SlideShare a Scribd company logo
1 of 32
www.acunetix.com
Acunetix v12
Is Your Website Hackable?
– Founded in 2004
– Pioneer in web application security
– Fully automated Black-box, Gray-
box, Client-side and Out-of-band
web application scanner with one
consolidated view
– Depended on by SMEs and
Enterprises the world over
– Fortune 100, 500 and 1000 customers
www.acunetix.com
Product and Service Offering
Acunetix On Premise (Standard and Enterprise)
and Acunetix Online (Enterprise)
– Black-box, Gray-box, Out-of-band testing
– Highly accurate, wide test coverage (4500+ web
application vulnerabilities)
– Vulnerability Management
– Issue Tracker integration and WAF Virtual Patching
– No dependencies, easy to set-up
– Web-based console
– Extensible, highly scalable
www.acunetix.com
How it works and what’s
new in v12
www.acunetix.com
www.acunetix.com
– Crawler analyzes entire Target starting from
a URL, mapping out entire structure.
– Scanner then tests pages found for
vulnerabilities.
– Reports on vulnerabilities found and
provides remediation
New in v12
– Support for latest JavaScript
– Scan speed up to 2X faster
– AcuSensor technology for JAVA
– Pause / Resume functionality
– Exclusion of locations from crawl
– Password Policy feature
www.acunetix.com
Support for latest JavaScript
(New in v12)
– Supports ES6 and ES7.
– Updated Acunetix DeepScan
and the Acunetix Login
Sequence Recorder.
– Better analysis of SPAs.
– Ahead of industry curve.
www.acunetix.com
Scan speed up to 2X faster (new
in v12)
– Fastest scanner in the industry.
– 50% decrease in scan time.
– Combined with multi-engine –
1000s of sites scanned in
shortest time.
www.acunetix.com
AcuSensor Technology for Java
(new in v12)
– AcuSensor Technology for .NET,
PHP and now JAVA!
– Improves website coverage.
– Better detection of
vulnerabilities.
– Fewer False Positives.
– Provides additional information
on vulnerabilities found.
www.acunetix.com
Pause and Resume (New in v12)
– Ability to Pause a Scan.
– Resume Scan at a later stage.
– Acunetix proceeds with scan
from where it left off.
– Information about paused scan
automatically retained in
Acunetix.
www.acunetix.com
Exclude Paths (New in v12)
– Exclusion of specific paths
directly from the UI.
– Eliminates need for complex
regular expressions
www.acunetix.com
Inbuilt Vulnerability
Management features
– Easily re-scan all Targets (stored in
Acunetix with individual settings).
– Prioritize vulnerabilities by Target’s
business criticality.
– Consolidated reports are stored in the
central interface.
– Select “Target reports”, “Scan reports” or
“All Vulnerabilities” report.
www.acunetix.com
– Mark vulnerabilities as Fixed
– Vulnerability Rediscovery let’s you
know that “fixed” vulnerabilities have
been rediscovered
– Continuous Scanning automatically
runs a Quick Scan every day on a
Target, and a Full Scan once a week
www.acunetix.com
Out-of-the-box WAF Virtual Patching
Acunetix can export accurate scan results
to automatically configure the following
Web Application Firewalls (WAFs):
– Imperva SecureSphere,
– F5 BIG-IP Application Security Manager
– FortiWeb WAF
www.acunetix.com
Out-of-the-box Issue-Tracker
Integration
Acunetix can send vulnerabilities as issues
to the following Issue Trackers:
– Atlassian JIRA Software
– GitHub
– Microsoft Team Foundation
www.acunetix.com
Reporting
– Web-based interface allows multiple user
access from browser irrespective of OS
used.
– Easily generate a wide variety of
management and compliance reports.
– OWASP Top 10, PCI DSS, ISO27001, HIPAA
