ComGuard Debuts Acunetix Web Vulnerability Scanner 8 Beta

By Raju Shanbhag December 23, 2011

Looking to better optimize web security in the Middle East region, ComGuard has unveiled the latest version of Acunetix Web Vulnerability Scanner 8 Beta.

To quickly detect vulnerabilities, Acunetix WVS can automatically pinpoint URL parameters and manipulate them. This technology is not present in any other competing vulnerability scanner. In addition, WVS 8 can automatically interpret rewrite rules, without requiring any manual input using the web application’s web.config file. With this solution, it is now possible to define custom HTTP headers to be used during automated scans, the company stated in a press release.

Mohammad Mobasseri, senior vice president, ComGuard FZ LLC, said in a statement, “The version 8 of the Acunetix Web Vulnerability Scanner has been optimized to make life easier at every stage of a security scan. WVS is easier to use for web admins and security analysts alike with enhanced automation, ability to save scan settings as a template to avoid reconfiguration, and multiple instance support for simultaneous scans of several websites. WVS 8 also ushers in a new exciting co-operation between Acunetix and Imperva.”

Allowing the user to scan multiple websites and opening up further support for multi-user scenarios on the same server/workstation, Acunetix WVS 8 can be re-launched as multiple instances on the same machine.

Recently, the company extended its presence within the Middle East with the launch of two award-winning products from GFI Software including GFI WebMonitor and GFI MailArchiver. The Internet monitoring and Exchange server e-mail archiving, management and compliance software is primarily directed at small to medium-sized enterprises. GFI WebMonitor allows administrators to monitor and control employee Internet access in real-time, while the GFI MailArchiver helps administrators maintain an archive of all corporate e-mail correspondence.


Raju Shanbhag is a contributing editor for TechZone360. To read more of Raju’s articles, please visit his columnist page.

Edited by Jamie Epstein

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Bloomberg BETA: Models Are Key to Machine Intelligence

By: Paula Bernier    4/19/2018

James Cham, partner at seed fund Bloomberg BETA, was at Cisco Collaboration Summit today talking about the importance of models to the future of machi…

Read More

Get Smart About Influencer Attribution in a Blockchain World

By: Maurice Nagle    4/16/2018

The retail value chain is in for a blockchain-enabled overhaul, with smarter relationships, delivering enhanced transparency across an environment of …

Read More

Facebook Flip-Flopping on GDPR

By: Maurice Nagle    4/12/2018

With GDPR on the horizon, Zuckerberg in Congress testifying and Facebook users questioning loyalty, change is coming. What that change will look like,…

Read More

The Next Phase of Flash Storage and the Mid-Sized Business

By: Joanna Fanuko    4/11/2018

Organizations amass profuse amounts of data these days, ranging from website traffic metrics to online customer surveys. Collectively, AI, IoT and eve…

Read More

Satellite Imaging - Petabytes of Developer, Business Opportunities

By: Doug Mohney    4/11/2018

Hollywood has programmed society into believing satellite imaging as a magic, all-seeing tool, but the real trick is in analysis. Numerous firms are f…

Read More