Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit complex, authenticated, HTML5 and JavaScript-heavy websites to detect vulnerabilities such as XSS, SQL Injection, and more.
Acunetix (by Invicti) is a cyber security solution offering automatic web security testing technology that enables organizations to scan and audit...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
BIMA by Perisai integrates elements from EDR, NDR, XDR, and SIEM into a unified cybersecurity framework, offering a comprehensive defense strategy.

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support

Starting from

US$1,995.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

Not provided by vendor

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.4 /5
(34)

Ease of Use

4.4/ 5

Features

4.2/ 5

Customer Service

4.2/ 5

Value for Money

4/ 5

Overall rating

5 /5
(4)

Ease of Use

5/ 5

Features

5/ 5

Customer Service

5/ 5

Value for Money

5/ 5

Total features 49

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Alerts/Notifications
  • Application Security
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Automated Containment
  • Compliance Management
  • Data Security
  • Endpoint Management
  • Endpoint Protection Software
  • Firewalls
  • IOC Verification
  • Incident Management
  • Issue Tracking
  • Monitoring
  • Network Scanning
  • Network Security Software
  • Password Protection
  • Penetration Testing
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Runtime Container Security
  • SQL Injections
  • Search/Filter
  • Security Auditing
  • Simulated Threat Attacks
  • Source-Code Scanning
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web Scanning
  • Web-Application Security
  • Website Crawling

Total features 23

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Alerts/Notifications
  • Application Security
  • Assessment Management
  • Asset Discovery
  • Asset Tagging
  • Audit Management
  • Audit Trail
  • Automated Containment
  • Compliance Management
  • Data Security
  • Endpoint Management
  • Endpoint Protection Software
  • Firewalls
  • IOC Verification
  • Incident Management
  • Issue Tracking
  • Monitoring
  • Network Scanning
  • Network Security Software
  • Password Protection
  • Penetration Testing
  • Policy Management
  • Prioritization
  • Real-Time Data
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Risk Management
  • Runtime Container Security
  • SQL Injections
  • Search/Filter
  • Security Auditing
  • Simulated Threat Attacks
  • Source-Code Scanning
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Protection
  • Threat Response
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Vulnerability/Threat Prioritization
  • Web Scanning
  • Web-Application Security
  • Website Crawling
  • Bugzilla
  • GitHub
  • GitLab
  • Jira
Not provided by vendor