Standard On Premise | Enterprise On Premise | Enterprise Online | |
---|---|---|---|
Detect 4,500+ web vulnerabilities |
![]() |
![]() |
![]() |
Acunetix DeepScan Crawler (Crawls HTML5 websites & AJAX-heavy client-side SPAs) |
![]() |
![]() |
![]() |
Acunetix AcuSensor (Gray-box Vulnerability Testing) |
![]() |
![]() |
![]() |
Acunetix AcuMonitor (Out-of-band Vulnerability Testing) |
![]() |
![]() |
![]() |
Continuous Scanning |
![]() |
![]() |
|
Assign Target Management to Users |
![]() |
![]() |
|
Compliance Reports (HIPAA, PCI-DSS, ISO/IEC 27001 and more |
![]() |
![]() |
|
Scan for 50,000+ network vulnerabilities |
![]() |
Standard | Enterprise | Online | |
---|---|---|---|
Architecture and Scale | |||
Unlimited Web Scanning |
![]() |
![]() |
![]() |
Unlimited Network Scanning |
![]() |
||
Max Targets | 5-20 | 5-1000+ | 5-1000+ |
Multi-user |
![]() |
![]() |
|
User Roles and Privileges |
![]() |
![]() |
|
Number of Users | 1 | Unlimited | Unlimited |
Multiple Scan Engines | ‡ | n/a | |
Max Number of Scan Engines | 1 | 1-Unlimited | n/a |
Acunetix Vulnerability Assessment Engine | |||
Scanning for 4500+ web application vulnerabilities |
![]() |
![]() |
![]() |
Scanning for 50,000+ network vulnerabilities |
![]() |
||
Acunetix DeepScan Crawler |
![]() |
![]() |
![]() |
Acunetix AcuSensor (Gray-box Vulnerability Testing) |
![]() |
![]() |
![]() |
Acunetix AcuMonitor (Out-of-band Vulnerability Testing) |
![]() |
![]() |
![]() |
Acunetix Login Sequence Recorder |
![]() |
![]() |
![]() |
Manual Intervention during Scan |
![]() |
![]() |
![]() |
Malware URL Detection |
![]() |
![]() |
![]() |
Manual Pen-testing Tool Suite |
![]() |
![]() |
![]() |
Scanning of Online Web Application Assets |
![]() |
![]() |
![]() |
Scanning of Internal Web Application assets |
![]() |
![]() |
![]() |
Key Reports and Vulnerability Severity Classification | |||
Key Reports (Affected Items, Quick, Developer, Executive) |
![]() |
![]() |
![]() |
OWASP TOP 10 Report |
![]() |
![]() |
![]() |
CVSS (Common Vulnerability Scoring System) for Severity |
![]() |
![]() |
![]() |
Remediation Advice |
![]() |
![]() |
![]() |
Compliance Reports* |
![]() |
![]() |
|
Centralized Management and Extensibility | |||
Dashboard |
![]() |
![]() |
![]() |
Scheduled Scanning |
![]() |
![]() |
![]() |
Continuous Scanning |
![]() |
![]() |
|
Target Groups |
![]() |
![]() |
|
Assign Target Business Criticality |
![]() |
![]() |
|
Prioritize by Business Criticality |
![]() |
![]() |
|
Trend Graphs |
![]() |
![]() |
|
WAF Virtual Patching** |
![]() |
![]() |
|
Issue Tracking Systems Integration*** |
![]() |
![]() |
|
Jenkins Plug-in Integration |
![]() |
![]() |
|
Assign Target Management to Users |
![]() |
![]() |
|
Integration APIs |
![]() |
![]() |