Retina Vulnerability Scanner-Community Released

Automatic tools has great importance in the world of penetration testing/ethical hacking, these tools save time and money and you can audit your whole IT infrastructure easily. As we have discussed different automatic tools before for both web and networks.

In this article we will talk about the commercial product for vulnerability scanning, vulnerability management and vulnerability assessment scanner and the product is Retina It was written by eEye, the function of the retina is to scan all the host on a network and report if any vulnerability found.

It provides the function to manage a wide IT infrastructure from a single web-based console, it provides the complete management solution and protection to the network. Retina products includes:

Retina Network

Retina provides the network security scanner, the most effective and valuable vulnerability scanning tool for your network. It can identifies the known and zero-day vulnerabilities on your network to provide the best security service and protect your assets. It can detect and scan all the assets on a network for both local and remote. You can manage and maintain your security policy.

Retina Community

The main purpose of this article is to introduce the community edition of retina, retina community is free vulnerability assessment scanner tool and eEye support you to make and maintain the most secure network. 

  • Vulnerability assessment across operating systems, applications, devices, and virtual environments (32 IPs)
  • Zero-day vulnerability identification
  • Report export to XML, CSV, and PDF
  • Online support and resources from eEye’s research team
  • Detailed vulnerability and executive-level reporting

Note: If you enjoyed this post, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...