REAL TIME DASHBOARD
Easy to use interface provides insight into
security threats and vulnerabilities.
Audit permission requests and permission usage by type as well as session activity for users with administrative privileges or elevated roles. Permission request events include stack trace information to help identify the code location where the permission request originated.
Keeping track of third party components and dependencies can be difficult and those components and packages may have vulnerabilities you are not aware of. Security Analyzer audits currently loaded jar files and class packages to identify any potential software vulnerabilities and risks.
Keeping track of third party components and dependencies can be difficult and those components and packages may have vulnerabilities you are not aware of. Security Analyzer audits currently loaded jar files and class packages to identify any potential software vulnerabilities and risks.Security Analyzer scans JVM memory and classes to identify sensitive data that may be exposed in clear text and that may be vulnerable to exploitation.
Continuous monitoring of the application detects security vulnerabilities and generates alerts that can be converted into real-time notifications via SNMP traps, syslog messages, emails, or text messages.
Ensure your trusted users aren’t being taken advantage of. Detect CSRF attacks with customizable filters to define which pages, resources and forms should be protected.
Monitor and capture all application server security and system exceptions regardless of whether or not they are being logged. Security Analyzer also provides additional information such as who generated the exception, what type of exception, and when it occurred giving you complete visibility into the security of your web applications.
Detect cross site scripting vulnerabilities so your trusted, mission critical applications are not used for malicious intent and your reputation stays intact.
Applications can be prone to injection flaws and data can be stolen, modified or deleted. Security Analyzer detects potential SQL injection attempts keeping you informed of potential attacks.
URLs can be vulnerable to network sniffing regardless of whether HTTPS is used therefore, passwords and other sensitive data should not be sent in clear text. Security Analyzer looks for text patterns that could expose sensitive information to prying eyes.
Systems can be vulnerable without your knowledge and the result is that data can be modified or stolen over time. Track and receive notifications on application configuration risks, compliance and changes that can make the runtime vulnerable.
Detects authentication vulnerabilities such as insecure cookies, session reuse/validation issues, log in/log activity.
Identify any OS command executions or attempts to access forbidden areas vulnerable to unwanted access.
Identifies open TCP port listeners that could indicate a possible back door in the application framework or open source libraries.
Performs startup checks to see if the Apache Commons serialization patch has been manually disabled and detects serialized classes.
Protect applications at the runtime with proactive responses to security threats.
Block any transactions that are suspected of being cross site scripting, SQL injection or cross site request forgery threats.
Security Analyzer can be configured to block any standard or custom classes that use serialization to protection against vulnerabilities that can be exploited when using this function.
Security Analyzer will evaluate HTTP header requests and if security headers are missing, Security Analyzer will insert the appropriate headers in the response to ensure the browser and ultimately, your users are safe from attempted security vulnerabilities.
A new security specific dashboard presents security data and information in an easy to digest format.
Create custom dashboards and widgets to create a view that is meaningful to you.
Event notifications include pertinent details such as stack trace details, xss URLs, etc providing the information needed to quickly identify and resolve security threats.
Quickly and easily configure which security event alerts to receive using our simple rules based system.
Security Analyzer reports provide detailed information on the exception such as user name, exception type, method, class, and stack trace and more.
Security Analyzer is easy to install and requires minimal configuration. Be up and running within minutes.
Our centralized dashboard makes it easy to view all security events, data and reports in one place.
Embedding our agent in the JVM means a lightweight solution with no additional process to manage. This method also gives us enhanced capabilities to capture data and change workflows such as denying access.
Most environments have more than one application server, that’s why we made Security Analyzer application server neutral. No matter what Java runtime you use, we’ve got you covered.
Receive immediate notification of security issues as well as audit customer facing, revenue generating web application servers.
Assess application security and compliance during design, development and implementation and post production.
Find vulnerable code and understand security risks during the software development life cycle.
Gain visibility into application security risks, threats and vulnerabilities as well as validate the security of internally and externally developed applications.
Prioritize real-time security alerts to quickly remediate issues to improve overall performance.