Application Description » History » Version 1
Version 1/2
-
Next » -
Current version
Luke Murphey, 03/09/2011 08:15 PM
Application Description¶
45 Character Description:¶
A website IDS that detects errors and attacks
80 Character Description:¶
A website scanner that detects defacements, errors and information leaks
250 Character Description:¶
ThreatFactor NSIA is a website scanner that monitors websites in real-time in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.
450 Character Description:¶
ThreatFactor NSIA is a website scanner that monitors websites in real-time in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.
ThreatFactor detects issues remotely and therefore requires no software to install, does not introduce any latency and will not interrupt business operations. NSIA can be installed and configured in minutes.
2000 Character Description:¶
ThreatFactor NSIA is a website scanner that monitors websites in real-time in order to detect defacements, compliance violations, exploits, sensitive information disclosure and other issues.
ThreatFactor detects issues remotely and therefore requires no software to install, does not introduce any latency and will not interrupt business operations. NSIA can be installed and configured in minutes.
At it's core, ThreatFactor uses an advanced analysis engine that is capable of detecting a wide variety of issues and can be modified with custom signatures. NSIA can be configured perform almost any action once an issue is identified, such as sending a text message (IM, email, SMS) or executing a script.
Type of Issues Detected:
The ThreatFactor solution was designed specifically to help organizations quickly identify issues on your websites that may tarnish your organization's image or adversely affect your customers, partners and employees such as:
Website Defacements: attacks on a website in order to change the visual appearance of the site
Compliance and Privacy Issues: such as forms that submit passwords unencrypted, pages that accept user information but don't include a privacy policy, etc.
Web Exploits: modifications to web pages performed by attackers in order to host malware or send private customer information (such as login information) to a third party.
Sensitive Information Leaks: information leaked through detailed error messages, files that were not intended to provided to the public
System Failures: such as broken links, error and warning messages, poorly configured servers or servers with default configuration, expired SSL certificates