Category: Reviews

Virtualization Software Reviews, Backup & Replication Software Reviews, Monitoring Software Reviews.

Nakivo Universal Object Recovery 0

NAKIVO Backup & Replication v8.1

There is no need to introduce Nakivo for my reader at begin of each post. Nakivo is one of leaders in backup & replication market now. I writing reviews about Nakivo Backup & Replication since version 6.x. All new version had new amazing and useful features. Nakivo Backup & Replication v8.1 comes with two new features as well. In addition of new features, Nakivo Backup & Replication v8.1 has come with lot of improvement and fixes. Let’s review new features, improvements and fixes.

OpenSCAP Tools 0

What is OpenSCAP?

OpenSCAP is an auditing tool that utilizes the Extensible Configuration Checklist Description Format (XCCDF). XCCDF is a standard way of expressing checklist content and defines security checklists. It also combines with other specifications such as CPE, CCE, and OVAL, to create a SCAP-expressed checklist that can be processed by SCAP-validated products.

OWASP Zed Attack Proxy (ZAP) 0

Overview of OWASP Zed Attack Proxy (ZAP)

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

GSM Community Edition - Report Comparison 0

Virtual Environments Vulnerability Assessment By GSM (OpenVAS) – Part 3

At the first part, we’ve reviewed GSM (Greenbone Security Manager – Formerly OpenVAS) as a security manager or assessment tool for discovering vulnerabilities on virtual environments, the second part was more functional and we talked more about GSM. You leaned that how can you create a target on Greenboone Security Manager and scan it to discover vulnerabilities.

As I said at the end of second part of the blog post, the third part is related to resolving security issues. Any software and specially operating systems have “Hardening Guide”. You must follow steps of hardening guide to reduce security vulnerabilities effect on production environments.