Get a demo Acunetix Website Security Scanner Get a demo
  • Product
  • Why Acunetix?
    • Solutions
      • INDUSTRIES
        • IT & Telecom
        • Government
        • Financial Services
        • Education
        • Healthcare
      • ROLES
        • CTO & CISO
        • Engineering Manager
        • Security Engineer
        • DevSecOps
    • Case Studies
    • Customers
    • Testimonials
  • Pricing
  • About Us
    • Our story
    • In the news
    • Careers
    • Contact
  • Resources
    • Blog
    • Webinars
    • White papers
    • Buyer’s guide
    • Partners
    • Support
  • Get a demo

WEB SECURITY APPLICATION SECURITY ESSENTIALS

External Vulnerability Scanner

Automate security testing for web applications—your new external attack surface.

Get a demo
Gartner Peer Insights Reviews

Using Acunetix by Invicti as an external vulnerability scanner

External vulnerability scanning, also called perimeter scanning, is one of the absolutely necessary security tests any organization should undertake routinely. External vulnerability scanning helps to perform vulnerability assessments and make sure that weaknesses potentially accessible to external attackers are identified and remediated as quickly as possible by following cybersecurity best practices. Combining a best-of-breed web vulnerability scanner and a network security scanner, Acunetix can scan hundreds of web applications and APIs for thousands of vulnerabilities quickly and accurately, making it an indispensable part of any application security toolbox. Learn why web apps and APIs are the new network perimeter, how speed and accuracy let you automate your AppSec process, and why vulnerability management and reporting features make all the difference.
Acunetix Web Vulnerability Scanner

Web application vulnerabilities are now your external vulnerabilities

Before cloud-based web applications came to dominate business software, most external vulnerability scanning would be limited to the external network infrastructure immediately reachable to attackers and focus on network vulnerabilities. Today, the majority of data breaches originate from attacks on web applications and APIs. In effect, the scanning perimeter has moved from the network to the application layer—with the major difference that when you’re in the cloud, you can’t lock away your entire environment behind a firewall like you could on premises. To keep up with malicious hackers, organizations need to start treating web apps and APIs as their external attack surface and web vulnerability scanners as their external vulnerability scanners. Acunetix is a mature and proven solution for dynamic application security testing (DAST) that can crawl and test the vast majority of modern websites and applications regardless of technology stack, including all-dynamic JavaScript and HTML5 applications. Acunetix also features a fully integrated external network vulnerability scanner based on the open-source OpenVAS, allowing you to rapidly and continuously scan your perimeter for vulnerabilities and misconfigurations both in the application and network layers.

Fast, flexible, and continuous external vulnerability scanning

Web development is constantly evolving, with ever-changing technologies being used to build increasingly complex apps. Many external vulnerability scanners and black box scanners can’t fully scan, large and complex web applications because they were designed for a past world of mostly static web pages. Acunetix, on the other hand, was built for accuracy and speed, featuring an integrated browser engine and a highly tuned crawler and scan engine to perform complete external vulnerability scans even on large and complicated applications without breaking a sweat—and without swamping your teams with false positives. For added security and flexibility, you can schedule external vulnerability scans to run at specific times of a day, week, or month, or even define you own custom schedule. You also have the option of running scans on a continuous basis with Acunetix only running a quick scan every day of the week, with a full scan run once a week. This ensures that any new vulnerabilities that may have been introduced in between full scans still get picked up. Additional features such as configurable scan rate limiting help to ensure that you can run external vulnerability scans using Acunetix even on high-traffic sites without affecting their performance.

