It allows tracking of manual penetration tests vulnerabilities into an unified view.
Consolidates and aggregates Dynamic (DAST) vulnerability scans.
Automates Vulnerability escalation process to responsible persons.
Single Sign-On Active Directory.
Adaptive Reports based on user permissions. Custom Reports based on client's needs.
Unique security state view for each user based on assigned rights.
Automatic Follow-up on vulnerabilities. Automatic Escalation after reaction time deadline expires
Granular user permissions based on roles and asset permissions.
Email Notification Templates
Project Report Template
Company Organigram Definition
Asset and Vulnerability Tagging
Software Providers Definition and Assignement
Projects and Asset Permissions
DREAD Scoring Methodology
Using the calendar function you can have a monthly or weekly view of all your planned projects and status.
The Dashboard allows managers to quickly identify vulnerability and take decisions based on current vulnerability risk.
3 Steps approach to Vulnerability Tracking
Add Assets with all contact details of responsible persons.
Step 1Add Project & Assign Assets to Project - Websites, IP Addresses, Custom Assets.
Step 2Add discovered vulnerabilities for each Asset in specific Project.
Step 3Simple and straight forward Dashboard.
Single Sign-On Active Directoy Intergration.
Automatic Vulnerability Monitoring.
Granular users permissions.
Features | Consultant | Consultant PRO | SaaS | On Premise |
---|---|---|---|---|
Dashboard | ||||
Project Management | ||||
Project File Repository | ||||
Multiple Scan Sources | ||||
Project Export | ||||
One click reporting | ||||
Customized reports | ||||
Unlimited Reports Templates | ||||
IP Address | ||||
Websites | ||||
Custom Assets | ||||
Asset Tagging | ||||
Applications | ||||
Subnet Management | ||||
Subnet Risk Management | ||||
Internal Ticketing System | ||||
Automatic Follow-up | ||||
Automatic Escalation | ||||
Vulnerability Actions & Logs | ||||
Vulnerability PoC | ||||
Vulnerability Rule Manager | ||||
Vulnerability Tagging | ||||
Vulnerability Correlation | ||||
Vulnerability Deduplication | ||||
Customized Description | ||||
Customized Recommendation | ||||
Customized Grouping | ||||
Customized Email Notifications | ||||
Notification Grouping | ||||
Granular Asset Permissions | ||||
Customizable User Roles | ||||
Unlimited User Roles | ||||
Users | 2 Users | 5 Users | 25 Users | Unlimited Users |
Screen-Share Support | 1h - Initial Setup | 1h - Initial Setup | 1h / Month | Unlimited Hours |
Email Support | ||||
API Integration | ||||
Threat Intelligence Integration | ||||
Customizable Scanner Integration | ||||
Business Intelligence | ||||
2FA | ||||
Software Management | ||||
Active Directory Integration | ||||
Payment | Monthly | Monthly | Monthly | Contact Us |
Price | 99 Eur | 199 Eur | 499 Eur | Contact Us |
Get More Details |
Centraleyezer - The centralized view of your company security state with central dashboard and many custom reports.
© 2023 Centraleyezer
What our partners say