Filename | nCircle IP360 added Python Based custom Vulnerability Rules option |
Permission | rw-r--r-- |
Author | Unknown |
Date and Time | 2/21/2013 |
Label | Penetration |
Action |
Ethical Hacking Institute in Pune
./Arizona Team
nCircle announced today that IP360™ users can now create custom vulnerability detection rules using the well-known Python programming language. These new tools build upon nCircle’s existing Advance Security Programming Language (ASPL), allowing users to create tailored vulnerability assessments for specific business requirements. Python-based custom rules allow users to combine advanced programming techniques with various forms of authenticated access. Custom Python-based vulnerability assessment rules can also implement detection using proprietary network communication protocols.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE
./Arizona Team
nCircle announced today that IP360™ users can now create custom vulnerability detection rules using the well-known Python programming language. These new tools build upon nCircle’s existing Advance Security Programming Language (ASPL), allowing users to create tailored vulnerability assessments for specific business requirements. Python-based custom rules allow users to combine advanced programming techniques with various forms of authenticated access. Custom Python-based vulnerability assessment rules can also implement detection using proprietary network communication protocols.
www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE