Audience

Anyone, in any industry, who wishes to be compliant within their industry and secure against cybersecurity weaknesses: CEO, CFO, CRO, CIO, CISO and vulnerability managers. SAINT is used from bare-metal vulnerability scanning and Pen testing to prioritizing an organizations risks and compliance

About Saint Security Suite

This single, fully integrated solution conducts active, passive and agent-based assessments while its extensive flexibility evaluates risk according to each business. SAINT’s impressive, flexible and scalable scanning capabilities set it apart from many others in this space. SAINT has partnered with AWS, allowing its customers to take advantage of AWS’s efficient scanning. Should subscribers prefer, SAINT also offers a Windows scanning agent. Security teams can schedule scans easily, configure them with considerable occurrence flexibility and fine-tune them with advanced options. As a vulnerability management solution, SAINT Security Suite’s security research and development efforts focus on investigation, triage, prioritization, and coverage of vulnerabilities of the highest levels of severity and importance. Not willing to settle for just blanket coverage and raw data, our analysts focus on developing tools for what matters to our customers.

Pricing

Starting Price:
$1500.00/year/user
Pricing Details:
Flexible pricing tiers and terms.
Free Trial:
Free Trial available.

Integrations

API:
Yes, Saint Security Suite offers API access

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

Carson & SAINT
Founded: 1997
United States
www.carson-saint.com/products/saint-security-suite/vulnerability-management/

Videos and Screen Captures

Other Useful Business Software
Find Hidden Risks in Windows Task Scheduler Icon
Find Hidden Risks in Windows Task Scheduler

Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool

Product Details

Platforms Supported
Cloud
Windows
Linux
Training
Documentation
Live Online
Webinars
In Person
Support
Phone Support
24/7 Live Support
Online

Saint Security Suite Frequently Asked Questions

Q: What kinds of users and organization types does Saint Security Suite work with?
Q: What languages does Saint Security Suite support in their product?
Q: What kind of support options does Saint Security Suite offer?
Q: What other applications or services does Saint Security Suite integrate with?
Q: Does Saint Security Suite have an API?
Q: What type of training does Saint Security Suite provide?
Q: Does Saint Security Suite offer a free trial?
Q: How much does Saint Security Suite cost?

Saint Security Suite Product Features

Computer Security

Compliance Management
Maintenance Scheduling
Security Event Log
Vulnerability Protection
Anti Spam
Antivirus
Audit Trail
Database Security Audit
File Access Control
Financial Data Protection
Real Time Monitoring
Virus Definition Update

Configuration Management

Reporting Analytics / Visualization
Access Control / Permissions
Application Deployment
Automated Provisioning
Infrastructure Automation
Node Management
Orchestration
Task Management

Cybersecurity

Behavioral Analytics
Endpoint Management
Vulnerability Scanning
AI / Machine Learning
IOC Verification
Incident Management
Tokenization
Whitelisting / Blacklisting

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

Incident Management

Incident Reporting
Safety Management
Task Management
Ticket Management
Audit Trail
Corrective Actions (CAPA)
Disaster Recovery
IT Incident Management
OSHA Compliance
Root-Cause Diagnosis

Network Security

Analytics / Reporting
Firewalls
Threat Response
Vulnerability Scanning
Access Control
Compliance Reporting
Internet Usage Monitoring
Intrusion Detection System
VPN

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning