Home > Network security software > Security Scanners Wednesday, 6/19/2019
Software
Network Administrator
Network Security
Exchange Server
ISA Server
Terminal Services
Internet Server
Comm. & collaboration
Microsoft server add-on
Other network Software

Other

Links
Submit your product
Advertise here


Featured Product
TechGenix Sites
ISAserver.org
The No.1 Forefront TMG / UAG and ISA Server resource site.
MSExchange.org
The leading Microsoft Exchange Server and Office 365 resource site.
WindowSecurity.com
Network Security & Information Security resource for IT administrators.
WindowsNetworking.com
Windows Server 2012 / 2008 / 2003 & Windows 8 / 7 networking resource site.
WServerNews.com
The largest Windows Server focused newsletter worldwide.
VirtualizationAdmin.com
The essential Virtualization resource site for administrators.
CloudComputingAdmin.com
Cloud Computing Resource Site for IT Pros.
InsideAWS.com
An independent Amazon Web Services resource site.
WServerNews.com
World's largest weekly newsletter on Windows Server and cloud technologies

ServerFiles.com is a server software & hardware directory for Network administrators & IT professionals, listing networking & server software for Windows 2003, Windows 2000, NT and Linux; and now also listing networking hardware solutions focused on server based computing.

Up one level   |   Submit your product
 

~ Security Scanners

Sort by   Rating Name Date
View by platform   Windows Linux Either Both
Previous 10 products Showing products 11-19 of 19  

NetIQ Secure Configuration Manager Rating:  (24 votes) - Vote
Last Updated: April 26, 2012 Reviews: 1 review - View / Submit
NetIQ Secure Configuration Manager enables you to easily detect mis-configured systems that could lead to expensive breaches or failure to meet compliance goals. The ability to define policy in a simple, easy-to-understand manner, then manage and enforce that policy across your entire enterprise is an essential foundation upon which to build your security and compliance program.

NetIQ Secure Configuration Manager enables you to: Assess configurations against compliance mandates such as PCI DSS, HIPAA, SOX, NERC, FDCC and more, Report on systems out of configuration, and easily manage exceptions to compliance, Apply industry best practices to your systems to help ensure good security, Identify and report on user entitlements to systems - an essential part of managing access.

:: Platform :: Windows, Linux
:: Product URL ::click here
:: Company ::NetIQ Corporation - All Prods
:: Company URL ::www.netiq.com
:: Email ::info@netiq.com

Tenable Nessus Rating:  (3 votes) - Vote
Last Updated: November 2, 2012 Reviews: 0 reviews - View / Submit
The Nessus® vulnerability scanner is the world-leader in active scanners with more than five million downloads to date. Nessus features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs and across physically separate networks.

TechGenix Reviews & Awards:

Oct '12

Oct '11

Oct '10

Oct '09

Oct '07

:: Platform :: Windows, Linux
:: Product URL ::click here
:: Company ::Nessus - All Prods
:: Company URL ::www.nessus.org
:: Email ::deraison@cvs.nessus.org

Maxpatrol - network Security Scanner Rating:  (13 votes) - Vote
Last Updated: August 8, 2011 Reviews: 0 reviews - View / Submit
MaxPatrol is a network security scanner optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). It supports vulnerability testing for servers with non-standard configurations, intelligent recognition of vulnerabilities in known (and custom) web-server scripts, identification of RPC services and more. The program uses inspection methods to minimize false detections. MaxPatrol has at its disposal a protection analyzer developed for web servers and web applications (e.g. internet shops).
Although MaxPatrol operates within Microsoft Windows, it can test for possible vulnerabilities in any software or hardware platform: from Windows workstations to Cisco networks (*nix, Solaris, Novell, AS400, etc.). Additional features include scheduled scans, custom level vulnerabilities, full scan history and more.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::Positive Technologies - All Prods
:: Company URL ::www.maxpatrol.com
:: Email ::antipov@Securitylab.ru

Security Auditor's Research Assistant Rating:  (4 votes) - Vote
Last Updated: April 29, 2005 Reviews: 0 reviews - View / Submit
SARA is a network security scanner that discovers, analyzes, and reports on security vulnerabilities of network-based computers, server, routers,and firewalls. It performs over 1,000 tests on each network node that it discovers. It is built to support the large scale enterprise model that contains over 25,000 nodes. It is approved for operation in the SANS Top Ten and Top 20 environments.