– Results can be exported to XML
www.acunetix.com
Role-based multi-user system
– Create multiple user accounts.
– Assign users to particular
groups of targets.
– User can create, scan, and
report on the targets assigned,
depending on privileges.
www.acunetix.com
Role-based multi-user
Tester, auditor, developer and manager users can work together on
consolidated result data in one vulnerability management system.
www.acunetix.com
Password Policy (New in v12)
– 2-Factor-Authentication (2FA)
support.
– Password Policies for user
accounts.
Acunetix Flagship Technologies
www.acunetix.com
Acunetix DeepScan
www.acunetix.com
Acunetix DeepScan
– WebKit, the world’s most widely used browser
engine
– Crawl and scan HTML5 web applications
– Execute JavaScript like a real browser
– Complex client-side web applications
(AngularJS, ReactJS, EmberJS…)
– DOM-based Cross-site Scripting
– Malicious URLs
– Popular CMSs (WordPress, Drupal, Joomla!)
– CRUD requests, JSON, XML, GWT, AJAX,
– WSDL/SOAP, WCF/SOAP and WADL/REST
www.acunetix.com
Over 65% of Customers
Scan Single-Page Apps
47% found DOM-based XSS vulnerabilities using DeepScan
www.acunetix.com
Acunetix AcuMonitor
www.acunetix.com
Acunetix AcuMonitor
– Automatic Out-of-band vulnerability detection
– Blind Cross-site Scripting (BXSS / Delayed XSS)
– XML External Entity Injection (XXE)
– Server Side Request Forgery (SSRF)
– Out-of-Band SQL Injection (OOB SQLi)
– Out-of-Band Remote Code Execution (OOB RCE)
– Host Header Injection
– Email Header Injection
– Password Reset Poisoning
www.acunetix.com
Acunetix AcuMonitor
– Hunting for XXE in Uber using Acunetix
AcuMonitor Blind Cross-site Scripting (BXSS / Delayed
XSS) to automatically
– Crawled the REST API endpoint
– Figured out POST vs GET
– Submitted XML even though App returns JSON
– Tests Blind OOB XXE using AcuMonitor
– No separate HTTP server
– No manual sifting of logs
– 26 different Uber domains affected (found using
Google Hacking)
www.acunetix.com
https://www.acunetix.com/blog/articles/hunting-xxe-uber-using-acunetix-acumonitor/
Acunetix AcuSensor
www.acunetix.com
Acunetix AcuSensor
– Enables the scanner to run a gray-box scan
– AcuSensor component inspects the source code
of a web application whilst it is in execution
– Shows vulnerable source code line number
– Shows vulnerable source code stack trace
– Shows vulnerable SQL queries
– 100% backend crawl coverage
– 100% verification of 12+ high-severity vulnerabilities
– Analyze server configuration for vulnerabilities
www.acunetix.com
mysqli_query($conn, $sql)
Acunetix AcuSensor (100% Verified)
– Arbitrary File Creation
– Arbitrary File Deletion
– Code Execution
– CRLF Injection
– Directory Traversal
– Email Injection
– File Inclusion
– File Tampering
– File Upload
– PHP Code Injection
– PHP SuperGlobals Overwrite
– PHP User Controlled Vulnerabilities
– Reflected and Stored XSS
– SQL Injection
www.acunetix.com
AcuSensor is used by
over 30% of Customers
Included as standard in Acunetix
www.acunetix.com
Acunetix Partner Program
– Performance-based resale margin
– Access to free NFR & POCs
– Telephone & Email support
– Training videos, Documentation, Webinars, Blog
– Listing on the Acunetix partner page
– Access to leads
– Strong recurrent revenue opportunity
www.acunetix.com
Acunetix Academy
Partners and Licensed Users can get
Acunetix certified
–Win customer confidence
–Earn more from service revenue
–Get listed on the Acunetix website
www.acunetix.com
www.acunetix.com
Thank You
Is Your Website Hackable?
Questions? sales@acunetix.com
support@acunetix.com

