Top Rated Security testing Alternatives
It helped in assessing projects of high confidentiality for loopholes in security. It was a project that involved confidential details of resources of a large MNC and any breach of data could have cost the company in millions due to law suite. Review collected by and hosted on G2.com.
It helps with identifying loopholes in d code that can cause major security leak, the challenge to make the code fool proof was what I liked the best Review collected by and hosted on G2.com.
14 out of 15 Total Reviews for Security testing
Overall Review Sentiment for Security testing
Log in to view review sentiment.

We got lot of projects which belongs to a very different buisnesses sector like, retailers, pharmacy, online service providers, media entertainment, Financial Institutions, Banking services etc. We also have projects from Government organizations from different parts of the world.
Based on the business model and deployment model and the scope we have to perform our assessments. This will include Pentesting of applications. So there are various application types based on the development technologies and on which device it will run. Then we have Internal and External Network Assessment. Segmentation testing is also included in this, where you have lots of VLANS in the organisation. Red Team assessment, for moderate to large organisations. All this assessment is to make assure the organisation is secure till date and fulfill various criteria like PCI,HIPAA and other auditors benchmark to run their businesses and organisations. Review collected by and hosted on G2.com.
My personal interest is in Application (web, mobile, thickclient, API) security and Network VA. Review collected by and hosted on G2.com.

Security Vulnerability assessment of Web applications and Rest APIs. Review collected by and hosted on G2.com.
1. It can identify a range of security vulnerabilities and threats
2. It generates trust in customers
3. Various open source and licensed tools are available to conduct the active/passive scans like OWASP ZAP, Burp Suite, Accunetix etc Review collected by and hosted on G2.com.

We required penetration testing on our company website before it went live. Review collected by and hosted on G2.com.
The best thing of UTOR was following:
(1) The ease of use
(2) Crisp reporting
(3) Speed with which, we were able to complete the test Review collected by and hosted on G2.com.
As a security analyst I have worked on Web application DAST which ensures the flawless and more importantly secure functioning of the applications. It's based on the Confidentiality, Integrity and Authenticity of the Data. Through security testing organizations evaluate their products (applications or application codes) for vulnerabilities and take remedial measures for the same. I mostly use a Burp Suite tool as an interceptor for manually testing an application. Review collected by and hosted on G2.com.
The feature like active scanning of security tools helps in finding new vulnerabilities regularly and the satisfaction of securing the application grows. It encourages me to keep learn something new about security every time. Review collected by and hosted on G2.com.
Security Testing should be mandatory for every Web, Mobile,Api etc application. The number of vulnerabilities which you can find in the initial phase of application SDLC is high. Because of this reason time,Cost,And In depth chance of finding Vulnerabilities are high. So I highly recommend security Testing plays a vital role Review collected by and hosted on G2.com.
We have more scope to find vulnerabilities and in depth analysis can be done. By finding Vulnerabilities at the initial stage of SDLC should be taken as high priority Review collected by and hosted on G2.com.
Till now, I have employed security testing over many web application and networking projects. Crypto exchange applications, dynamic functionality applications, static WordPress applications and blogging sites are just few of them. Even embedded devices like, Modern toys and house-hold devices also require security testing. The main goal in any scenario or application is always the threat vector. There shouldn't be any misconfigurations or known vulnerabilities that could risk the confidentiality, integrity and availability of the organization or of the target application. Review collected by and hosted on G2.com.
Security Testing is essential for every software or hardware device that is linked to the internet. It may be a question of choice when it comes to safeguarding oneself, but not when you are dealing with other's sensitive data and resources of third-party organizations. A single zero-day exploit or known vulnerability might result in massive data loss or a denial of service attack. In many nations, putting their resident's data at danger can result in large penalties, restrictions, or bans. Review collected by and hosted on G2.com.
I was a participant in a project involving risk management and data classification. As part of the security domain, confirming the software's security was the most difficult task, and we had to conduct penetration testing and build several security policies, which we tested based on the policies and rules. Review collected by and hosted on G2.com.
Being able to find the vulnerabilities and any security related bugs w.r.t to website Review collected by and hosted on G2.com.

Banking and telecommunication projects for which Security should be solid and reliant. Review collected by and hosted on G2.com.
Identifying vulnerabilities and fixing them to make the web applications perform better. I have used IBM Appscan and Burp suite for Security testing. Review collected by and hosted on G2.com.

Securing applications os very important aspect of sdlc Review collected by and hosted on G2.com.
Prevention of security vulnerabilities
Mature sdlc
Embeded security from day 1
Secure by design
Threat models
Infra security
Tools used
Burp
Zap
Snyk Review collected by and hosted on G2.com.

like wifi cracking
like nmap
like droid break
like kali linux
meterpreter Review collected by and hosted on G2.com.
kali linux meterpreter like they nessus security scanner more more evolving Review collected by and hosted on G2.com.