:: Platform :: Windows, Linux
:: Product URL ::click here
:: Company ::Advanced Research Corporation - All Prods
:: Company URL ::www-arc.com
:: Email ::info@arc.com

Enterprise Security Reporter Rating:  (12 votes) - Vote
Last Updated: January 19, 2011 Reviews: 0 reviews - View / Submit
The Enterprise Security Reporter platform features agent-less, fast, comprehensive discovery and reporting solutions for file security, group memberships, Active Directory, printers, file shares and other security settings on Windows and SharePoint servers. Enterprise Security Reporter is essential for administrators burdened with compliance reporting and security audits, automating reporting and simplifying analysis.

Enterprise Security Reporter provides a reporting and auditing solution for corporate data stored on a file share, or in a SharePoint site. Easily discover necessary security information, run reports, create custom reports and conduct ad-hoc queries across the entire organization.

:: Platform :: Windows
:: Product URL ::click here
:: Company ::ScriptLogic - All Prods
:: Company URL ::www.scriptlogic.com
:: Email ::sales@scriptlogic.com

Infiltrator Network Security Scanner Rating:  (2 votes) - Vote
Last Updated: August 1, 2012 Reviews: 0 reviews - View / Submit
Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations. It comes with a built-in database of known vulnerabilities, that can be updated online and allows you to select the items to scan for or to add custom entries to be included. Infiltrator can reveal and catalog a variety of information, including installed software, shares, users, drives, hotfixes, NetBios and SNMP information, open ports and much more. It can also audit password and security policies, perform HTTP/CGI server auditing, registry auditing In addition, Infiltrator also comes with 18 network utilities for footprinting, scanning, enumerating and gaining access to machines (ping sweep, whois lookups, email tracing, share scanning and more). The program can be run from the commandline, allowing for external scheduling and automated scanning.

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Company ::Infiltration Systems - All Prods
:: Company URL ::www.infiltration-systems.com
:: Email ::support@infiltration-systems.com

Metasploit Express for Windows Rating:  (0 votes) - Vote
Last Updated: April 16, 2012 Reviews: 0 reviews - View / Submit
Metasploit Express enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting.

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Price ::3000
:: Company ::Rapid7 LLC - All Prods
:: Company URL ::www.rapid7.com
:: Email ::info@rapid7.com

Metasploit Pro for Windows Rating:  (0 votes) - Vote
Last Updated: April 13, 2012 Reviews: 0 reviews - View / Submit
Metasploit Pro enables IT professionals to easily verify whether vulnerabilities are exploitable, prioritize their mitigation and conduct basic penetration testing. It adds a graphical user interface to the Metasploit Framework, the de-facto leader in pentesting tools, and automates many of the tasks that otherwise require custom scripting, such as smart brute forcing, evidence collection, and reporting.

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Price ::15000
:: Company ::Rapid7 LLC - All Prods
:: Company URL ::www.rapid7.com
:: Email ::info@rapid7.com

Portable Penetrator Rating:  (0 votes) - Vote
Last Updated: March 29, 2011 Reviews: 0 reviews - View / Submit
Portable Penetrator is a complete solution for securing your wireless network and identifying any security flaws before hackers have a chance to do so. This wifi security software provides detailed reports, exposing security issues before it is too late. It allows you to fully secure all of the wireless networks in your business so that no one can break into the network and steal important, confidential information.

:: Platform :: Windows
:: Product URL ::click here
:: Screenshot ::click here
:: Price ::195
:: Company ::SecPoint ApS - All Prods
:: Company URL ::www.secpoint.com
:: Email ::software@secpoint.com

Previous 10 products Showing products 11-19 of 19  

Platform viewing legend 
  - Windows: All products that can run on Windows
- Linux: All Products that can run on Linux
- Either: All products
- Both: Products that can run on both Windows and Linux
 



Featured Links*