More Related Content

What's hot

Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingPriyanka Aash
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAlienVault
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxDARSHANBHAVSAR14
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware AnalysisAlbert Hui
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]raj upadhyay
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases Nasir Bhutta
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingAnurag Srivastava
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGEr Vivek Rana
 
Learn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAPLearn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAPPaul Ionescu
 
Hosting a website on IIS Server
Hosting a website on IIS ServerHosting a website on IIS Server
Hosting a website on IIS ServerDinesh Vasamshetty
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application SecurityIshan Girdhar
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) securityNahidul Kibria
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionVishal Kumar
 
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisCNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisSam Bowne
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing RomSoft SRL
 

What's hot (20)

Application Security Architecture and Threat Modelling
Application Security Architecture and Threat ModellingApplication Security Architecture and Threat Modelling
Application Security Architecture and Threat Modelling
 
Advanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source SecurityAdvanced OSSEC Training: Integration Strategies for Open Source Security
Advanced OSSEC Training: Integration Strategies for Open Source Security
 
VAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptxVAPT PRESENTATION full.pptx
VAPT PRESENTATION full.pptx
 
Basic Malware Analysis
Basic Malware AnalysisBasic Malware Analysis
Basic Malware Analysis
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
Zed attack proxy [ What is ZAP(Zed Attack Proxy)? ]
 
Penetration Testing Execution Phases
Penetration Testing Execution Phases Penetration Testing Execution Phases
Penetration Testing Execution Phases
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
NETWORK PENETRATION TESTING
NETWORK PENETRATION TESTINGNETWORK PENETRATION TESTING
NETWORK PENETRATION TESTING
 
Learn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAPLearn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAP
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
SSRF workshop
SSRF workshop SSRF workshop
SSRF workshop
 
Hosting a website on IIS Server
Hosting a website on IIS ServerHosting a website on IIS Server
Hosting a website on IIS Server
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Penetration testing web application web application (in) security
Penetration testing web application web application (in) securityPenetration testing web application web application (in) security
Penetration testing web application web application (in) security
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic AnalysisCNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
CNIT 126 2: Malware Analysis in Virtual Machines & 3: Basic Dynamic Analysis
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Penetration Testing
Penetration Testing Penetration Testing
Penetration Testing
 

Similar to #Acunetix #product #presentation

Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Wlad1m1r
 
The wild wild west of Selenium Capabilities
The wild wild west of Selenium CapabilitiesThe wild wild west of Selenium Capabilities
The wild wild west of Selenium CapabilitiesAdi Ofri
 
Veracode Integration Adapter - Datasheet
Veracode Integration Adapter - DatasheetVeracode Integration Adapter - Datasheet
Veracode Integration Adapter - DatasheetKovair
 
Launching Services in Amazon Web Services
Launching Services in Amazon Web ServicesLaunching Services in Amazon Web Services
Launching Services in Amazon Web ServicesJames Armes
 
Automated Deployment of Unix / Linux Systems using SOVM - Technical Overview
Automated Deployment of Unix / Linux Systems using SOVM - Technical OverviewAutomated Deployment of Unix / Linux Systems using SOVM - Technical Overview
Automated Deployment of Unix / Linux Systems using SOVM - Technical Overviewdlfrench
 
Статический анализ кода в контексте SSDL
Статический анализ кода в контексте SSDLСтатический анализ кода в контексте SSDL
Статический анализ кода в контексте SSDLPositive Hack Days
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecuritySplunk
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecurityShannon Cuthbertson
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Dinis Cruz
 
Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)
Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)
Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)Arrow Consulting & Design
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIMAlienVault
 
Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Issac Goldstand
 
Web Insecurity And Browser Exploitation
Web Insecurity And Browser ExploitationWeb Insecurity And Browser Exploitation
Web Insecurity And Browser ExploitationMichele Orru'
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Softwaredefconmoscow
 
