Metasploit Express

Description

Easy-to-use penetration testing tool for security teams. Mainstream penetration testing product. Metasploit Express is program optimized for security experts with a broad range of responsibilities who need an accessible and affordable penetration testing solution to verify the findings of their vulnerability scanners without extensive training.Metasploit Express enables you to validate the strengths and weaknesses of your overall security program. It also helps to determine the performance of your current security investments and prioritize security projects to maximize limited resources and budget.Metasploit Express offers you a useful program solution for testing the security of your systems.Metasploit Express enables you to:
1. Gain immediate insight into critical security threats in your IT infrastructure
2. Save time and slash remediation and notification costs by avoiding network downtime and/or averting a breach
3. Leverage hundreds of fully tested and integrated exploit modules
4. Create a heightened awareness of security's importance at the executive level
5. Provide your security team with a powerful basis for supporting approval of larger security budgets
6. Determine if potential vulnerabilities represent real threats to your infrastructure without being burdened by a large number of false positives
7. Simplify and accelerate your security testing software with an end-to-end penetration testing workflow via an easy to use graphical interface
8. Meet regulatory compliance and prepare for security audits by implementing a formal security testing program
9. Enhance your overall security by proactively eliminating identified security threats
10. Detect common vulnerabilities that are outside of a normal audit scope, such as shared passwords across disparate systemsMetasploit Express Features:
Comprehensive:
1. Latest exploits and payloads - leverages the world's largest integrated public database of exploits and payloads
2. Extensive attack targets - tests servers, desktops, Web servers, databases and devices. Automatically compromise database servers and network devices
3. Robust, real-time, configurable reports - including executive summary, audit, compromised hosts, collected evidence, authentication tokens
4. Powerful administration - configurable settings, site configurations, and standard workflow XML-RPC interfaces.
5. Enterprise-class support - Metasploit online community and guaranteed enterprise-level support with SLAs from Rapid7Safe:
1. Adjustable throttle speed with optional safe exploits
2. Fully tested exploit by community of over 100,000 expert usersEasy to use:
1. GUI interface with end-to-end penetration testing workflow
2. Ready to use - hundreds of fully tested and integrated exploit modules
3. Out-of-the box integrations - vulnerability management integration with Rapid7 NeXpose and other scanners; and the capability to initiate a NeXpose scan from within Metasploit ExpressBenefits:
1. Gain immediate insight into critical security threats in your IT infrastructure
2. Validate the strength and weaknesses of your overall security program
3. Determine the performance of your current security investments
4. Prioritize security projects to maximize limited resources and budget
5. Create a heightened awareness as the Executive level for the importance of security
6. Prepare for regulatory and internal audits with a formal security testing program
7. Distinguish real threats from false positives to speed and simplify remediation

Vulnerability Assessment - Vulnerability Management - Vulnerability Scanner - Security Risk Management - Security Vulnerability Management - Penetration Testing - Web Application Security - Database Security - Network Security - Network Security Software

Published By:rapid7.com

License Type:Shareware

Date Added:13 November, 2012

Version:4.1.4

Downloads:5

Size:244.9 MB

Platform: Macintosh

More downloads from rapid7.com

NeXpose Community Edition is powered by the same scan engine as award-winning NeXpose Enterprise and offers many of the same features. Support is available via the extensive online Community

DateSep 25, 2014

Authorrapid7.com

Size:253.4 MB

LicenseFreeware

Price:Free

PlatformMacintosh

CategoryMiscellaneous

What people say
- required fields
     
Related Downloads

Identity Protection is a powerful, easy to use security suite for protecting your computer and internet identity from hackers.

DateSep 25, 2014

AuthorInfiltration Systems

Size:3.7 MB

LicenseShareware

Price:$29.95

PlatformWin98, WinME, WinXP, Windows 2000

CategoryAnti-Spam & Anti-Spy Tools

Identity Protection

Infiltrator is a network security scanner that can quickly audit your network computers for possible vulnerabilities, exploits, and information enumerations.

DateSep 25, 2014

AuthorInfiltration Systems

Size:1.3 MB

LicenseShareware

Price:$49.95

PlatformWindows All

CategoryNetwork

As the industrys first endpoint security solution to incorporate multiple layers of proven technologies, eEye Digital Securitys Blink Endpoint Intrusion Prevention solution addresses today's most pressing security challenge: preventing the attack

DateSep 25, 2014

Authoreeye.com

Size:24.6 MB

LicenseDemo

Price:Free

PlatformMacintosh

CategoryAntivirus

Industrial Strength Computer SecurityBlink Personal: Provides home PC protection plus Internet Security. Including all-in-one antivirus, antispyware, antiphishing, identity theft protection, plus personal firewalls

DateSep 25, 2014

Authoreeye.com

Size:109.1 MB

LicenseShareware

PlatformMacintosh

CategoryMiscellaneous

Designed for personal use and home office environments, Blink Personal Internet Security with Antivirus is the only solution to provide consumers with the most protection available when compared to other internet security offerings

DateSep 25, 2014

Authoreeye.com

Size:33.9 MB

LicenseShareware

PlatformMacintosh

CategoryMiscellaneous