What does Acunetix define as a Target?
A target is defined in Invicti as a fully qualified domain name (FQDN). An FQDN is the complete domain name for a specific target and consists of two parts; the hostname and the domain name. The below examples are considered to be 1 target, as they share the same FQDN. http://example.com https://example.com http://www.example.com http://www.example.com/test Subdomains and ports share the same FQDN, but are considered to be different targets. For example: http://example.com http://test.example.com http://example.com:81
Can I try Acunetix before I purchase?
Yes! Experience Acunetix firsthand with our no-risk Proof of Concept licenses. Test the complete solution in your actual environment to ensure it perfectly addresses your organization’s specific security needs before making any commitment.
What kind of integrations does Acunetix have?
Acunetix integrates with 3rd party applications, making it easier to track and protect against identified vulnerabilities. Check out this page to see all our integrations.
How frequently do you update your vulnerability database?
Acunetix employs advanced heuristic scanning technology rather than traditional signature databases, enabling it to detect zero-day vulnerabilities in even the most customized web applications. Your Acunetix subscription includes weekly Vulnerability Database Updates, covering known security issues in popular platforms like WordPress, Joomla, jQuery, Apache, and numerous others. Beyond these regular updates, you’ll receive innovative security checks designed to identify emerging zero-day threats, along with continuous improvements and new features. We deliver major platform updates approximately every two months, ensuring you stay ahead of evolving security challenges. For critical vulnerabilities like Heartbleed, our dedicated security research team works diligently to release protective updates within days of discovery. This specialized team continuously enhances both our vulnerability database and develops new security detection methods, providing you with industry-leading protection.