Acunetix Reviews & Pricing
What is Acunetix?
Industry Specialties: Serves all industries
Acunetix Pricing
Based on our most recent analysis, Acunetix pricing starts at $1,995 (Per User, Annually).
- Price
- $$$$$
- Starting From
- $1,995
- Pricing Model
- Per User, Annually
- Free Trial
- Yes, Request for Free
Training Resources
Acunetix is supported with the following types of training:
- Documentation
- In Person
- Live Online
- Videos
- Webinars
Support
The following support services are available for Acunetix:
- Phone
- Chat
- FAQ
- Forum
- Help Desk
- Knowledge Base
- Tickets
- Training
- 24/7 Live Support
Acunetix Benefits and Insights
Key differentiators & advantages of Acunetix
- Vulnerability Scanner: Includes web vulnerability tests in SecDevOps processes to save resources and avoid late patching. Uses a unique scanning algorithm, SmartScan, to quickly find vulnerabilities and save resources during penetration testing due to low false-positive rates. It can be deployed locally on macOS, Microsoft Windows and Linux operating systems.
- Manage Security: Discover multiple vulnerabilities, including weak passwords, misconfigurations, exposed databases, XSS, SQL injections and out of the band vulnerabilities. Scan complex multi-level forms and password-protected areas through advanced micro-level technology.
- Improved Results: Verifies real vulnerabilities and assesses the severity of issues to provide actionable insights. Eliminates lengthy setups and onboarding times to facilitate quick scanning, preventing network hogging and server overloading.
- Enables Automation: Schedule and prioritize full or incremental scans according to traffic load and business needs. Handle identified issues using built-in management functionality or integration with its current tracking systems. Scan new builds with the latest CI tools like Jenkins and import pre-seed crawl data from Burp, Fiddler, Postman, Paros and more.
- Seamless Integrations: Track and protect against identified vulnerabilities through integrations with third-party applications. Development teams can streamline collaboration and manage work using issue trackers. Create appropriate rules to protect against attacks targeting vulnerabilities with web application firewall integrations. Offers a Jenkins plugin to discover and track vulnerabilities early on in the software development lifecycle.
Industry Expertise
Acunetix Reviews
Based on our most recent analysis, Acunetix reviews indicate a 'excellent' User Satisfaction Rating of 90% based on 64 user reviews from 2 recognized software review sites.
Synopsis of User Ratings and Reviews
Based on an aggregate of Acunetix reviews taken from the sources above, the following pros & cons have been curated by a SelectHub Market Analyst.
Pros
Cons
Researcher's Summary:
However, some users have pointed out limitations. One criticism targets the licensing model, with a user describing it as "the worst I have ever used" due to its inflexibility in reallocating target URLs. Another user cautioned against relying solely on Acunetix, noting that "some vulnerabilities still can't be detected" and recommending manual vulnerability assessments as a supplementary measure. Despite these drawbacks, Acunetix is generally viewed favorably by users, who appreciate its robust features, accuracy, and ease of use.
Acunetix appears to be a suitable choice for organizations of all sizes that prioritize web application security. Its comprehensive scanning, automation features, and integration capabilities make it a valuable asset for security professionals and developers alike. However, potential users should carefully consider the licensing model and the need for manual vulnerability assessments to ensure it aligns with their specific requirements and risk tolerance.
Key Features
- Automated Penetration Testing: Manually identify web application vulnerabilities like cross-site scripting, SQL injections and more before starting a penetration test. Allows vulnerability assessment and management with integration options, including an API for building personal integrations. Follow up with further manual tests using GUI-based and command-line penetration testing tools.
- Website Security Scanner: Run scans to probe sites and find application risks. Examine web applications built with Java frameworks like Struts, Spring and Java Server Faces. Scan password-protected pages automatically using the Login Sequence Recorder. Utilizes AcuSensor technology to inspect web application’s source code. Replicates user actions to execute scripts like a browser. Employs black and gray box testing to focus on the entire attack surface.
- External Vulnerability Scanner: Scans perimeters for network-layer vulnerabilities and misconfigurations. Provides options to schedule external vulnerability scans at a specific time to run regular scans. Generates technical, regulatory and compliance reports like OWASP top 10, PCI DSS, HIPAA and more. Export vulnerabilities to third-party issue trackers such as GitHub, GitLab, Atlassian JIRA, Bugzilla, Mantis and Microsoft TFS.
- Web Application Security: Defends against known and website or web application vulnerabilities that include sites built with hard to scan HTML5 and JavaScript SPAs. Scan website files through custom form authentication or other access controls and session management. Assess and minimize security risks with out-of-the-box vulnerability management tools, including prioritization and historic trends.
- AcuSensor Technology: Enables interactive application security testing and works with applications written in PHP, ASP.NET and Java. Provides additional information from the server back end during web application scanning to offer ease of remediation, greater precision and full coverage. It can be installed on staging servers to perform IAST analysis.
- AcuMonitor Technology: Increases the scope of vulnerabilities detected by Acunetix scanner and enables out of the band detection. Identifies vulnerabilities like host header attacks, blind XSS, blind server-side XML/SOAP injection, out of the band remote code execution and SQL injection, email header injection, server-side request forgery and XML external entity injection.
Limitations
- Comprehensive CSV file format downloads are not provided.
- Scans take a longer time to complete.
- Provides false-positive alerts at times.