ComGuard Debuts Acunetix Web Vulnerability Scanner 8 Beta

By

Looking to better optimize web security in the Middle East region, ComGuard has unveiled the latest version of Acunetix Web Vulnerability Scanner 8 Beta.

To quickly detect vulnerabilities, Acunetix WVS can automatically pinpoint URL parameters and manipulate them. This technology is not present in any other competing vulnerability scanner. In addition, WVS 8 can automatically interpret rewrite rules, without requiring any manual input using the web application’s web.config file. With this solution, it is now possible to define custom HTTP headers to be used during automated scans, the company stated in a press release.

Mohammad Mobasseri, senior vice president, ComGuard FZ LLC, said in a statement, “The version 8 of the Acunetix Web Vulnerability Scanner has been optimized to make life easier at every stage of a security scan. WVS is easier to use for web admins and security analysts alike with enhanced automation, ability to save scan settings as a template to avoid reconfiguration, and multiple instance support for simultaneous scans of several websites. WVS 8 also ushers in a new exciting co-operation between Acunetix and Imperva.”

Allowing the user to scan multiple websites and opening up further support for multi-user scenarios on the same server/workstation, Acunetix WVS 8 can be re-launched as multiple instances on the same machine.

Recently, the company extended its presence within the Middle East with the launch of two award-winning products from GFI Software including GFI WebMonitor and GFI MailArchiver. The Internet monitoring and Exchange server e-mail archiving, management and compliance software is primarily directed at small to medium-sized enterprises. GFI WebMonitor allows administrators to monitor and control employee Internet access in real-time, while the GFI MailArchiver helps administrators maintain an archive of all corporate e-mail correspondence.


Raju Shanbhag is a contributing editor for TechZone360. To read more of Raju’s articles, please visit his columnist page.

Edited by Jamie Epstein

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More