Vulnerability scanning

Cloud solution for discovery and detection of web applications vulnerabilities.

WebGuard vulnerability scanning

WEBGuard Web Application Scanning (WAS) uses the scalability of the cloud platform to search, list and check company web applications. The WEBGuard WAS service checks, analyzes web applications and identifies vulnerabilities that are dangerous for databases or can help bypass application access control tools.

The WEBGuard® Web Application Scanning (WAS) is provided as a service and allows:
  • Index Web applications.
  • Identify XSS and SQL injection vulnerabilities.
  • Identify "sensitive content" in HTML. Perform scans with and without authentication.

Users can manage Web applications, run scans and generate reports using the same interface as in WEBGuard.

Key features:

  • Detection and cataloging applications

    Discovers new and unknown web applications on the network. WEBGuard WAS will help reduce risk by automatically searching for official and "unofficial" applications that may be hidden in your network environment.

  • Configurable resource tagging
    Organize your data and reports with labels. As the company grows, the number of web applications grows, keeping them organized is critical to security. With WEBGuard WAS, you can tag your applications with your own labels and then use these labels to manage reporting and access restrictions to scan data.
  • Industry standard reporting 
    Focus on OWASP Top 10 risks. Open Web Application Security Project (OWASP) Top 10 has become the industry standard for classifying the most critical risks for web applications. WEBGuard WAS allows you to accurately find these vulnerabilities - including SQL injections, cross-site scripting (XSS), cross-site spoofing (CSRF) and URL redirection - and learn how to effectively address them.
  • High accuracy scanning

    Saves time by allowing you to focus on what matters most. WEBGuard WAS is designed to reliably find a vulnerability without wasting time on false alarms. You can detect OWASP Top 10 risks such as SQL injections, cross-site scripting (XSS), cross-site spoofing (CSRF) and URL redirection - then priorities are set and you can focus on the issues that will have the most effect.

  • Tested scans 

    Automatically login to the test as a real user. Just enter your username and password; WEBGuard automatically detects forms of authorization and authentication, so the scan will work as if they were real users. Several authentication methods (including form, HTTP Basic, Digest and HTLM) ensure compatibility with a wide range of applications.

  • Interactive information panels
    Be aware of the security of your application at a glance. See a complete view of scan completion, reports and vulnerabilities identified in a single screen. With WEBGuard WAS, you can scan applications anywhere - inside your network hosted on the Internet or based in the cloud - and manage results together.
  • Highly accurate, configurable reports
    Take the scan results and go for action in minutes. With WEBGuard WAS, highly customizable, interactive reports enable powerful analysis of scanned images in many applications at once. The new Report Wizard makes reporting even easier.
  • Scanning scheduled and on demand Scanning is done exactly when you want. You can start the scan immediately or schedule it to run at a certain moment in the future. You can even control how long the scan will last.
  • Share and collaborate

    If you manage a large number of applications, you can have your own administrators, security staff, developers, managers and even auditors, all can use WEBGuard simultaneously. Each user can have his own record with access only to the resources and actions they need.

  • Extensive API

    Integration of scan data into other security systems. A rich set of APIs allows you to use the scanning results of your web application.

Why trust Cloud4Y
13 years in cloud computing
Since 2009 the company has been successfully operating in the Russian and international cloud services markets.
Reliable infrastructure
4 TIER III data centers, Enterprise level hardware and software: HP, Cisco, Juniper, NetApp, VMware, Veeam, Microsoft, etc.
SLA 99.982%
Optical ring, MetroCluster and redundancy mechanisms guarantee fault tolerance of services up to SLA 99.99%.
Transparent Billing Options
Hourly billing and pay-as-you-go allow you to pay only for the resources consumed.
Geo-Distributed Backup
Automatic backup (14 restore points) in a separate remote data center.
Flexible scalability
You can add and reduce the amount of resources without the need to contact technical support service.
24/7 technical support
If any technical issue occurs, our team of support experts is available round-the-clock, response time is 10 minutes.
Partner Program
Earn up to 35% of your annual contract. White Label is available.


FAQ

Frequently asked questions (FAQ)

Find answers to your questions  in our knowledge base, ask our manager using online-chat or send an inquiry using the support ticket system.


Send a request
Let our managers know if you are interested in a solution or a service. They will contacts you within 2 hours.
You also can request a free trial access here
Scroll up!