PT Application InspectorPositive Technologies
|
TraceInsightTraceSecurity
|
|||||
Related Products
|
||||||
About
PT Application Inspector is the only source code analyzer providing high-quality analysis and convenient tools to automatically confirm vulnerabilities — significantly speeding up the work with reports and simplifying teamwork between security specialists and developers. The combination of static, dynamic, and interactive application security testing (SAST + DAST + IAST) delivers unparalleled results. PT Application Inspector pinpoints only real vulnerabilities so you can focus on the problems that actually matter. Accurate detection, automatic vulnerability verification, filtering, incremental scanning, and an interactive data flow diagram (DFD) for each vulnerability are special features that make remediation so much quicker. Minimize vulnerabilities in the final product and the costs of fixing them. Perform analysis at the earliest stages of software development.
|
About
Typical vulnerability scanners output thousands of results, leaving you to sort, categorize, and remediate by hand. TraceSecurity knows that an effective vulnerability management program is about more than just scanning. Between our TraceCSO Vulnerability Management module and our flagship TraceInsight Vulnerability Manager, TraceSecurity offers multiple avenues toward true vulnerability management, giving you the power to search, filter, and categorize vulnerabilities. Then you can assign tasks out to your team and watch as network vulnerabilities decrease. With our Vulnerability Management software, you have the option to use authenticated or unauthenticated scanning. Using either, you can sort, search and filter your results to prioritize what’s important, and our vulnerability library includes dozens of references to source information for you. You can also use our platform to assign vulnerabilities to your team and track their remediation progress.
|
|||||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||||
Audience
Small and medium-sized enterprises looking for a unique combination of scanning methods (SAST, DAST, IAST, SCA, fingerprint and pattern matching) solution
|
Audience
Companies searching for a solution to manage and improve their safety operations
|
|||||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||||
API
Offers API
|
API
Offers API
|
|||||
Screenshots and Videos |
Screenshots and Videos |
|||||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||||
Reviews/
|
Reviews/
|
|||||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||||
Company InformationPositive Technologies
Founded: 2002
United Kingdom
www.ptsecurity.com/ww-en/products/ai/
|
Company InformationTraceSecurity
Founded: 2004
United States
www.tracesecurity.com/services-software/software/vulnerability-management
|
|||||
Alternatives |
Alternatives |
|||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
|||||
|
|
|