Performance testing using hp load runner
Performance testing using hp load runnerPerformance testing using hp load runner
Performance testing using hp load runnerReturn on Intelligence
 

Similar to #Acunetix #product #presentation (20)

Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011Acunetix technical presentation v7 setembro2011
Acunetix technical presentation v7 setembro2011
 
The wild wild west of Selenium Capabilities
The wild wild west of Selenium CapabilitiesThe wild wild west of Selenium Capabilities
The wild wild west of Selenium Capabilities
 
Veracode Integration Adapter - Datasheet
Veracode Integration Adapter - DatasheetVeracode Integration Adapter - Datasheet
Veracode Integration Adapter - Datasheet
 
Launching Services in Amazon Web Services
Launching Services in Amazon Web ServicesLaunching Services in Amazon Web Services
Launching Services in Amazon Web Services
 
B&W Netsparker overview
B&W Netsparker overviewB&W Netsparker overview
B&W Netsparker overview
 
Lets vRealize level -100 Presentation
Lets vRealize level -100 PresentationLets vRealize level -100 Presentation
Lets vRealize level -100 Presentation
 
Automated Deployment of Unix / Linux Systems using SOVM - Technical Overview
Automated Deployment of Unix / Linux Systems using SOVM - Technical OverviewAutomated Deployment of Unix / Linux Systems using SOVM - Technical Overview
Automated Deployment of Unix / Linux Systems using SOVM - Technical Overview
 
SAST_QSDL
SAST_QSDLSAST_QSDL
SAST_QSDL
 
Effective DevSecOps
Effective DevSecOpsEffective DevSecOps
Effective DevSecOps
 
Статический анализ кода в контексте SSDL
Статический анализ кода в контексте SSDLСтатический анализ кода в контексте SSDL
Статический анализ кода в контексте SSDL
 
Novinky QualysGuard 2010
Novinky QualysGuard 2010Novinky QualysGuard 2010
Novinky QualysGuard 2010
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)Veracode Automation CLI (using Jenkins for SDL integration)
Veracode Automation CLI (using Jenkins for SDL integration)
 
Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)
Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)
Getting Started with ASP.NET Core 1.0 (formerly ASP.NET 5)
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016Private Apps in the Public Cloud - DevConTLV March 2016
Private Apps in the Public Cloud - DevConTLV March 2016
 
Web Insecurity And Browser Exploitation
Web Insecurity And Browser ExploitationWeb Insecurity And Browser Exploitation
Web Insecurity And Browser Exploitation
 
1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
 
Performance testing using hp load runner
Performance testing using hp load runnerPerformance testing using hp load runner
Performance testing using hp load runner
 

More from Cheer Chain Enterprise Co., Ltd.

A General Method for Estimating a Linear Structural Equation System
 A General Method for Estimating a Linear Structural Equation System A General Method for Estimating a Linear Structural Equation System
A General Method for Estimating a Linear Structural Equation SystemCheer Chain Enterprise Co., Ltd.
 
Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...
Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...
Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...Cheer Chain Enterprise Co., Ltd.
 
Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)
Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)
Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)Cheer Chain Enterprise Co., Ltd.
 
Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊
Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊
Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊Cheer Chain Enterprise Co., Ltd.
 
NativeJ screenshot - NativeJ is a powerful Java EXE maker!
NativeJ screenshot - NativeJ is a powerful Java EXE maker!NativeJ screenshot - NativeJ is a powerful Java EXE maker!
NativeJ screenshot - NativeJ is a powerful Java EXE maker!Cheer Chain Enterprise Co., Ltd.
 
Edraw Max Pro 使用者手冊 - All-In-One Diagram Software!!
Edraw Max Pro  使用者手冊 - All-In-One Diagram Software!!Edraw Max Pro  使用者手冊 - All-In-One Diagram Software!!
Edraw Max Pro 使用者手冊 - All-In-One Diagram Software!!Cheer Chain Enterprise Co., Ltd.
 
Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄
Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄
Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄Cheer Chain Enterprise Co., Ltd.
 
Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司
Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司
Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司Cheer Chain Enterprise Co., Ltd.
 
Maxqda12 features -detailed feature comparison for more information about eac...
Maxqda12 features -detailed feature comparison for more information about eac...Maxqda12 features -detailed feature comparison for more information about eac...
Maxqda12 features -detailed feature comparison for more information about eac...Cheer Chain Enterprise Co., Ltd.
 
CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)
CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)
CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)Cheer Chain Enterprise Co., Ltd.
 
全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...
全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...
全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...Cheer Chain Enterprise Co., Ltd.
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒Cheer Chain Enterprise Co., Ltd.
 

More from Cheer Chain Enterprise Co., Ltd. (20)

MAXQDA-24-Features-EN.pdf
MAXQDA-24-Features-EN.pdfMAXQDA-24-Features-EN.pdf
MAXQDA-24-Features-EN.pdf
 
Newsletter 20.pdf
Newsletter 20.pdfNewsletter 20.pdf
Newsletter 20.pdf
 
Paessler_Sales_Presentation_EN.pptx
Paessler_Sales_Presentation_EN.pptxPaessler_Sales_Presentation_EN.pptx
Paessler_Sales_Presentation_EN.pptx
 
A General Method for Estimating a Linear Structural Equation System
 A General Method for Estimating a Linear Structural Equation System A General Method for Estimating a Linear Structural Equation System
A General Method for Estimating a Linear Structural Equation System
 
Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...
Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...
Focused Analysis of #Qualitative #Interviews with #MAXQDA Step by Step - #免費 ...
 
Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)
Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)
Maxqda 2020 質性分析及混合研究理論應用軟體完整使用手冊(英文版)
 
DEA SolverPro Newsletter19
DEA SolverPro Newsletter19DEA SolverPro Newsletter19
DEA SolverPro Newsletter19
 
#Riverflow2 d gpu tests 2019
#Riverflow2 d gpu tests 2019#Riverflow2 d gpu tests 2019
#Riverflow2 d gpu tests 2019
 
DEA-Solver-Pro Version 14d- Newsletter17
DEA-Solver-Pro Version 14d- Newsletter17DEA-Solver-Pro Version 14d- Newsletter17
DEA-Solver-Pro Version 14d- Newsletter17
 
Doctor web Company profile 防毒軟體公司簡介
Doctor web Company profile 防毒軟體公司簡介Doctor web Company profile 防毒軟體公司簡介
Doctor web Company profile 防毒軟體公司簡介
 
Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊
Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊
Getting started-guide-maxqda2018 MAXQDA 2018 質性分析軟體 中英文快速入門手冊
 
NativeJ screenshot - NativeJ is a powerful Java EXE maker!
NativeJ screenshot - NativeJ is a powerful Java EXE maker!NativeJ screenshot - NativeJ is a powerful Java EXE maker!
NativeJ screenshot - NativeJ is a powerful Java EXE maker!
 
Edraw Max Pro 使用者手冊 - All-In-One Diagram Software!!
Edraw Max Pro  使用者手冊 - All-In-One Diagram Software!!Edraw Max Pro  使用者手冊 - All-In-One Diagram Software!!
Edraw Max Pro 使用者手冊 - All-In-One Diagram Software!!
 
Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄
Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄
Nvidia gpu-application-catalog TESLA K80 GPU應用程式型錄
 
Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司
Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司
Atlas.ti 8 質性分析軟體新功能介紹_祺荃企業有限公司
 
Maxqda12 features -detailed feature comparison for more information about eac...
Maxqda12 features -detailed feature comparison for more information about eac...Maxqda12 features -detailed feature comparison for more information about eac...
Maxqda12 features -detailed feature comparison for more information about eac...
 
CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)
CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)
CABRI® 3D V2 - 革命性的數學工具(中文操作手冊)
 
MAXQDA 12 質性(定性)分析軟體中文入門指南
MAXQDA 12 質性(定性)分析軟體中文入門指南MAXQDA 12 質性(定性)分析軟體中文入門指南
MAXQDA 12 質性(定性)分析軟體中文入門指南
 
全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...
全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...
全新 Veeam Availability Suite v9包括 Veeam Backup & Replication 和 Veeam ONE 備份解決方...
 
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
AVG 2016 business edition customer deck - 屢獲殊榮的防毒軟體保護您的企業免於最新的威脅與病毒
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

#Acunetix #product #presentation

  • 2. – Founded in 2004 – Pioneer in web application security – Fully automated Black-box, Gray- box, Client-side and Out-of-band web application scanner with one consolidated view – Depended on by SMEs and Enterprises the world over – Fortune 100, 500 and 1000 customers www.acunetix.com
  • 3. Product and Service Offering Acunetix On Premise (Standard and Enterprise) and Acunetix Online (Enterprise) – Black-box, Gray-box, Out-of-band testing – Highly accurate, wide test coverage (4500+ web application vulnerabilities) – Vulnerability Management – Issue Tracker integration and WAF Virtual Patching – No dependencies, easy to set-up – Web-based console – Extensible, highly scalable www.acunetix.com
  • 4. How it works and what’s new in v12 www.acunetix.com
  • 5. www.acunetix.com – Crawler analyzes entire Target starting from a URL, mapping out entire structure. – Scanner then tests pages found for vulnerabilities. – Reports on vulnerabilities found and provides remediation New in v12 – Support for latest JavaScript – Scan speed up to 2X faster – AcuSensor technology for JAVA – Pause / Resume functionality – Exclusion of locations from crawl – Password Policy feature
  • 6. www.acunetix.com Support for latest JavaScript (New in v12) – Supports ES6 and ES7. – Updated Acunetix DeepScan and the Acunetix Login Sequence Recorder. – Better analysis of SPAs. – Ahead of industry curve.
  • 7. www.acunetix.com Scan speed up to 2X faster (new in v12) – Fastest scanner in the industry. – 50% decrease in scan time. – Combined with multi-engine – 1000s of sites scanned in shortest time.
  • 8. www.acunetix.com AcuSensor Technology for Java (new in v12) – AcuSensor Technology for .NET, PHP and now JAVA! – Improves website coverage. – Better detection of vulnerabilities. – Fewer False Positives. – Provides additional information on vulnerabilities found.
  • 9. www.acunetix.com Pause and Resume (New in v12) – Ability to Pause a Scan. – Resume Scan at a later stage. – Acunetix proceeds with scan from where it left off. – Information about paused scan automatically retained in Acunetix.
  • 10. www.acunetix.com Exclude Paths (New in v12) – Exclusion of specific paths directly from the UI. – Eliminates need for complex regular expressions
  • 11. www.acunetix.com Inbuilt Vulnerability Management features – Easily re-scan all Targets (stored in Acunetix with individual settings). – Prioritize vulnerabilities by Target’s business criticality. – Consolidated reports are stored in the central interface. – Select “Target reports”, “Scan reports” or “All Vulnerabilities” report.
  • 12. www.acunetix.com – Mark vulnerabilities as Fixed – Vulnerability Rediscovery let’s you know that “fixed” vulnerabilities have been rediscovered – Continuous Scanning automatically runs a Quick Scan every day on a Target, and a Full Scan once a week
  • 13. www.acunetix.com Out-of-the-box WAF Virtual Patching Acunetix can export accurate scan results to automatically configure the following Web Application Firewalls (WAFs): – Imperva SecureSphere, – F5 BIG-IP Application Security Manager – FortiWeb WAF
