{"id":102468,"date":"2019-02-12T17:36:13","date_gmt":"2019-02-12T15:36:13","guid":{"rendered":"https:\/\/catalog.rci-c.com\/?post_type=item&#038;p=102468"},"modified":"2020-09-01T21:30:32","modified_gmt":"2020-09-01T18:30:32","slug":"acunetix-vulnerability-scanner-standard-5-targets","status":"publish","type":"product","link":"https:\/\/catalog.rci-c.com\/en\/catalog\/it-security\/scanners\/acunetix-vulnerability-scanner-standard-5-targets\/","title":{"rendered":"Acunetix Vulnerability Scanner Standard (5 Targets)"},"content":{"rendered":"<section id=\"prices\" class=\"prices\">\n<div class=\"content-container\">\n<div class=\"prices__container row\">\n<div class=\"prices__table--wrapper col-xs-12 col-md-9\">\n<table class=\"prices__table\">\n<thead>\n<tr>\n<th><\/th>\n<th>Standard<\/th>\n<th>Enterprise<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"prices__table__content-section\">\n<tr>\n<td>Detect 4,500+ web vulnerabilities<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix DeepScan Crawler (Crawls HTML5 websites &amp; AJAX-heavy client-side SPAs)<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix AcuSensor<br \/>\n(Gray-box Vulnerability Testing)<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix AcuMonitor<br \/>\n(Out-of-band Vulnerability Testing)<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Continuous Scanning<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Assign Target Management to Users<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Compliance Reports (HIPAA, PCI-DSS, ISO\/IEC 27001 and more*<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Scan for 50,000+ network vulnerabilities (only applicable for Acunetix Online)<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<tr>\n<td>Issue Tracker and WAF integration<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"checked\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"feature-matrix\" class=\"feature-matrix\">\n<div class=\"content-container\">\n<div class=\"feature-matrix__container\">\n<header>\n<h1 class=\"feature-matrix__header\" style=\"font-size: 18px; text-align: center;\"><strong>Feature Matrix<\/strong><\/h1>\n<\/header>\n<div class=\"feature-matrix__content\" style=\"display: block;\">\n<table class=\"feature-matrix__table\">\n<thead>\n<tr>\n<th><\/th>\n<th>Standard<\/th>\n<th>Enterprise<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Architecture and Scale<\/strong><\/td>\n<td colspan=\"2\"><\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td>Unlimited Web Scanning<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Unlimited Network Scanning (<em>Acunetix Online<\/em>)<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Max Targets<\/td>\n<td>5-20<\/td>\n<td>5+<\/td>\n<\/tr>\n<tr>\n<td>Multi-user<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>User Roles and Privileges<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Number of Users<\/td>\n<td>1<\/td>\n<td>Unlimited<\/td>\n<\/tr>\n<tr>\n<td>Max Number of Scan Engines<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td><strong>Acunetix Vulnerability Assessment Engine<\/strong><\/td>\n<td colspan=\"2\"><\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td>Scanning for 4500+ web application vulnerabilities<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Scanning for 50,000+ network vulnerabilities (only applicable for Acunetix Online)<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix DeepScan Crawler<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix AcuSensor (Gray-box Vulnerability Testing)<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix AcuMonitor (Out-of-band Vulnerability Testing)<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Acunetix Login Sequence Recorder<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Manual Intervention during Scan<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Malware URL Detection<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Manual Pen-testing Tool Suite<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Scanning of Online Web Application Assets<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Scanning of Internal Web Application assets<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td><strong>Key Reports and Vulnerability Severity Classification<\/strong><\/td>\n<td colspan=\"2\"><\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td>Key Reports (Affected Items, Quick, Developer, Executive)<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>OWASP TOP 10 Report<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>CVSS (Common Vulnerability Scoring System) for Severity<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Remediation Advice<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Compliance Reports*<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td><strong>Centralized Management and Extensibility<\/strong><\/td>\n<td colspan=\"2\"><\/td>\n<\/tr>\n<\/tbody>\n<tbody>\n<tr>\n<td>Dashboard<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Scheduled Scanning<\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Continuous Scanning<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Target Groups<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Assign Target Business Criticality<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Prioritize by Business Criticality<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Trend Graphs<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>WAF Virtual Patching**<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Issue Tracking Systems Integration***<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Jenkins Plug-in Integration<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Assign Target Management to Users<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/><\/td>\n<\/tr>\n<tr>\n<td>Integration APIs<\/td>\n<td><\/td>\n<td><img src=\"\/\/www.acunetix.com\/wp-content\/uploads\/2018\/05\/checked.png\" alt=\"\" \/>\u00a0\u2020<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><small style=\"font-size: 75%;\"><sup><strong>*<\/strong><\/sup> PCI DSS, ISO\/IEC 27001; The Health Insurance Portability and Accountability Act (HIPAA); WASC Threat Classification; Sarbanes-Oxley; NIST Special Publication 800-53 (for FISMA); DISA-STIG Application Security; 2011 CWE\/SANS Top 25 Most Dangerous Software Errors.<br \/>\n<sup><strong>**<\/strong><\/sup> Imperva SecureSphere, F5 BIG-IP Application Security Manager and Fortinet FortiWeb WAF<br \/>\n<sup><strong>***<\/strong><\/sup> Atlassian JIRA, GitHub and Microsoft Team Foundation Server<br \/>\n\u2020 Subject to project qualification.<br \/>\n<\/small><\/p>\n<\/div>\n<hr \/>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Standard Enterprise Detect 4,500+ web vulnerabilities Acunetix DeepScan Crawler (Crawls HTML5 websites &amp; AJAX-heavy client-side SPAs) Acunetix AcuSensor (Gray-box Vulnerability Testing) &#8230;<\/p>\n","protected":false},"featured_media":102469,"template":"","meta":[],"product_cat":[282,284],"product_tag":[],"_links":{"self":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product\/102468\/"}],"collection":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product\/"}],"about":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/types\/product\/"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/media\/102469\/"}],"wp:attachment":[{"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/media\/?parent=102468"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product_cat\/?post=102468"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/catalog.rci-c.com\/en\/wp-json\/wp\/v2\/product_tag\/?post=102468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}