N-Stalker® was created in April 2000 by information security technology specialists, aiming at providing solutions to protect corporations and individuals against digital threats that affect information systems. Since then, our research & development laboratory has been working non-stop on security researches, producing web attack detection controls for the past years.
The first product to be released was N-Stealth HTTP Security Scanner Suite, a complete set of tools to assess Web servers security, including the capabilities of identifying vulnerabilities and providing a possible solution to mitigate the risks from critical mission business infrastructure, either on the Internet or in a corporate environment.
By permanently making use of attack signature updates, the software has aggregated the most extensive and updated database available on the market, with more than 39,000 vulnerabilities and exploits for Web environments, recursively utilized by the scanning tool.
However, attacks are now business oriented and thus raise a high demand for more effective vulnerability assessment, specially the solution capable of understanding the foundation of a Service-oriented architecture and the ability to manage custom web application business logics and security controls from early phases of development to the daily operations of production-level environments.
We understand securing a corporate systems is not about firewall and intrusion prevention mechanisms anymore. As a result of following-up current market trends (where it is noticed that more and more corporations, governments and tuition institutions are investing in the ubiquity of information systems, as means to integrate technology in people’s daily activities), N-Stalker proposes a new approach on Web Application Security Assessment.
Bringing a complete solution ready to cover every phase of Secure Web Development Life-cycle and the unique self-owned patent-pending technology of Component-oriented Web Application Security Scanning, N-Stalker will provide the most effective approach to your custom applications, enabling a Service-oriented Architecture (SOA) analysis with a security perspective.