  • 14. www.acunetix.com Out-of-the-box Issue-Tracker Integration Acunetix can send vulnerabilities as issues to the following Issue Trackers: – Atlassian JIRA Software – GitHub – Microsoft Team Foundation
  • 15. www.acunetix.com Reporting – Web-based interface allows multiple user access from browser irrespective of OS used. – Easily generate a wide variety of management and compliance reports. – OWASP Top 10, PCI DSS, ISO27001, HIPAA – Results can be exported to XML
  • 16. www.acunetix.com Role-based multi-user system – Create multiple user accounts. – Assign users to particular groups of targets. – User can create, scan, and report on the targets assigned, depending on privileges.
  • 17. www.acunetix.com Role-based multi-user Tester, auditor, developer and manager users can work together on consolidated result data in one vulnerability management system.
  • 18. www.acunetix.com Password Policy (New in v12) – 2-Factor-Authentication (2FA) support. – Password Policies for user accounts.
  • 21. Acunetix DeepScan – WebKit, the world’s most widely used browser engine – Crawl and scan HTML5 web applications – Execute JavaScript like a real browser – Complex client-side web applications (AngularJS, ReactJS, EmberJS…) – DOM-based Cross-site Scripting – Malicious URLs – Popular CMSs (WordPress, Drupal, Joomla!) – CRUD requests, JSON, XML, GWT, AJAX, – WSDL/SOAP, WCF/SOAP and WADL/REST www.acunetix.com
  • 22. Over 65% of Customers Scan Single-Page Apps 47% found DOM-based XSS vulnerabilities using DeepScan www.acunetix.com
  • 24. Acunetix AcuMonitor – Automatic Out-of-band vulnerability detection – Blind Cross-site Scripting (BXSS / Delayed XSS) – XML External Entity Injection (XXE) – Server Side Request Forgery (SSRF) – Out-of-Band SQL Injection (OOB SQLi) – Out-of-Band Remote Code Execution (OOB RCE) – Host Header Injection – Email Header Injection – Password Reset Poisoning www.acunetix.com
  • 25. Acunetix AcuMonitor – Hunting for XXE in Uber using Acunetix AcuMonitor Blind Cross-site Scripting (BXSS / Delayed XSS) to automatically – Crawled the REST API endpoint – Figured out POST vs GET – Submitted XML even though App returns JSON – Tests Blind OOB XXE using AcuMonitor – No separate HTTP server – No manual sifting of logs – 26 different Uber domains affected (found using Google Hacking) www.acunetix.com https://www.acunetix.com/blog/articles/hunting-xxe-uber-using-acunetix-acumonitor/
  • 27. Acunetix AcuSensor – Enables the scanner to run a gray-box scan – AcuSensor component inspects the source code of a web application whilst it is in execution – Shows vulnerable source code line number – Shows vulnerable source code stack trace – Shows vulnerable SQL queries – 100% backend crawl coverage – 100% verification of 12+ high-severity vulnerabilities – Analyze server configuration for vulnerabilities www.acunetix.com mysqli_query($conn, $sql)
  • 28. Acunetix AcuSensor (100% Verified) – Arbitrary File Creation – Arbitrary File Deletion – Code Execution – CRLF Injection – Directory Traversal – Email Injection – File Inclusion – File Tampering – File Upload – PHP Code Injection – PHP SuperGlobals Overwrite – PHP User Controlled Vulnerabilities – Reflected and Stored XSS – SQL Injection www.acunetix.com
  • 29. AcuSensor is used by over 30% of Customers Included as standard in Acunetix www.acunetix.com
  • 30. Acunetix Partner Program – Performance-based resale margin – Access to free NFR & POCs – Telephone & Email support – Training videos, Documentation, Webinars, Blog – Listing on the Acunetix partner page – Access to leads – Strong recurrent revenue opportunity www.acunetix.com
  • 31. Acunetix Academy Partners and Licensed Users can get Acunetix certified –Win customer confidence –Earn more from service revenue –Get listed on the Acunetix website www.acunetix.com
  • 32. www.acunetix.com Thank You Is Your Website Hackable? Questions? sales@acunetix.com support@acunetix.com