Our website scanner uses the Dynamic Application Security Testing (DAST) approach to help you discover thousands of vulnerabilities such as SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, and OWASP Top 10 targets.
We go a step beyond the capabilities of traditional website scanners to help you identify complex vulnerabilities. After finding the typical website flaws, we’ll identify second order vulnerabilities that usually require a seasoned security auditor to detect.
TrustedSite works hard to ensure they are doing everything they can to provide me with everything I need to have my site compliant and secure. Everyone I have worked with is friendly and knowledgeable."- Kara Stroder, Alpine Shop
Our scan is completely external, so protecting your network won't slow down your site—or your business.
You can choose to have a scan daily, weekly, monthly, or quarterly—or you can be scanned on demand.
We'll help break down which vulnerabilities are affecting your domains or networks, how severe they are, and what you should do about them.
As soon as a scan is finished, you'll receive a notification if any vulnerabilities are detected.
See how many and what types of vulnerabilities you've dealt with in the past, and which ones still need your attention now.
We'll help you avoid false-positives, saving you time by ensuring you'll only remediate true vulnerabilities.
SQL Injection (SQLi) is a type of an injection attack that enables cyber criminals to execute malicious SQL statements and bypass application security measures. They can then retrieve, add, modify and delete records in the SQL database.
Cross-site Scripting (XSS) is a client-side code injection attack. Cyber criminals aim to execute malicious scripts in a web browser by including malicious code in a legitimate web page or web application. The actual attack occurs when the victim visits the web page or web application that executes the malicious code.
Cross-site Request Forgery (CSRF) is the act of tricking a victim into performing actions on the behalf of an attacker. This type of attack leverages the fact that a website completely trusts a user once it can confirm that the user is indeed who they say they are.