Nemasis-VMS
Manage Vulnerabilities with a comprehensive solution that is trusted is tested.
Nemasis is a Vulnerability Management Suite which assists in implementing a comprehensive GRC (Governance, Risk Management, and Compliance) strategy for managing an organization’s overall governance, risk, and compliance with regulations. Nemasis integration with the GRC strategy helps in managing security and compliance to reduce the overall business risk. Nemasis GRC offers various advantages like eliminating redundant cost, performing vulnerability scan in depth, optimizing the investment, securing the business reputation, asset discovery, and more.
Nemasis is used to scan the network vulnerabilities such as open ports, running applications on each system, and active services. Nemasis generates many types of reports based on NIST, OVA, World bodies, and more. Nemasis is supported by almost every platform, systems, applications, databases, devices, and browsers.

Passive Vulnerability Scanner

Internal and External Scanning

Compliance and Configuration Assessment

Distributed Scanner Support
Nemasis DAST scans vulnerabilities of websites and web applications (Internal and Public Facing). It not only identifies the vulnerabilities but also finds the security issues within them in the running state and provides recommendations to mitigate the vulnerabilities. It runs on operating code to detect issues with requests, responses, scripting, data injection, sessions, authentication, and more.
Following are key benefits of Nemasis DAST:
- Follows OWASP Compliances (2013 and 2017) with live provision of them on the dashboard and exportable reports for Audit Purposes.
- Scanners are built with a crawl and attack architecture.
- Scans for hidden and other exploitable vulnerabilities (XSS, SQL injection, and others listed in OWASP Top 10).
- Comprehensive application coverage with advanced attack methodologies.
- Compatible with web applications built on PHP, ASP, Java, and many more.
- Complete Audit Services and recommendations for improvement (PCI-DSS status, GDPR status, WHOIS Audit, Domain Audit, Blacklist, Malware Check, Domain Squatting, SSL Audit, Copycat Domain, MongoDB Audit) for dedicated audit reports.

Passive Mode Scanning
- Missing headers related to:
- CSRF Tokens
- Cache-Control
- Content-Type
- Content Security Policy
- Analyzes Cookies, Cookie Poisoning
- Information Disclosure Detection
- Private IP disclosure
- Reverse Tab-nabbing
- WSDL File Scanning
- Cross-Domain Misconfiguration
- PII (Personal Identifiable Information)
- URL Rewrites – Session ID

Attack/Active Mode Scanning
- Remote File Include, Server Side Include Attacks
- Remote OS Command Injection, Remote Code Execution
- Directory Browsing/ Traversal
- CRLF injection, XPath Injection, SQL Injection
- Cross Site Scripting – Persistent, DOM based
- Open SSL Vulnerability (HeartBleed) Detection
- Backup File Disclosure
- SOAP Attacks – Action Spoofing, XML Injection
- ELMAH (Error Logging Modules and Handlers) Information Leak

Services
- Domain Audit
- SSL Audit
- SEO Analytics
- MongoDB Audit
- WHOIS Audit

Reports
- PCI-DSS
- OWASP
- HIPAA
- SANS