HTTPCSEuropean cybersecurity leader

HTTPCS Security Technology

Next generation vulnerability scanner !

Your automated security audit solution (SaaS & Appliance)

Dashboard access

TURNKEY SOLUTION : SCHEDULE A DAILY AUDIT IN A FEW CLICKS !


HTTPCS SECURITY is developed in France and aims to proactively protect you against hacking by continuously securing your client / server addresses (domain, url, ip ...). From a single interface which does not require cybersecurity technical skills, those “Sites” can be secured online as well as during the development chain. According to your own web applicative and system configuration, our technology selects targeted attacks scenarios not limited to OWASP top 10 and CVE. This clever method automatically identifies levels of criticality, especially beyond an authentication space.

DISCOVER SECURITY BY HTTPCS

HOW DOES IT WORK?

Application security audit

APPLICATION SECURITY AUDIT

System Security Audit

SYSTEM SECURITY AUDIT

Compliance Control (GDPR)

COMPLIANCE CONTROL (GDPR)

1

CREATE YOUR DASHBOARD & SELECT SITES TO BE AUDITED

Access the tool from your web browser without any installation or machine configuration. An account manager helps you to set your audits with or without authentication (grey box).

Create your dashboard
1. Cross Site Scripting (XSS reflected and XSS persistent)

Recover sensitive data or carry out harmful tasks

2. Cross Site Request Forgery (CSRF)

Carry out a task using another web application authentication

3. Structured Query Language Injection (SQLI)

Read the database, record new data or execute malicious code

4. Traversal Directory (TRV)

Display a server sensitive file

5. Local File Inclusion (LFI) and Remote File Inclusion (RFI)

Execute a script file on a targeted or remote server

6. Shell Code Injection and PHP Code Injection (PSCI)

Affect a web application and the server where it is hosted

7. Directory Indexing (DI)

Recover sensitive files, target attacks, clickjacking

8. Open Redirect (ORED)

Redirect towards a malicious website

9. File Discover (FD)

Exploit sensitive files

10. Common Vulnerabilities & Exposures (CVE)

High severity known vulnerabilities potentially leading to mass attacks

2

Apply appropriate countermeasures

From you interface, put yourself in hackers’ shoes while simulating your detected vulnerabilities’ exploitation to understand the incurred risks.

Apply the correctives

3

ENSURE YOUR COMPLIANCE AND PRESERVE YOUR IMAGE (PCI-DSS / ISO/IEC 27001-27002 / HIPAA / FERPA / CIPA)

Prove your due diligence in cybersecurity, ISO 27001-27002 compliance and data protection thanks to the certification issued by HTTPCS as a trusted third party. Provide to your stakeholders the guarantee of a secure and reliable Site monitored by the European leader of offensive security !

Compliance
HTTPCS’ VISION FOR CYBERSECURITY STAKES

OUR TECHNICAL SPECIFICATIONS

  • Automated Audits Unlimited To Top 10 OWASP
  • Vulnerability Scanner For Applicative And System CVE
  • Black Box and Grey Box Automated Pentests (Authentication)
  • Reliable Reports with Appropriate Patches
  • Secure Certification Seal delivered By HTTPCS As a Trusted Third Party
  • EXTERNAL ADVANCED MAPPING : WEB APPLICATIVE, DYNAMIC (JAVASCRIPT), SYSTEM AND NETWORK
WHY SECURITY BY HTTPCS ?

ADVANTAGES OF OUR SOLUTION

Complete audits
MAXIMUM PROTECTION

Complete audits thanks to the combination of a vulnerability scanner and automatized pentests on the complete structure of each address.

Exploitable vulnerabilities
Reliable: ZERO FALSE POSITIVE

Only security flaws and exploitable vulnerabilities are flagged up thanks to a false positive automatic elimination system: no manual reprocessing. Guaranteed!

Audits and patchs
Security and Compliance

Easy to implement daily audits with reports easily understood by all types of users detailing impacted standards, incurred risks and countermeasures to be applied.


Account manager
DEDICATED CONTACT

An Account Executive supports each customer project from the implementation of its proactive policy to remediation.

Customizable functionalities
CUSTOMIZED OPTIONS

Personalized functions allowing the adaptation of the dashboard and the tool to all types of technological and organizational constraints.

Warning
Quick remediation

Real time alerts by email and SMS with ranking of security flaws by severity level.

SIGN OF CONFIDENCE FOR YOUR STAKEHOLDERS

HTTPCS CERTIFICATION

2018-02-19

HTTPCS Certification

A CLICKABLE SEAL UPDATED AFTER EACH AUDIT


The seal of trust, which also exists in floating mode, is an embed code to paste once in your application (footer, authentication page, legal notices…). As soon as the correctives are applied, its date is automatically updated after each audit to prove due diligence in cybersecurity, compliance to ISO 27001-02 guidelines, RGPD’ principles toward personal data protection.




HTTPCS desktop screenshot Scanner HTTPCS tablet screenshot Scanner HTTPCS phone screenshot Scanner