See how Scan SafeGuard works to give your site and your customers added security
Scan SafeGuard uses various industry standard tools to check your website for vulnerabilities utilizing passive scanning techniques that probe your systems while impacting its performance as little as possible. Initially, a port scan is done on your server looking for publicly accessible network services. Once we identify the service, we then do additional checks based on that service.
After signup, we complete a comprehensive scan of your website
Scan SafeGuard identifies website vulnerabilities and weaknesses
You are then sent an email and link to view your website report.
We use various industry standard tools to check your website for vulnerabilities utilizing passive scanning techniques that probe your systems while impacting its performance as little as possible.
We check for the following common security issues and more
Cross Site Scripting (XSS)
XSS is the most prevalent web application security flaw. XSS flaws occur when an application includes user supplied data in a page sent to the browser without properly validating or escaping that content.
Cross-Site Request Forgery (CSRF)
CSRF takes advantage of web applications that allow attackers to predict all the details of a particular action. Since browsers send credentials like session cookies automatically, attackers can create malicious web pages which generate forged requests that are indistinguishable from legitimate ones.
Security Misconfiguration
Security misconfiguration can happen at any level of an application stack, including the platform, web server, application server, framework, and custom code. Developers and network administrators need to work together to ensure that the entire stack is configured properly.
Attacker accesses default accounts, unused pages, unpatched flaws, unprotected files and directories, etc. to gain unauthorized access to or knowledge of the system
Insufficient Transport Layer Protection
Applications frequently do not protect network traffic. They may use SSL/TLS during authentication, but not elsewhere, exposing data and session IDs to interception. Expired or improperly configured certificates may also be used.