Access "Core Security Technologies Core Impact 6.0 security tool review"
This article is part of the January 2007 issue of Keep today's threats close and tomorrow's closer
SECURITY TESTING Core Impact 6.0 REVIEWED BY MIKE POOR Core Security Technologies Price: $25,000 for annual subscription @exb @exe Prior to Core Impact, the vast majority of security penetration testers would use "off-the-Web" exploit code, after scouring an application code for backdoors and covert channels. Core Impact changed the security landscape by providing stable, tested and trustworthy exploits for ethical hacking. The latest release of this automated, commercial-grade penetration-testing software platform is an invaluable tool for professional penetration testers and corporate security engineers. Configuration/Management A Installing Core Impact 6.0 was a breeze--download, double-click and enter the long string to decrypt the installation executable. There are two main workflows: The rapid penetration test guides the user through the phases of reconnaissance, exploitation and reporting via a series of menu-driven wizards. You can choose the type of exploits to test, as well as the levels of risk to take (e.g., whether or not to run exploits that ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
How to setup and configure syslog to view and filter data
Your network devices are trying to tell you that you're under atta ck. Syslog helps you sort through the data overload and get the message.
-
SonicWALL SSL VPN 4000 product review
In this product review of SonicWALL SSL VPN 4000 security tool and appliance get information on setup, pricing, configuration, installation, remote access and policy features.
-
UTM product review: WatchGuard Technologies' Firebox X 1250e
WatchGuard Technologies' Firebox X 1250e
-
Identity Management: Apere's IMAG 500
Apere's IMAG 500
-
Mixed Signals
by Mark Baard
RFID gives businesses-and bad guys-an easy way to track and change information.
- View Point
-
How to setup and configure syslog to view and filter data
-
-
Core Security Technologies Core Impact 6.0 security tool review
In this product review, learn how Core Security Core Impact 6.0 tool can assist in ethical hacking a penetration testing, and get info on setup, reporting and management.
-
Virtual Threats
by Dennis Fisher
Virtual machines save you money in the data center, but can you ignore their security implications any longer?
-
Recent Releases: Security product briefs, January 2007
Read about the security products that launched in January 2007.
- At Your Service: January 2007 managed services security news
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Who's There?
Enterprises have a pressing need for endpoint security, but choosing a system that screens PCs before allowing them network access requires careful consideration.
-
Core Security Technologies Core Impact 6.0 security tool review
-
Columns
-
Ping: Nikk Gilbert
Nikk Gilbert
-
Editor's Desk: Celebrating 10 years of Information Security magazine
A Toast to Ten Years
-
Face-Off: Schneier, Ranum debate privacy and personal information
Does Secrecy Help Protect Personal Information?
-
Perspectives: Post-admission controls the next step for NAC
Post-admission controls would shore up NAC/NAP shortcomings.
-
Ping: Nikk Gilbert
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO