Version 3.5 expands its weak points scanner to additional database environments in SANTA CLARA, Calif.-July 5, 2010 – now supports the software solution Repscan by Sentrigo, Inc. also the IBM DB2 and MySQL environments in the database analysis of weak points and the security scan. The version also has 3.5 additional functions that provide a faster and more efficient protection of sensitive data. Thus Repscan supports all the most popular DMBS platforms such as Oracle, Microsoft SQL Server, IBM DB2 and MySQL databases. With over 3000 automated security checks, Repscan is the most comprehensive solution for vulnerability analysis, that currently exist. Their reports have compliance to Auditzwecken after and improve the overall security for the sensitive data of each company. In addition to the large database support, Repscan with the port scan now allows a very quick vulnerability test.
This works with all databases support and provides immediate insight into potential threats, still before a more detailed and time-intensive scan can be completed. Customers have the ability to perform a penetration test as well as a forensic Traceanalyse on all database platforms in addition. Security staff can even without special knowledge of database with the integrated database browser test the security of the database and evaluate. “By we have added support for DB2 and MySQL, companies with Repscan can get now a detailed overview of their current security situation in the most popular database environments,” explains Dan Sarel, Vice President products, Sentrigo. “Together with a whole lot of new and existing features that make for extremely easy operation and management, Repscan is clearly the choice for companies that need a comprehensive vulnerability assessment. The secondary features extend far beyond traditional vulnerability management and analysis options. These include among others finished test opportunities for PCI QSAs, ASVs and other auditors and Security consultants.” Repscan discovers database changes, forgotten patches, insecure system configurations and weak or default passwords and determines also exploitable PL/SQL code and forensic traces.