Clear and actionable vulnerability management and reporting

Built-in vulnerability management, prioritization, and reporting features in Acunetix are another major advantage compared to most vulnerability scanning tools, especially tools originally designed for penetration testing. After an external vulnerability scan is complete, Acunetix can instantly generate a wide variety of technical and regulatory and compliance reports such as PCI DSS, HIPAA, OWASP Top 10 and many others. Acunetix also lets you export discovered vulnerabilities to third party issue trackers such as Atlassian Jira, GitHub, GitLab, Microsoft Team Foundation Server (TFS), Bugzilla, or Mantis—and that’s in addition to built-in integrations that let you create tickets directly in supported collaboration tools. One of the biggest issues with conventional external vulnerability scanners is that they simply show a list of scan results. In contrast, Acunetix provides its own vulnerability management functionality, keeping track of open vulnerabilities found during each scan. After a vulnerability is fixed, Acunetix can re-test just the relevant page to make sure the vulnerability is properly fixed and then automatically mark it as resolved. All this information, combining web and network scanning in one place, is available at a glance in the Acunetix Dashboard. There are even multi-user and multi-role capabilities to make sure each user can only see what they’re meant to.

Frequently asked questions

What is an external vulnerability scan?

An external vulnerability scan, also called a perimeter scan, is a type of vulnerability scan that is performed from outside the host or network. Such a scan emulates the behavior of a potential external attacker. It focuses on finding security vulnerabilities in assets that are exposed by design and also on finding assets or information that should not be exposed externally.

Read about the basics of web security.

Is an external vulnerability scan more important than an internal one?

Network and web cyberattacks can be performed both externally and internally. However, most companies are more worried about external attacks by cybercriminals than insider risks, treating external vulnerability scanning as more important. However, internal assets must also be secured because they are often used for privilege escalation.

Read how an external SQL Injection attack may lead to internal system compromise.

Can I perform an internal vulnerability scan with an external scanner?

In the case of web vulnerability scanning, you can expose internal assets to an external web vulnerability scanner. In the case of network scanning, it is more difficult because the purpose of a network scanner is to check for open ports and service exposure. Therefore, it is more effective to use an on-premises scanner for internal network scans.

Learn how to configure Acunetix to scan internal web assets.

What types of external vulnerability scans can I perform with Acunetix?

With Acunetix Online and Acunetix on-premises, you can perform web vulnerability scans and network scans, both external and internal. In Acunetix Online, network scanning is ready to use as soon as you log in. In the case of Acunetix on-premises, you need to separately install OpenVAS and provide its listening address and port to Acunetix.

Learn how to enable network scanning in Acunetix on-premises.

Recommended reading

Learn more about prominent vulnerabilities, keep up with recent product updates, and catch the latest news from Acunetix.

Knowledge Sharing

Knowledge Sharing

What is SQL Injection

What is Cross-site Scripting

What Are XML External Entity Attacks

What is Insecure Deserialization

Popular Posts

Popular Posts

SQL Injection Example

Preventing SQL Injection in PHP

TLS/SSL Cipher Hardening

Defending Against CSRF Attacks

In The News

In The News

2020 Web Application Vulnerability Report

Complimentary licenses – COVID-19

Interview with Acunetix President & COO

Innovations in Acunetix v13

Client: Xerox

“We use Acunetix as part of our Security in the SDLC and to test code in DEV and SIT before being promoted to Production.”

Kurt Zanzi, Xerox CA-MMIS Information Securtiy Office, Xerox
Read more case studies >

Take action and discover your vulnerabilities

Get a demo
Client: AWS
Client: Cognizant
Client: Garmin
Client: Airforce
Client: NASA
Client: American Express
Product Information
  • AcuSensor Technology
  • AcuMonitor Technology
  • Acunetix Integrations
  • Vulnerability Scanner
  • Support Plans
Use Cases
  • Penetration Testing Software
  • Website Security Scanner
  • External Vulnerability Scanner
  • Web Application Security
  • Vulnerability Management Software
Website Security
  • Cross-site Scripting
  • SQL Injection
  • Reflected XSS
  • CSRF Attacks
  • Directory Traversal
Learn More
  • White Papers
  • TLS Security
  • WordPress Security
  • Web Service Security
  • Prevent SQL Injection
Company
  • About Us
  • Customers
  • Become a Partner
  • Careers
  • Contact
Documentation
  • Case Studies
  • Support
  • Videos
  • Vulnerability Index
  • Webinars
  • Login
  • Invicti Subscription Services Agreement
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Find us on Facebook
  • Follow us on Twiter
  • Follow us on LinkedIn

© Acunetix 2024, by Invicti