It allows tracking of manual penetration tests vulnerabilities into an unified view.
Consolidates and aggregates Dynamic (DAST) vulnerability scans.
Automates Vulnerability escalation process to responsible persons.
Single Sign-On Active Directory.
Adaptive Reports based on user permissions. Custom Reports based on client's needs.
Unique security state view for each user based on assigned rights.
Automatic Follow-up on vulnerabilities. Automatic Escalation after reaction time deadline expires
Granular user permissions based on roles and asset permissions.
Email Notification Templates
Project Report Template
Company Organigram Definition
Asset and Vulnerability Tagging
Software Providers Definition and Assignement
Projects and Asset Permissions
DREAD Scoring Methodology
Using the calendar function you can have a monthly or weekly view of all your planned projects and status.
The Dashboard allows managers to quickly identify vulnerability and take decisions based on current vulnerability risk.
3 Steps approach to Vulnerability Tracking
Add Assets with all contact details of responsible persons.Step 1
Add Project & Assign Assets to Project - Websites, IP Addresses, Custom Assets.Step 2
Add discovered vulnerabilities for each Asset in specific Project.Step 3
Simple and straight forward Dashboard.
Single Sign-On Active Directoy Intergration.
Automatic Vulnerability Monitoring.
Granular users permissions.
|Project File Repository
|Multiple Scan Sources
|One click reporting
|Unlimited Reports Templates
|Subnet Risk Management
|Internal Ticketing System
|Vulnerability Actions & Logs
|Vulnerability Rule Manager
|Customized Email Notifications
|Granular Asset Permissions
|Customizable User Roles
|Unlimited User Roles
|1h - Initial Setup
|1h - Initial Setup
|1h / Month
|Threat Intelligence Integration
|Customizable Scanner Integration
|Active Directory Integration
|Get More Details
Centraleyezer - The centralized view of your company security state with central dashboard and many custom reports.
© 2023 Centraleyezer