Main > About us
Information Security Audit Web Technologies designs and develops software products designed to secure information at various levels of access.
|
5 Facts about ISAWT:
FACT 1:
ISAWT uses only original software.
FACT 2:
A web resource scanning with Security-Scan is carried out by black box method, i.e. researching on behalf of an external attacker without additional information about the system from an owner.
FACT 3:
Security control of a web resource using the Interceptor Software is a white box method, i.e. all the necessary system data are applied, including the source code of the applications.
FACT 4:
We offer an individual security strategy for each business partner.
FACT 5:
In the Security-Scan modules, mechanisms that automatically emulate cybercriminals' actions in detecting and exploiting SQL injections are widely used. Therefore, in order to avoid using the scanner for criminal purposes, ISAWT does not sell Security-Scan.
FACT 1:
ISAWT uses only original software.
FACT 2:
A web resource scanning with Security-Scan is carried out by black box method, i.e. researching on behalf of an external attacker without additional information about the system from an owner.
FACT 3:
Security control of a web resource using the Interceptor Software is a white box method, i.e. all the necessary system data are applied, including the source code of the applications.
FACT 4:
We offer an individual security strategy for each business partner.
FACT 5:
In the Security-Scan modules, mechanisms that automatically emulate cybercriminals' actions in detecting and exploiting SQL injections are widely used. Therefore, in order to avoid using the scanner for criminal purposes, ISAWT does not sell Security-Scan.
How we are working?
Security Audit Service
Our scanner automatically tests your web resource for SQL vulnerabilities. All actions take place remotely in real time and without our entry to your internal system. The service management comes from your personal account by your own.
Our scanner automatically tests your web resource for SQL vulnerabilities. All actions take place remotely in real time and without our entry to your internal system. The service management comes from your personal account by your own.
To use our services, please register your personal account and confirm administration rights to the claimed web resource. We DO NOT require confidential information about your web resource (for example, login and password) and DO NOT install third-party software on your PCs. The administration rights confirmation is simple and does not have any consequences for your web resource (more details in Personal Account). You can order the Security Audit Service only after administration rights confirmation. Make a payment in any convenient way for you. At the same time a public offer contract is concluded. |
To use our services, please register your personal account and confirm administration rights to the claimed web resource. We DO NOT require confidential information about your web resource (for example, login and password) and DO NOT install third-party software on your PCs. The administration rights confirmation is simple and does not have any consequences for your web resource (more details in Personal Account). You can order the Security Audit Service only after administration rights confirmation. Make a payment in any convenient way for you. At the same time a public offer contract is concluded. |
Interceptor License
To acquire the Interceptor Software, you only need to register your personal account and pay.
The software is managed in both user mode and Personal Account.
The software distribution will be available for downloading in your personal account after completing the payment procedure.
To acquire the Interceptor Software, you only need to register your personal account and pay.
The software is managed in both user mode and Personal Account.
The software distribution will be available for downloading in your personal account after completing the payment procedure.
Free Services
Our scanner is a powerful tool in the hands of a cybercriminal, so we do not sell or distribute it, even with limited functions. However, using our loyalty program, you can apply for a trial free testing of your web resource. You can also utile our Hack Interceptor for 30 days for free in demo mode.
Become a member of the Free Scan Program and download the free version of Interceptor in your Personal Account on the web site.
Become a member of the Free Scan Program and download the free version of Interceptor in your Personal Account on the web site.