents wasting resources on false positives.
Netsparker is not only another application scanner but a complete security vulnerability solution. You may integrate this with your problem trackers to fix flawlessly and retest your Web applications.
Additionally, you may integrate it into your SDLC, so that you may get rid of great costs of repairing flawed web applications which turns it into production.
Features | Standart | Team | Enterprise* |
---|---|---|---|
Functionality | On-premises desktop scanner | Vulnerability scanning & management solution for team collaboration and streamlined workflows | Customized on the cloud or on-premises plan for organizations with more than 50 websites |
*Includes Netsparker Standard | |||
Delivery | Desktop application | Hosted | Hosted or on-premises |
Websites | 20 max | 50 max | 50 plus |
User interface | Windows software | Windows software, fully responsive web dashboard (including mobile support) | Windows software, fully responsive web dashboard (including mobile support) |
API access | Command line | Rest API | Rest API |
Custom integrations | |||
World class support | Yes | Yes | Yes |
Multi-user platform | Yes | Yes | |
Built in issues & vulnerabilities tracking workflow tool | Yes | Yes | |
Native integration with CI / CD messaging and business workflow tool | Yes | Yes | |
Asset Discovery Service | Yes | Yes | |
PCI Compliance Scanner | Yes | Yes For Hosted Accounts | |
Crawling and Scanning | |||
Advanced Discovery and Scanning Technology (HTML5, Web 2.0, Single Page Applications) | Yes | Yes | Yes |
Web services scanning (WDSL, REST etc) | Yes | Yes | Yes |
Authentication Support (OAuth2, Web Forms, Single Sign-On, Client-side Certificates, Basic Auth, NTLM, Digest, Kerberos) | Yes | Yes | Yes Custom Authentication |
Heuristic URL Rewrite Detection | Yes | Yes | Yes |
Proof-Based ScanningTM Technology (with proof of exploit) | Yes | Yes | Yes |
Netsparker Hawk (Out-of-band vulnerability testing) | Yes | Yes | Yes |
Reporting and Reports | |||
Full detailed scan report (including technical details about the vulnerabilities) | Yes | Yes | Yes |
Compliance Reports (Including PCI DDS and OWASP Top 10) | Yes | Yes | Yes |
Trend Matrix and advanced correlation reports and reporting tool | Yes | Yes | |
Tools and Configuration | |||
Retest vulnerability functionality | Yes | Yes | Yes |
Scan Policy Editor and Optimizer | Yes | Yes | Yes |
HTTP Request Builder | Yes | Yes | Yes |
Manual Crawling | Yes | Yes | Yes |
Advanced pen testing tools (such as ViewState viewer, Encoding / Decoding tools) | Yes | Yes | Yes |
Workflow tools to manage the long term security of 100s and 1000s of web applications | Yes | Yes | |
Interactive Exploitation Tools | Yes | Yes | Yes |
other solution partners_
We provide our advanced techonolgy and services to global firms worldwide.