Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Discover how simple is using our products, watch the following videovideos:

...

Manage Findings

...

Reports

Table of Contents

Common FAQ

Q. What is your license policy?

...

Expand

All Security Reviewer software are implemented in compliance of Secure Coding standard like OWASP, WASC and CWE. Each new version is Static Analyzed using Security Reviewer Static Analysis and open source and commercial tools like Micro Focus Fortify.

Q. What does Support & Maintenance services provide?

...

Expand

Desktop Edition

Windows

      Microsoft®Windows 10 Professional or Enterprise (Home version not supported), Windows 2008 R2 Server or newer (Windows 2012 R2, Windows 2016, Windows 2019 and Windows 2019 2022 included). 

64 bit environment is suggested for better performances.      Microsoft®Office 2010 or newer installed (for reporting)

      .NET Framework 4.7.2 redistributable core 5 preinstalled with offline installer.

      Oracle JDK 1.8 or Oralce 11 preinstalled. For further details, please refer to the related chapter below      Python 3.8 or newer preinstalled

      At least 4 GB RAM or minimum RAM required by Host System

      2 Cores

      A physical hard disk greater than 200GB

      1 GB of free C: disk space during running

Linux

       Centos Linux 7.x or 8.x; or newer, Ubuntu 16.04 or higher, Debian 9 or higher, Oracle Linux 7.x or 8.x, Fedora 21 or higher, RedHat 7.x or 8.x

      64bit environment is mandatory

      Oracle JDK 1.8 .x, Fedora 21 or higher, RedHat 7.x or 8.x

      64bit environment is mandatory

      preinstalled. It won’t run with OpenJDK

      Python 3.6 or higher

      At least 4 GB RAM or minimum RAM required by Host System

      2 Cores

      A physical hard disk greater than 200GB

      1 GB of free C: disk space during running

macOS

       64-bit 10.x Sierra or newer

.NET core 5 preinstalled with offline installer.

      Oracle JDK 1.8 preinstalled. It won’t run with OpenJDK      Python 3.6 or higheror Oralce 11 preinstalled. For further details, please refer to the related chapter below

      At least 4 GB RAM or minimum RAM required by Host System

      2 Cores

      A physical hard disk greater than 200GB

      1 GB of free C: disk space during running

Virtual Desktop Edition

Host System: Microsoft®Windows , Mac OSX or Linux. No particular configuration is suggested. The application runs in a remote Windows Server. If you need that Server on your premises, it needs the same configuration of Server Edition

Developer Edition

Same configuration of Desktop Edition, with one of IDE Plugins installed.

Server Edition

Windows: Windows 2008 Server or newer (Windows 2012 R2, Windows 2016 and Windows 2019 included). .NET Framework 4.8 redistributable preinstalled. IIS 7.5 or newer for WCF

Linux:

Mac:

JDK 1.8 or newer JDK 11 preinstalled.

Minimum RAM required by Host System.

REST API Edition

Same configuration of Server Edition with additional Apache Tomcat 9 installed.

...

Expand

Malware is detected using an embedded version of Metaesploit against our own collection of rules, as well as through Dynamic analysis of ELF files:

  1. Starting and Termination: Time Stamps and Elapsed Time.

  2. Processes Information: clone, exec and exit etc.

  3. File I/O: open, read, write and delete etc.

  4. Network: TCP, UDP, HTTP and HTTPS etc.

  5. Typical Malicious Actions: self deletion, modification and lock.

  6. API Information: getpid, system, dup and other libc functions.

  7. syscall sequences.

Further, our Dynamic Analysis finds Backdoors based in: Suspicious open TCP ports, suspicious connection to external IPs and URIs, presence of Non-standard services and Suspicious executables.

...

.